"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 02:51:55 +00:00
parent 5af7f5468b
commit 67b2bc776b
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
62 changed files with 4041 additions and 4041 deletions

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-0002", "ID": "CVE-2007-0002",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,84 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070316 Multiple Vendor libwpd Multiple Buffer Overflow Vulnerabilities", "name": "102863",
"refsource" : "IDEFENSE", "refsource": "SUNALERT",
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=490" "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102863-1"
}, },
{ {
"name" : "20070316 rPSA-2007-0057-1 libwpd", "name": "ADV-2007-1339",
"refsource" : "BUGTRAQ", "refsource": "VUPEN",
"url" : "http://www.securityfocus.com/archive/1/463033/100/0/threaded" "url": "http://www.vupen.com/english/advisories/2007/1339"
},
{
"name": "23006",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23006"
},
{
"name": "FEDORA-2007-350",
"refsource": "FEDORA",
"url": "http://fedoranews.org/cms/node/2805"
},
{
"name": "24573",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24573"
},
{
"name": "GLSA-200704-12",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200704-12.xml"
},
{
"name": "24588",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24588"
},
{
"name": "24581",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24581"
},
{
"name": "oval:org.mitre.oval:def:11535",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11535"
},
{
"name": "GLSA-200704-07",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200704-07.xml"
},
{
"name": "SUSE-SA:2007:023",
"refsource": "SUSE",
"url": "http://lists.suse.com/archive/suse-security-announce/2007-Mar/0007.html"
},
{
"name": "ADV-2007-1032",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1032"
},
{
"name": "24613",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24613"
},
{
"name": "24794",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24794"
},
{
"name": "MDKSA-2007:064",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:064"
},
{
"name": "24465",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24465"
}, },
{ {
"name": "http://sourceforge.net/project/shownotes.php?release_id=494122", "name": "http://sourceforge.net/project/shownotes.php?release_id=494122",
@ -72,91 +142,6 @@
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1268" "url": "http://www.debian.org/security/2007/dsa-1268"
}, },
{
"name" : "DSA-1270",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1270"
},
{
"name" : "FEDORA-2007-350",
"refsource" : "FEDORA",
"url" : "http://fedoranews.org/cms/node/2805"
},
{
"name" : "GLSA-200704-07",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200704-07.xml"
},
{
"name" : "GLSA-200704-12",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200704-12.xml"
},
{
"name" : "MDKSA-2007:063",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:063"
},
{
"name" : "MDKSA-2007:064",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:064"
},
{
"name" : "RHSA-2007:0055",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0055.html"
},
{
"name" : "SSA-2007-085-02",
"refsource" : "SLACKWARE",
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.399659"
},
{
"name" : "102863",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102863-1"
},
{
"name" : "SUSE-SA:2007:023",
"refsource" : "SUSE",
"url" : "http://lists.suse.com/archive/suse-security-announce/2007-Mar/0007.html"
},
{
"name" : "USN-437-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-437-1"
},
{
"name" : "23006",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23006"
},
{
"name" : "oval:org.mitre.oval:def:11535",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11535"
},
{
"name" : "ADV-2007-0976",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0976"
},
{
"name" : "ADV-2007-1032",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1032"
},
{
"name" : "ADV-2007-1339",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1339"
},
{
"name" : "1017789",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017789"
},
{ {
"name": "24507", "name": "24507",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -168,9 +153,19 @@
"url": "http://secunia.com/advisories/24557" "url": "http://secunia.com/advisories/24557"
}, },
{ {
"name" : "24572", "name": "20070316 rPSA-2007-0057-1 libwpd",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/463033/100/0/threaded"
},
{
"name": "MDKSA-2007:063",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:063"
},
{
"name": "24591",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/24572" "url": "http://secunia.com/advisories/24591"
}, },
{ {
"name": "24580", "name": "24580",
@ -178,14 +173,24 @@
"url": "http://secunia.com/advisories/24580" "url": "http://secunia.com/advisories/24580"
}, },
{ {
"name" : "24573", "name": "DSA-1270",
"refsource" : "SECUNIA", "refsource": "DEBIAN",
"url" : "http://secunia.com/advisories/24573" "url": "http://www.debian.org/security/2007/dsa-1270"
}, },
{ {
"name" : "24581", "name": "USN-437-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-437-1"
},
{
"name": "24572",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/24581" "url": "http://secunia.com/advisories/24572"
},
{
"name": "20070316 Multiple Vendor libwpd Multiple Buffer Overflow Vulnerabilities",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=490"
}, },
{ {
"name": "24593", "name": "24593",
@ -193,19 +198,24 @@
"url": "http://secunia.com/advisories/24593" "url": "http://secunia.com/advisories/24593"
}, },
{ {
"name" : "24465", "name": "ADV-2007-0976",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/24465" "url": "http://www.vupen.com/english/advisories/2007/0976"
}, },
{ {
"name" : "24794", "name": "SSA-2007-085-02",
"refsource" : "SECUNIA", "refsource": "SLACKWARE",
"url" : "http://secunia.com/advisories/24794" "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.399659"
}, },
{ {
"name" : "24856", "name": "1017789",
"refsource" : "SECUNIA", "refsource": "SECTRACK",
"url" : "http://secunia.com/advisories/24856" "url": "http://www.securitytracker.com/id?1017789"
},
{
"name": "RHSA-2007:0055",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0055.html"
}, },
{ {
"name": "24906", "name": "24906",
@ -213,19 +223,9 @@
"url": "http://secunia.com/advisories/24906" "url": "http://secunia.com/advisories/24906"
}, },
{ {
"name" : "24588", "name": "24856",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/24588" "url": "http://secunia.com/advisories/24856"
},
{
"name" : "24613",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24613"
},
{
"name" : "24591",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24591"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2007-0218", "ID": "CVE-2007-0218",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070612 Microsoft License Manager and urlmon.dll COM Object Interaction Invalid Memory Access Vulnerability", "name": "35348",
"refsource" : "IDEFENSE", "refsource": "OSVDB",
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=542" "url": "http://osvdb.org/35348"
}, },
{ {
"name" : "HPSBST02231", "name": "25627",
"refsource" : "HP", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/471947/100/0/threaded" "url": "http://secunia.com/advisories/25627"
}, },
{ {
"name": "SSRT071438", "name": "SSRT071438",
@ -68,25 +68,15 @@
"url": "http://www.securityfocus.com/archive/1/471947/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/471947/100/0/threaded"
}, },
{ {
"name" : "MS07-033", "name": "1018235",
"refsource" : "MS", "refsource": "SECTRACK",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-033" "url": "http://securitytracker.com/id?1018235"
},
{
"name" : "TA07-163A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-163A.html"
}, },
{ {
"name": "24372", "name": "24372",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/24372" "url": "http://www.securityfocus.com/bid/24372"
}, },
{
"name" : "35348",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/35348"
},
{ {
"name": "ADV-2007-2153", "name": "ADV-2007-2153",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -97,20 +87,30 @@
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1084" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1084"
}, },
{
"name" : "1018235",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1018235"
},
{
"name" : "25627",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25627"
},
{ {
"name": "webbrowser-object-code-execution(32106)", "name": "webbrowser-object-code-execution(32106)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32106" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32106"
},
{
"name": "20070612 Microsoft License Manager and urlmon.dll COM Object Interaction Invalid Memory Access Vulnerability",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=542"
},
{
"name": "TA07-163A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-163A.html"
},
{
"name": "MS07-033",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-033"
},
{
"name": "HPSBST02231",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/471947/100/0/threaded"
} }
] ]
} }

View File

@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[MediaWiki-announce] 20070204 MediaWiki 1.9.2 released",
"refsource" : "MLIST",
"url" : "http://lists.wikimedia.org/pipermail/mediawiki-announce/2007-February/000059.html"
},
{
"name" : "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_2/phase3/RELEASE-NOTES",
"refsource" : "CONFIRM",
"url" : "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_2/phase3/RELEASE-NOTES"
},
{
"name" : "22397",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22397"
},
{ {
"name": "ADV-2007-0490", "name": "ADV-2007-0490",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0490" "url": "http://www.vupen.com/english/advisories/2007/0490"
}, },
{
"name" : "33091",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33091"
},
{ {
"name": "24039", "name": "24039",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24039" "url": "http://secunia.com/advisories/24039"
}, },
{
"name": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_2/phase3/RELEASE-NOTES",
"refsource": "CONFIRM",
"url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_2/phase3/RELEASE-NOTES"
},
{
"name": "[MediaWiki-announce] 20070204 MediaWiki 1.9.2 released",
"refsource": "MLIST",
"url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2007-February/000059.html"
},
{ {
"name": "mediawiki-sortabletable-xss(32217)", "name": "mediawiki-sortabletable-xss(32217)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32217" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32217"
},
{
"name": "33091",
"refsource": "OSVDB",
"url": "http://osvdb.org/33091"
},
{
"name": "22397",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22397"
} }
] ]
} }

View File

@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb07-09.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb07-09.html"
},
{
"name" : "23404",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23404"
},
{
"name" : "ADV-2007-1342",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1342"
},
{ {
"name": "34896", "name": "34896",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/34896" "url": "http://www.osvdb.org/34896"
}, },
{
"name" : "1017900",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017900"
},
{ {
"name": "24854", "name": "24854",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24854" "url": "http://secunia.com/advisories/24854"
}, },
{
"name": "ADV-2007-1342",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1342"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb07-09.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb07-09.html"
},
{ {
"name": "bridge-unspecified-privilege-escalation(33570)", "name": "bridge-unspecified-privilege-escalation(33570)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33570" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33570"
},
{
"name": "23404",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23404"
},
{
"name": "1017900",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017900"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "http://www.symantec.com/avcenter/security/Content/2007.09.05.html",
"refsource": "CONFIRM",
"url": "http://www.symantec.com/avcenter/security/Content/2007.09.05.html"
},
{ {
"name": "20070315 Norton Insufficient validation of 'SymTDI' driver input buffer", "name": "20070315 Norton Insufficient validation of 'SymTDI' driver input buffer",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -63,14 +68,9 @@
"url": "http://marc.info/?l=full-disclosure&m=117396596027148&w=2" "url": "http://marc.info/?l=full-disclosure&m=117396596027148&w=2"
}, },
{ {
"name" : "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymTDI-driver-input-buffer.php", "name": "symantec-firewall-symtdi-dos(33003)",
"refsource" : "MISC", "refsource": "XF",
"url" : "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymTDI-driver-input-buffer.php" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33003"
},
{
"name" : "http://www.symantec.com/avcenter/security/Content/2007.09.05.html",
"refsource" : "CONFIRM",
"url" : "http://www.symantec.com/avcenter/security/Content/2007.09.05.html"
}, },
{ {
"name": "22977", "name": "22977",
@ -82,20 +82,20 @@
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/35088" "url": "http://osvdb.org/35088"
}, },
{
"name" : "1018656",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1018656"
},
{ {
"name": "2438", "name": "2438",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2438" "url": "http://securityreason.com/securityalert/2438"
}, },
{ {
"name" : "symantec-firewall-symtdi-dos(33003)", "name": "1018656",
"refsource" : "XF", "refsource": "SECTRACK",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33003" "url": "http://securitytracker.com/id?1018656"
},
{
"name": "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymTDI-driver-input-buffer.php",
"refsource": "MISC",
"url": "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymTDI-driver-input-buffer.php"
} }
] ]
} }

View File

@ -52,6 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "24695",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24695"
},
{
"name": "advanced-profiledit-file-include(33321)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33321"
},
{
"name": "34587",
"refsource": "OSVDB",
"url": "http://osvdb.org/34587"
},
{
"name": "ADV-2007-1179",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1179"
},
{ {
"name": "20070329 Advanced Login <= 0.7 (root) Remote File Inclusion Vulnerability", "name": "20070329 Advanced Login <= 0.7 (root) Remote File Inclusion Vulnerability",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -67,30 +87,10 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/23197" "url": "http://www.securityfocus.com/bid/23197"
}, },
{
"name" : "ADV-2007-1179",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1179"
},
{
"name" : "34587",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/34587"
},
{
"name" : "24695",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24695"
},
{ {
"name": "2508", "name": "2508",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2508" "url": "http://securityreason.com/securityalert/2508"
},
{
"name" : "advanced-profiledit-file-include(33321)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33321"
} }
] ]
} }

View File

@ -52,11 +52,41 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "http://www.getfirebug.com/blog/2007/04/04/security-update/",
"refsource": "CONFIRM",
"url": "http://www.getfirebug.com/blog/2007/04/04/security-update/"
},
{
"name": "http://larholm.com/2007/04/06/0day-vulnerability-in-firebug/",
"refsource": "MISC",
"url": "http://larholm.com/2007/04/06/0day-vulnerability-in-firebug/"
},
{
"name": "23315",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23315"
},
{
"name": "24743",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24743"
},
{ {
"name": "20070404 Firefox extensions go Evil - Critical Vulnerabilities in Firefox/Firebug", "name": "20070404 Firefox extensions go Evil - Critical Vulnerabilities in Firefox/Firebug",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/464740/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/464740/100/0/threaded"
}, },
{
"name": "ADV-2007-1272",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1272"
},
{
"name": "2525",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2525"
},
{ {
"name": "20070404 Re: [WEB SECURITY] Firefox extensions go Evil - Critical Vulnerabilities in Firefox/Firebug", "name": "20070404 Re: [WEB SECURITY] Firefox extensions go Evil - Critical Vulnerabilities in Firefox/Firebug",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -67,36 +97,6 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.gnucitizen.org/blog/firebug-goes-evil" "url": "http://www.gnucitizen.org/blog/firebug-goes-evil"
}, },
{
"name" : "http://larholm.com/2007/04/06/0day-vulnerability-in-firebug/",
"refsource" : "MISC",
"url" : "http://larholm.com/2007/04/06/0day-vulnerability-in-firebug/"
},
{
"name" : "http://www.getfirebug.com/blog/2007/04/04/security-update/",
"refsource" : "CONFIRM",
"url" : "http://www.getfirebug.com/blog/2007/04/04/security-update/"
},
{
"name" : "23315",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23315"
},
{
"name" : "ADV-2007-1272",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1272"
},
{
"name" : "24743",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24743"
},
{
"name" : "2525",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2525"
},
{ {
"name": "firefox-firebug-console-security-bypass(33451)", "name": "firefox-firebug-console-security-bypass(33451)",
"refsource": "XF", "refsource": "XF",

View File

@ -53,19 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.php-security.org/MOPB/MOPB-39-2007.html", "name": "ADV-2007-1991",
"refsource" : "MISC", "refsource": "VUPEN",
"url" : "http://www.php-security.org/MOPB/MOPB-39-2007.html" "url": "http://www.vupen.com/english/advisories/2007/1991"
}, },
{ {
"name" : "http://www.php.net/releases/5_2_1.php", "name": "23233",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://www.php.net/releases/5_2_1.php" "url": "http://www.securityfocus.com/bid/23233"
},
{
"name" : "HPSBMA02215",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506"
}, },
{ {
"name": "SSRT071423", "name": "SSRT071423",
@ -77,21 +72,16 @@
"refsource": "HP", "refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137" "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137"
}, },
{
"name": "http://www.php.net/releases/5_2_1.php",
"refsource": "CONFIRM",
"url": "http://www.php.net/releases/5_2_1.php"
},
{ {
"name": "SSRT071429", "name": "SSRT071429",
"refsource": "HP", "refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137" "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137"
}, },
{
"name" : "23233",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23233"
},
{
"name" : "ADV-2007-1991",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1991"
},
{ {
"name": "ADV-2007-2374", "name": "ADV-2007-2374",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -102,11 +92,21 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25423" "url": "http://secunia.com/advisories/25423"
}, },
{
"name": "HPSBMA02215",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506"
},
{ {
"name": "25850", "name": "25850",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25850" "url": "http://secunia.com/advisories/25850"
}, },
{
"name": "http://www.php-security.org/MOPB/MOPB-39-2007.html",
"refsource": "MISC",
"url": "http://www.php-security.org/MOPB/MOPB-39-2007.html"
},
{ {
"name": "php-strreplace-bo(33767)", "name": "php-strreplace-bo(33767)",
"refsource": "XF", "refsource": "XF",

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "4348", "name": "ppstream-powerplayer-bo(36394)",
"refsource" : "EXPLOIT-DB", "refsource": "XF",
"url" : "https://www.exploit-db.com/exploits/4348" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36394"
},
{
"name" : "25502",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25502"
}, },
{ {
"name": "38421", "name": "38421",
@ -68,9 +63,14 @@
"url": "http://osvdb.org/38421" "url": "http://osvdb.org/38421"
}, },
{ {
"name" : "ppstream-powerplayer-bo(36394)", "name": "25502",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36394" "url": "http://www.securityfocus.com/bid/25502"
},
{
"name": "4348",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4348"
} }
] ]
} }

View File

@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "4377",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4377"
},
{
"name" : "20070918 true: Focus/SIS RFI's (both vectors)",
"refsource" : "VIM",
"url" : "http://www.attrition.org/pipermail/vim/2007-September/001788.html"
},
{ {
"name": "25603", "name": "25603",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/25603" "url": "http://www.securityfocus.com/bid/25603"
}, },
{ {
"name" : "ADV-2007-3134", "name": "focussis-focuspath-file-include(36521)",
"refsource" : "VUPEN", "refsource": "XF",
"url" : "http://www.vupen.com/english/advisories/2007/3134" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36521"
}, },
{ {
"name": "36952", "name": "36952",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/36952" "url": "http://www.osvdb.org/36952"
}, },
{
"name": "20070918 true: Focus/SIS RFI's (both vectors)",
"refsource": "VIM",
"url": "http://www.attrition.org/pipermail/vim/2007-September/001788.html"
},
{
"name": "ADV-2007-3134",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3134"
},
{
"name": "4377",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4377"
},
{ {
"name": "26750", "name": "26750",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26750" "url": "http://secunia.com/advisories/26750"
},
{
"name" : "focussis-focuspath-file-include(36521)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36521"
} }
] ]
} }

View File

@ -53,39 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070918 TPTI-07-15: Automated Solutions Modbus TCP Slave ActiveX Control Heap Corruption Vulnerability", "name": "modbus-tcpslave-bo(36677)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/479967/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36677"
},
{
"name" : "http://dvlabs.tippingpoint.com/advisory/TPTI-07-15",
"refsource" : "MISC",
"url" : "http://dvlabs.tippingpoint.com/advisory/TPTI-07-15"
},
{
"name" : "http://www.nessus.org/plugins/index.php?view=single&id=26066",
"refsource" : "MISC",
"url" : "http://www.nessus.org/plugins/index.php?view=single&id=26066"
},
{
"name" : "http://www.automatedsolutions.com/pub/asmbslv/ReadMe.htm",
"refsource" : "CONFIRM",
"url" : "http://www.automatedsolutions.com/pub/asmbslv/ReadMe.htm"
},
{
"name" : "VU#981849",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/981849"
},
{
"name" : "25713",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25713"
},
{
"name" : "38259",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/38259"
}, },
{ {
"name": "1018707", "name": "1018707",
@ -93,9 +63,39 @@
"url": "http://www.securitytracker.com/id?1018707" "url": "http://www.securitytracker.com/id?1018707"
}, },
{ {
"name" : "modbus-tcpslave-bo(36677)", "name": "20070918 TPTI-07-15: Automated Solutions Modbus TCP Slave ActiveX Control Heap Corruption Vulnerability",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36677" "url": "http://www.securityfocus.com/archive/1/479967/100/0/threaded"
},
{
"name": "38259",
"refsource": "OSVDB",
"url": "http://osvdb.org/38259"
},
{
"name": "http://dvlabs.tippingpoint.com/advisory/TPTI-07-15",
"refsource": "MISC",
"url": "http://dvlabs.tippingpoint.com/advisory/TPTI-07-15"
},
{
"name": "25713",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25713"
},
{
"name": "http://www.nessus.org/plugins/index.php?view=single&id=26066",
"refsource": "MISC",
"url": "http://www.nessus.org/plugins/index.php?view=single&id=26066"
},
{
"name": "VU#981849",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/981849"
},
{
"name": "http://www.automatedsolutions.com/pub/asmbslv/ReadMe.htm",
"refsource": "CONFIRM",
"url": "http://www.automatedsolutions.com/pub/asmbslv/ReadMe.htm"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "4597", "name": "39066",
"refsource" : "EXPLOIT-DB", "refsource": "OSVDB",
"url" : "https://www.exploit-db.com/exploits/4597" "url": "http://osvdb.org/39066"
}, },
{ {
"name": "26300", "name": "26300",
@ -63,14 +63,9 @@
"url": "http://www.securityfocus.com/bid/26300" "url": "http://www.securityfocus.com/bid/26300"
}, },
{ {
"name" : "ADV-2007-3747", "name": "39067",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3747"
},
{
"name" : "39064",
"refsource": "OSVDB", "refsource": "OSVDB",
"url" : "http://osvdb.org/39064" "url": "http://osvdb.org/39067"
}, },
{ {
"name": "39065", "name": "39065",
@ -78,19 +73,24 @@
"url": "http://osvdb.org/39065" "url": "http://osvdb.org/39065"
}, },
{ {
"name" : "39066", "name": "4597",
"refsource" : "OSVDB", "refsource": "EXPLOIT-DB",
"url" : "http://osvdb.org/39066" "url": "https://www.exploit-db.com/exploits/4597"
},
{
"name" : "39067",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/39067"
}, },
{ {
"name": "dmguestbook-lngdefault-file-include(38219)", "name": "dmguestbook-lngdefault-file-include(38219)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38219" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38219"
},
{
"name": "39064",
"refsource": "OSVDB",
"url": "http://osvdb.org/39064"
},
{
"name": "ADV-2007-3747",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3747"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-5959", "ID": "CVE-2007-5959",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,19 +53,69 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20080212 FLEA-2008-0001-1 firefox", "name": "27816",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/488002/100/0/threaded" "url": "http://secunia.com/advisories/27816"
}, },
{ {
"name" : "20080229 rPSA-2008-0093-1 thunderbird", "name": "mozilla-multiple-memcorrupt-code-execution(38643)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/488971/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38643"
}, },
{ {
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=198965", "name": "http://browser.netscape.com/releasenotes/",
"refsource" : "MISC", "refsource": "CONFIRM",
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=198965" "url": "http://browser.netscape.com/releasenotes/"
},
{
"name": "27855",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27855"
},
{
"name": "DSA-1424",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1424"
},
{
"name": "SUSE-SA:2007:066",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00004.html"
},
{
"name": "GLSA-200712-21",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200712-21.xml"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0260",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0260"
},
{
"name": "https://issues.rpath.com/browse/RPL-1995",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1995"
},
{
"name": "28277",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28277"
},
{
"name": "27845",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27845"
},
{
"name": "RHSA-2007:1083",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1083.html"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093"
}, },
{ {
"name": "http://bugs.gentoo.org/show_bug.cgi?id=200909", "name": "http://bugs.gentoo.org/show_bug.cgi?id=200909",
@ -78,234 +128,59 @@
"url": "http://www.mozilla.org/security/announce/2007/mfsa2007-38.html" "url": "http://www.mozilla.org/security/announce/2007/mfsa2007-38.html"
}, },
{ {
"name" : "https://issues.rpath.com/browse/RPL-1984", "name": "ADV-2008-0643",
"refsource" : "CONFIRM", "refsource": "VUPEN",
"url" : "https://issues.rpath.com/browse/RPL-1984" "url": "http://www.vupen.com/english/advisories/2008/0643"
},
{
"name" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0260",
"refsource" : "CONFIRM",
"url" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0260"
},
{
"name" : "http://browser.netscape.com/releasenotes/",
"refsource" : "CONFIRM",
"url" : "http://browser.netscape.com/releasenotes/"
},
{
"name" : "http://wiki.rpath.com/Advisories:rPSA-2008-0093",
"refsource" : "CONFIRM",
"url" : "http://wiki.rpath.com/Advisories:rPSA-2008-0093"
},
{
"name" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093",
"refsource" : "CONFIRM",
"url" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093"
},
{
"name" : "https://issues.rpath.com/browse/RPL-1995",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-1995"
},
{
"name" : "DSA-1424",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1424"
},
{
"name" : "DSA-1425",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1425"
}, },
{ {
"name": "FEDORA-2007-3952", "name": "FEDORA-2007-3952",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg01011.html" "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg01011.html"
}, },
{
"name": "RHSA-2007:1082",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1082.html"
},
{
"name": "SSA:2007-331-01",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374833"
},
{
"name": "28016",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28016"
},
{ {
"name": "FEDORA-2007-4098", "name": "FEDORA-2007-4098",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00168.html" "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00168.html"
}, },
{
"name" : "FEDORA-2007-4106",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00135.html"
},
{
"name" : "FEDORA-2007-756",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00115.html"
},
{
"name" : "GLSA-200712-21",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200712-21.xml"
},
{ {
"name": "HPSBUX02153", "name": "HPSBUX02153",
"refsource": "HP", "refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742" "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
}, },
{
"name" : "SSRT061181",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{ {
"name": "MDKSA-2007:246", "name": "MDKSA-2007:246",
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:246" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:246"
}, },
{
"name" : "RHSA-2007:1082",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-1082.html"
},
{
"name" : "RHSA-2007:1084",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-1084.html"
},
{
"name" : "RHSA-2007:1083",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-1083.html"
},
{
"name" : "SSA:2007-331-01",
"refsource" : "SLACKWARE",
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374833"
},
{
"name" : "SSA:2007-333-01",
"refsource" : "SLACKWARE",
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.365006"
},
{
"name" : "231441",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-231441-1"
},
{
"name" : "1018977",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1018977.1-1"
},
{
"name" : "SUSE-SA:2007:066",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00004.html"
},
{ {
"name": "USN-546-1", "name": "USN-546-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/546-1/" "url": "https://usn.ubuntu.com/546-1/"
}, },
{
"name" : "USN-546-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-546-2"
},
{
"name" : "26593",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26593"
},
{
"name" : "oval:org.mitre.oval:def:11014",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11014"
},
{
"name" : "ADV-2007-4002",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/4002"
},
{ {
"name": "ADV-2007-4018", "name": "ADV-2007-4018",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/4018" "url": "http://www.vupen.com/english/advisories/2007/4018"
}, },
{ {
"name" : "ADV-2008-0083", "name": "20080229 rPSA-2008-0093-1 thunderbird",
"refsource" : "VUPEN", "refsource": "BUGTRAQ",
"url" : "http://www.vupen.com/english/advisories/2008/0083" "url": "http://www.securityfocus.com/archive/1/488971/100/0/threaded"
},
{
"name" : "ADV-2008-0643",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0643"
},
{
"name" : "1018994",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1018994"
},
{
"name" : "27725",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27725"
},
{
"name" : "27793",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27793"
},
{
"name" : "27796",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27796"
},
{
"name" : "27797",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27797"
},
{
"name" : "27816",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27816"
},
{
"name" : "27944",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27944"
},
{
"name" : "27957",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27957"
},
{
"name" : "28001",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28001"
},
{
"name" : "28016",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28016"
},
{
"name" : "27955",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27955"
},
{
"name" : "28171",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28171"
},
{
"name" : "28277",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28277"
},
{
"name" : "27800",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27800"
}, },
{ {
"name": "27838", "name": "27838",
@ -313,9 +188,79 @@
"url": "http://secunia.com/advisories/27838" "url": "http://secunia.com/advisories/27838"
}, },
{ {
"name" : "27845", "name": "FEDORA-2007-4106",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00135.html"
},
{
"name": "20080212 FLEA-2008-0001-1 firefox",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/488002/100/0/threaded"
},
{
"name": "ADV-2007-4002",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/4002"
},
{
"name": "1018977",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1018977.1-1"
},
{
"name": "27793",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/27845" "url": "http://secunia.com/advisories/27793"
},
{
"name": "oval:org.mitre.oval:def:11014",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11014"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=198965",
"refsource": "MISC",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=198965"
},
{
"name": "ADV-2008-0083",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0083"
},
{
"name": "27955",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27955"
},
{
"name": "http://wiki.rpath.com/Advisories:rPSA-2008-0093",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0093"
},
{
"name": "1018994",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1018994"
},
{
"name": "USN-546-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-546-2"
},
{
"name": "FEDORA-2007-756",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00115.html"
},
{
"name": "231441",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-231441-1"
},
{
"name": "27957",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27957"
}, },
{ {
"name": "28398", "name": "28398",
@ -323,9 +268,44 @@
"url": "http://secunia.com/advisories/28398" "url": "http://secunia.com/advisories/28398"
}, },
{ {
"name" : "27855", "name": "29164",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/27855" "url": "http://secunia.com/advisories/29164"
},
{
"name": "28001",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28001"
},
{
"name": "SSRT061181",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name": "27796",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27796"
},
{
"name": "26593",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26593"
},
{
"name": "SSA:2007-333-01",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.365006"
},
{
"name": "https://issues.rpath.com/browse/RPL-1984",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1984"
},
{
"name": "27797",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27797"
}, },
{ {
"name": "27979", "name": "27979",
@ -333,14 +313,34 @@
"url": "http://secunia.com/advisories/27979" "url": "http://secunia.com/advisories/27979"
}, },
{ {
"name" : "29164", "name": "28171",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/29164" "url": "http://secunia.com/advisories/28171"
}, },
{ {
"name" : "mozilla-multiple-memcorrupt-code-execution(38643)", "name": "27800",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38643" "url": "http://secunia.com/advisories/27800"
},
{
"name": "RHSA-2007:1084",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1084.html"
},
{
"name": "DSA-1425",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1425"
},
{
"name": "27944",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27944"
},
{
"name": "27725",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27725"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-2375", "ID": "CVE-2015-2375",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS15-070",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-070"
},
{ {
"name": "1032899", "name": "1032899",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032899" "url": "http://www.securitytracker.com/id/1032899"
},
{
"name": "MS15-070",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-070"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20150129 Re: CVEs for Drupal contributed modules - January 2015",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/01/29/6"
},
{ {
"name": "https://www.drupal.org/node/2403463", "name": "https://www.drupal.org/node/2403463",
"refsource": "MISC", "refsource": "MISC",
"url": "https://www.drupal.org/node/2403463" "url": "https://www.drupal.org/node/2403463"
}, },
{
"name": "71957",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/71957"
},
{ {
"name": "https://www.drupal.org/node/2402767", "name": "https://www.drupal.org/node/2402767",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.drupal.org/node/2402767" "url": "https://www.drupal.org/node/2402767"
}, },
{ {
"name" : "71957", "name": "[oss-security] 20150129 Re: CVEs for Drupal contributed modules - January 2015",
"refsource" : "BID", "refsource": "MLIST",
"url" : "http://www.securityfocus.com/bid/71957" "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-3707", "ID": "CVE-2015-3707",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.apple.com/kb/HT204942",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT204942"
},
{ {
"name": "APPLE-SA-2015-06-30-2", "name": "APPLE-SA-2015-06-30-2",
"refsource": "APPLE", "refsource": "APPLE",
@ -71,6 +66,11 @@
"name": "1032760", "name": "1032760",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032760" "url": "http://www.securitytracker.com/id/1032760"
},
{
"name": "http://support.apple.com/kb/HT204942",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT204942"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2015-3861", "ID": "CVE-2015-3861",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-6180", "ID": "CVE-2015-6180",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[android-security-updates] 20150812 Nexus Security Bulletin (August 2015)",
"refsource" : "MLIST",
"url" : "https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ"
},
{ {
"name": "https://android.googlesource.com/platform/frameworks/av/+/cf1581c66c2ad8c5b1aaca2e43e350cf5974f46d", "name": "https://android.googlesource.com/platform/frameworks/av/+/cf1581c66c2ad8c5b1aaca2e43e350cf5974f46d",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/frameworks/av/+/cf1581c66c2ad8c5b1aaca2e43e350cf5974f46d" "url": "https://android.googlesource.com/platform/frameworks/av/+/cf1581c66c2ad8c5b1aaca2e43e350cf5974f46d"
},
{
"name": "[android-security-updates] 20150812 Nexus Security Bulletin (August 2015)",
"refsource": "MLIST",
"url": "https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2015-6637", "ID": "CVE-2015-6637",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://source.android.com/security/bulletin/2016-01-01.html",
"refsource" : "CONFIRM",
"url" : "http://source.android.com/security/bulletin/2016-01-01.html"
},
{ {
"name": "1034592", "name": "1034592",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034592" "url": "http://www.securitytracker.com/id/1034592"
},
{
"name": "http://source.android.com/security/bulletin/2016-01-01.html",
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-01-01.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-6702", "ID": "CVE-2015-6702",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2015-6776", "ID": "CVE-2015-6776",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,35 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://codereview.chromium.org/1416783002/diff/20001/third_party/libopenjpeg20/0003-dwt-decode.patch",
"refsource": "CONFIRM",
"url": "https://codereview.chromium.org/1416783002/diff/20001/third_party/libopenjpeg20/0003-dwt-decode.patch"
},
{ {
"name": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html", "name": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html" "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html"
}, },
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=457480",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=457480"
},
{ {
"name": "https://codereview.chromium.org/1416783002", "name": "https://codereview.chromium.org/1416783002",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://codereview.chromium.org/1416783002" "url": "https://codereview.chromium.org/1416783002"
}, },
{ {
"name" : "https://codereview.chromium.org/1416783002/diff/20001/third_party/libopenjpeg20/0003-dwt-decode.patch", "name": "openSUSE-SU-2015:2290",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "https://codereview.chromium.org/1416783002/diff/20001/third_party/libopenjpeg20/0003-dwt-decode.patch" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html"
}, },
{ {
"name" : "https://codereview.chromium.org/1416783002/diff/20001/third_party/libopenjpeg20/README.pdfium", "name": "https://code.google.com/p/chromium/issues/detail?id=457480",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://codereview.chromium.org/1416783002/diff/20001/third_party/libopenjpeg20/README.pdfium" "url": "https://code.google.com/p/chromium/issues/detail?id=457480"
},
{
"name" : "DSA-3415",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3415"
}, },
{ {
"name": "GLSA-201603-09", "name": "GLSA-201603-09",
@ -88,20 +83,25 @@
"url": "https://security.gentoo.org/glsa/201603-09" "url": "https://security.gentoo.org/glsa/201603-09"
}, },
{ {
"name" : "openSUSE-SU-2015:2290", "name": "78416",
"refsource" : "SUSE", "refsource": "BID",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html" "url": "http://www.securityfocus.com/bid/78416"
},
{
"name": "DSA-3415",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3415"
},
{
"name": "https://codereview.chromium.org/1416783002/diff/20001/third_party/libopenjpeg20/README.pdfium",
"refsource": "CONFIRM",
"url": "https://codereview.chromium.org/1416783002/diff/20001/third_party/libopenjpeg20/README.pdfium"
}, },
{ {
"name": "openSUSE-SU-2015:2291", "name": "openSUSE-SU-2015:2291",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html"
}, },
{
"name" : "78416",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/78416"
},
{ {
"name": "1034298", "name": "1034298",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2015-7217", "ID": "CVE-2015-7217",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,56 +52,56 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2015/mfsa2015-143.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2015/mfsa2015-143.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1203078",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1203078"
},
{
"name" : "FEDORA-2015-51b1105902",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html"
},
{
"name" : "FEDORA-2015-7ab3d3afcf",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html"
},
{ {
"name": "GLSA-201512-10", "name": "GLSA-201512-10",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201512-10" "url": "https://security.gentoo.org/glsa/201512-10"
}, },
{
"name" : "openSUSE-SU-2016:0307",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html"
},
{
"name" : "openSUSE-SU-2016:0308",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html"
},
{ {
"name": "openSUSE-SU-2015:2353", "name": "openSUSE-SU-2015:2353",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html"
}, },
{
"name": "openSUSE-SU-2016:0308",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html"
},
{
"name": "FEDORA-2015-7ab3d3afcf",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html"
},
{ {
"name": "USN-2833-1", "name": "USN-2833-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2833-1" "url": "http://www.ubuntu.com/usn/USN-2833-1"
}, },
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1203078",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1203078"
},
{
"name": "http://www.mozilla.org/security/announce/2015/mfsa2015-143.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2015/mfsa2015-143.html"
},
{ {
"name": "79278", "name": "79278",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/79278" "url": "http://www.securityfocus.com/bid/79278"
}, },
{
"name": "openSUSE-SU-2016:0307",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html"
},
{
"name": "FEDORA-2015-51b1105902",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html"
},
{ {
"name": "1034426", "name": "1034426",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://security.netapp.com/advisory/ntap-20151029-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20151029-0001/"
},
{ {
"name": "https://www.syscan360.org/slides/2015_EN_AttackingVxWorksFromstoneagetointerstellar_Eric_Yannick.pdf", "name": "https://www.syscan360.org/slides/2015_EN_AttackingVxWorksFromstoneagetointerstellar_Eric_Yannick.pdf",
"refsource": "MISC", "refsource": "MISC",
@ -62,20 +67,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://blogs.windriver.com/wind_river_blog/2015/09/wind-river-vxworks-updateclarification.html" "url": "http://blogs.windriver.com/wind_river_blog/2015/09/wind-river-vxworks-updateclarification.html"
}, },
{
"name" : "https://kb.netapp.com/support/s/article/cve-2015-7599-vxworks-vulnerability-impacting-netapp-e-series-products?language=en_US",
"refsource" : "CONFIRM",
"url" : "https://kb.netapp.com/support/s/article/cve-2015-7599-vxworks-vulnerability-impacting-netapp-e-series-products?language=en_US"
},
{
"name" : "https://security.netapp.com/advisory/ntap-20151029-0001/",
"refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20151029-0001/"
},
{ {
"name": "79205", "name": "79205",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/79205" "url": "http://www.securityfocus.com/bid/79205"
},
{
"name": "https://kb.netapp.com/support/s/article/cve-2015-7599-vxworks-vulnerability-impacting-netapp-e-series-products?language=en_US",
"refsource": "CONFIRM",
"url": "https://kb.netapp.com/support/s/article/cve-2015-7599-vxworks-vulnerability-impacting-netapp-e-series-products?language=en_US"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2015-7784", "ID": "CVE-2015-7784",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -62,15 +62,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.ec-cube.net/products/detail.php?product_id=781" "url": "http://www.ec-cube.net/products/detail.php?product_id=781"
}, },
{
"name" : "JVN#55545372",
"refsource" : "JVN",
"url" : "http://jvn.jp/en/jp/JVN55545372/index.html"
},
{ {
"name": "JVNDB-2015-000190", "name": "JVNDB-2015-000190",
"refsource": "JVNDB", "refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000190" "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000190"
},
{
"name": "JVN#55545372",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN55545372/index.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0442", "ID": "CVE-2016-0442",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-0633", "ID": "CVE-2016-0633",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,145 +52,145 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5c17c861a357e9458001f021a7afa7aab9937439",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5c17c861a357e9458001f021a7afa7aab9937439"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1296253",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1296253"
},
{
"name" : "https://github.com/torvalds/linux/commit/5c17c861a357e9458001f021a7afa7aab9937439",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/5c17c861a357e9458001f021a7afa7aab9937439"
},
{ {
"name": "https://security-tracker.debian.org/tracker/CVE-2016-0723", "name": "https://security-tracker.debian.org/tracker/CVE-2016-0723",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://security-tracker.debian.org/tracker/CVE-2016-0723" "url": "https://security-tracker.debian.org/tracker/CVE-2016-0723"
}, },
{
"name" : "http://source.android.com/security/bulletin/2016-07-01.html",
"refsource" : "CONFIRM",
"url" : "http://source.android.com/security/bulletin/2016-07-01.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html"
},
{
"name" : "DSA-3503",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3503"
},
{
"name" : "DSA-3448",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3448"
},
{
"name" : "FEDORA-2016-2f25d12c51",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176464.html"
},
{
"name" : "FEDORA-2016-5d43766e33",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html"
},
{
"name" : "SUSE-SU-2016:1764",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html"
},
{
"name" : "SUSE-SU-2016:2074",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html"
},
{
"name" : "openSUSE-SU-2016:1008",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html"
},
{
"name" : "SUSE-SU-2016:0911",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html"
},
{
"name" : "SUSE-SU-2016:1102",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html"
},
{
"name" : "USN-2967-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2967-1"
},
{
"name" : "USN-2967-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2967-2"
},
{
"name" : "USN-2929-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2929-1"
},
{
"name" : "USN-2929-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2929-2"
},
{ {
"name": "USN-2930-1", "name": "USN-2930-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2930-1" "url": "http://www.ubuntu.com/usn/USN-2930-1"
}, },
{
"name": "USN-2967-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2967-1"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1296253",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296253"
},
{ {
"name": "USN-2930-2", "name": "USN-2930-2",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2930-2" "url": "http://www.ubuntu.com/usn/USN-2930-2"
}, },
{
"name": "DSA-3503",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3503"
},
{
"name": "USN-2967-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2967-2"
},
{
"name": "SUSE-SU-2016:1764",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5c17c861a357e9458001f021a7afa7aab9937439",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5c17c861a357e9458001f021a7afa7aab9937439"
},
{ {
"name": "USN-2930-3", "name": "USN-2930-3",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2930-3" "url": "http://www.ubuntu.com/usn/USN-2930-3"
}, },
{
"name": "SUSE-SU-2016:1102",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html"
},
{
"name": "http://source.android.com/security/bulletin/2016-07-01.html",
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-07-01.html"
},
{
"name": "USN-2929-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2929-1"
},
{ {
"name": "USN-2932-1", "name": "USN-2932-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2932-1" "url": "http://www.ubuntu.com/usn/USN-2932-1"
}, },
{
"name" : "USN-2948-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2948-1"
},
{
"name" : "USN-2948-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2948-2"
},
{ {
"name": "82950", "name": "82950",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/82950" "url": "http://www.securityfocus.com/bid/82950"
}, },
{
"name": "FEDORA-2016-5d43766e33",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html"
},
{
"name": "SUSE-SU-2016:2074",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html"
},
{ {
"name": "1035695", "name": "1035695",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035695" "url": "http://www.securitytracker.com/id/1035695"
},
{
"name": "USN-2948-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2948-1"
},
{
"name": "DSA-3448",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3448"
},
{
"name": "openSUSE-SU-2016:1008",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html"
},
{
"name": "USN-2929-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2929-2"
},
{
"name": "https://github.com/torvalds/linux/commit/5c17c861a357e9458001f021a7afa7aab9937439",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/5c17c861a357e9458001f021a7afa7aab9937439"
},
{
"name": "USN-2948-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2948-2"
},
{
"name": "FEDORA-2016-2f25d12c51",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176464.html"
},
{
"name": "SUSE-SU-2016:0911",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-1000363", "ID": "CVE-2016-1000363",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1330", "ID": "CVE-2016-1330",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20160215 Cisco IOS Software for Cisco Industrial Ethernet 2000 Series Switches Denial of Service Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160215-ie2000"
},
{ {
"name": "1035013", "name": "1035013",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035013" "url": "http://www.securitytracker.com/id/1035013"
},
{
"name": "20160215 Cisco IOS Software for Cisco Industrial Ethernet 2000 Series Switches Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160215-ie2000"
} }
] ]
} }

View File

@ -53,14 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20160115 [CVE Request] Multiple PHP issues", "name": "USN-2952-1",
"refsource" : "MLIST", "refsource": "UBUNTU",
"url" : "http://www.openwall.com/lists/oss-security/2016/01/14/8" "url": "http://www.ubuntu.com/usn/USN-2952-1"
}, },
{ {
"name" : "http://www.php.net/ChangeLog-5.php", "name": "79916",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://www.php.net/ChangeLog-5.php" "url": "http://www.securityfocus.com/bid/79916"
}, },
{ {
"name": "http://www.php.net/ChangeLog-7.php", "name": "http://www.php.net/ChangeLog-7.php",
@ -73,44 +73,44 @@
"url": "https://bugs.php.net/bug.php?id=70976" "url": "https://bugs.php.net/bug.php?id=70976"
}, },
{ {
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", "name": "openSUSE-SU-2016:0251",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731" "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00099.html"
}, },
{ {
"name": "RHSA-2016:2750", "name": "RHSA-2016:2750",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html" "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
}, },
{
"name" : "SSA:2016-034-04",
"refsource" : "SLACKWARE",
"url" : "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.461720"
},
{
"name" : "openSUSE-SU-2016:0366",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-02/msg00037.html"
},
{
"name" : "openSUSE-SU-2016:0251",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-01/msg00099.html"
},
{
"name" : "USN-2952-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2952-1"
},
{ {
"name": "USN-2952-2", "name": "USN-2952-2",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2952-2" "url": "http://www.ubuntu.com/usn/USN-2952-2"
}, },
{ {
"name" : "79916", "name": "SSA:2016-034-04",
"refsource" : "BID", "refsource": "SLACKWARE",
"url" : "http://www.securityfocus.com/bid/79916" "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.461720"
},
{
"name": "[oss-security] 20160115 [CVE Request] Multiple PHP issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/01/14/8"
},
{
"name": "http://www.php.net/ChangeLog-5.php",
"refsource": "CONFIRM",
"url": "http://www.php.net/ChangeLog-5.php"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
},
{
"name": "openSUSE-SU-2016:0366",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00037.html"
}, },
{ {
"name": "1034608", "name": "1034608",

View File

@ -52,26 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20160115 [CVE Request] Multiple PHP issues",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/01/14/8"
},
{ {
"name": "http://www.php.net/ChangeLog-7.php", "name": "http://www.php.net/ChangeLog-7.php",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.php.net/ChangeLog-7.php" "url": "http://www.php.net/ChangeLog-7.php"
}, },
{
"name" : "https://bugs.php.net/bug.php?id=71270",
"refsource" : "CONFIRM",
"url" : "https://bugs.php.net/bug.php?id=71270"
},
{ {
"name": "https://github.com/php/php-src/commit/2871c70efaaaa0f102557a17c727fd4d5204dd4b", "name": "https://github.com/php/php-src/commit/2871c70efaaaa0f102557a17c727fd4d5204dd4b",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/php/php-src/commit/2871c70efaaaa0f102557a17c727fd4d5204dd4b" "url": "https://github.com/php/php-src/commit/2871c70efaaaa0f102557a17c727fd4d5204dd4b"
}, },
{
"name": "[oss-security] 20160115 [CVE Request] Multiple PHP issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/01/14/8"
},
{
"name": "https://bugs.php.net/bug.php?id=71270",
"refsource": "CONFIRM",
"url": "https://bugs.php.net/bug.php?id=71270"
},
{ {
"name": "1034608", "name": "1034608",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-1922", "ID": "CVE-2016-1922",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,21 +57,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/01/16/1" "url": "http://www.openwall.com/lists/oss-security/2016/01/16/1"
}, },
{
"name": "GLSA-201604-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201604-01"
},
{ {
"name": "[oss-security] 20160116 Re: CVE request Qemu: i386: null pointer dereference in vapic_write", "name": "[oss-security] 20160116 Re: CVE request Qemu: i386: null pointer dereference in vapic_write",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/01/16/6" "url": "http://www.openwall.com/lists/oss-security/2016/01/16/6"
}, },
{
"name" : "[qemu-devel] 20160115 [PULL] i386: avoid null pointer dereference",
"refsource" : "MLIST",
"url" : "https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg02812.html"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1283934",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1283934"
},
{ {
"name": "DSA-3469", "name": "DSA-3469",
"refsource": "DEBIAN", "refsource": "DEBIAN",
@ -88,14 +83,19 @@
"url": "http://www.debian.org/security/2016/dsa-3471" "url": "http://www.debian.org/security/2016/dsa-3471"
}, },
{ {
"name" : "GLSA-201604-01", "name": "[qemu-devel] 20160115 [PULL] i386: avoid null pointer dereference",
"refsource" : "GENTOO", "refsource": "MLIST",
"url" : "https://security.gentoo.org/glsa/201604-01" "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg02812.html"
}, },
{ {
"name": "81058", "name": "81058",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/81058" "url": "http://www.securityfocus.com/bid/81058"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1283934",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1283934"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-4469", "ID": "CVE-2016-4469",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20160711 [RCESEC-2016-003][CVE-2016-4469] Apache Archiva 1.3.9 Multiple Cross-Site Request Forgeries", "name": "http://packetstormsecurity.com/files/137869/Apache-Archiva-1.3.9-Cross-Site-Request-Forgery.html",
"refsource" : "BUGTRAQ", "refsource": "MISC",
"url" : "http://www.securityfocus.com/archive/1/538877/100/0/threaded" "url": "http://packetstormsecurity.com/files/137869/Apache-Archiva-1.3.9-Cross-Site-Request-Forgery.html"
},
{
"name" : "40109",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/40109/"
}, },
{ {
"name": "20160712 [RCESEC-2016-003][CVE-2016-4469] Apache Archiva 1.3.9 Multiple Cross-Site Request Forgeries", "name": "20160712 [RCESEC-2016-003][CVE-2016-4469] Apache Archiva 1.3.9 Multiple Cross-Site Request Forgeries",
@ -68,9 +63,14 @@
"url": "http://seclists.org/fulldisclosure/2016/Jul/37" "url": "http://seclists.org/fulldisclosure/2016/Jul/37"
}, },
{ {
"name" : "http://packetstormsecurity.com/files/137869/Apache-Archiva-1.3.9-Cross-Site-Request-Forgery.html", "name": "1036475",
"refsource" : "MISC", "refsource": "SECTRACK",
"url" : "http://packetstormsecurity.com/files/137869/Apache-Archiva-1.3.9-Cross-Site-Request-Forgery.html" "url": "http://www.securitytracker.com/id/1036475"
},
{
"name": "20160711 [RCESEC-2016-003][CVE-2016-4469] Apache Archiva 1.3.9 Multiple Cross-Site Request Forgeries",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/538877/100/0/threaded"
}, },
{ {
"name": "91703", "name": "91703",
@ -78,9 +78,9 @@
"url": "http://www.securityfocus.com/bid/91703" "url": "http://www.securityfocus.com/bid/91703"
}, },
{ {
"name" : "1036475", "name": "40109",
"refsource" : "SECTRACK", "refsource": "EXPLOIT-DB",
"url" : "http://www.securitytracker.com/id/1036475" "url": "https://www.exploit-db.com/exploits/40109/"
} }
] ]
} }

View File

@ -52,25 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20160517 CVE request for vulnerability in OpenStack Keystone",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/05/17/10"
},
{
"name" : "[oss-security] 20160517 Re: CVE request for vulnerability in OpenStack Keystone",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/05/17/11"
},
{ {
"name": "https://bugs.launchpad.net/keystone/+bug/1577558", "name": "https://bugs.launchpad.net/keystone/+bug/1577558",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/keystone/+bug/1577558" "url": "https://bugs.launchpad.net/keystone/+bug/1577558"
}, },
{ {
"name" : "https://review.openstack.org/#/c/311886/", "name": "[oss-security] 20160517 CVE request for vulnerability in OpenStack Keystone",
"refsource" : "CONFIRM", "refsource": "MLIST",
"url" : "https://review.openstack.org/#/c/311886/" "url": "http://www.openwall.com/lists/oss-security/2016/05/17/10"
},
{
"name": "90728",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/90728"
}, },
{ {
"name": "https://security.openstack.org/ossa/OSSA-2016-008.html", "name": "https://security.openstack.org/ossa/OSSA-2016-008.html",
@ -78,9 +73,14 @@
"url": "https://security.openstack.org/ossa/OSSA-2016-008.html" "url": "https://security.openstack.org/ossa/OSSA-2016-008.html"
}, },
{ {
"name" : "90728", "name": "https://review.openstack.org/#/c/311886/",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/90728" "url": "https://review.openstack.org/#/c/311886/"
},
{
"name": "[oss-security] 20160517 Re: CVE request for vulnerability in OpenStack Keystone",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/05/17/11"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-4990", "ID": "CVE-2016-4990",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://www.prevanders.net/dwarfbug.html",
"refsource": "CONFIRM",
"url": "https://www.prevanders.net/dwarfbug.html"
},
{ {
"name": "[oss-security] 20160524 CVE request: Multiple vunerabilities in libdwarf & dwarfdump", "name": "[oss-security] 20160524 CVE request: Multiple vunerabilities in libdwarf & dwarfdump",
"refsource": "MLIST", "refsource": "MLIST",
@ -61,11 +66,6 @@
"name": "[oss-security] 20160524 Re: CVE request: Multiple vunerabilities in libdwarf & dwarfdump", "name": "[oss-security] 20160524 Re: CVE request: Multiple vunerabilities in libdwarf & dwarfdump",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/05/25/1" "url": "http://www.openwall.com/lists/oss-security/2016/05/25/1"
},
{
"name" : "https://www.prevanders.net/dwarfbug.html",
"refsource" : "CONFIRM",
"url" : "https://www.prevanders.net/dwarfbug.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@debian.org",
"ID": "CVE-2016-5839", "ID": "CVE-2016-5839",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,20 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://codex.wordpress.org/Version_4.5.3",
"refsource" : "CONFIRM",
"url" : "https://codex.wordpress.org/Version_4.5.3"
},
{ {
"name": "https://wordpress.org/news/2016/06/wordpress-4-5-3/", "name": "https://wordpress.org/news/2016/06/wordpress-4-5-3/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://wordpress.org/news/2016/06/wordpress-4-5-3/" "url": "https://wordpress.org/news/2016/06/wordpress-4-5-3/"
}, },
{ {
"name" : "DSA-3639", "name": "https://codex.wordpress.org/Version_4.5.3",
"refsource" : "DEBIAN", "refsource": "CONFIRM",
"url" : "http://www.debian.org/security/2016/dsa-3639" "url": "https://codex.wordpress.org/Version_4.5.3"
},
{
"name": "1036163",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036163"
}, },
{ {
"name": "91364", "name": "91364",
@ -73,9 +73,9 @@
"url": "http://www.securityfocus.com/bid/91364" "url": "http://www.securityfocus.com/bid/91364"
}, },
{ {
"name" : "1036163", "name": "DSA-3639",
"refsource" : "SECTRACK", "refsource": "DEBIAN",
"url" : "http://www.securitytracker.com/id/1036163" "url": "http://www.debian.org/security/2016/dsa-3639"
} }
] ]
} }