"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 22:28:20 +00:00
parent 0d21a13a7e
commit 776557b81e
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
61 changed files with 4053 additions and 4053 deletions

View File

@ -52,31 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070417 ShoutPro 1.5.2 - arbitrary code execution",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/466037/100/0/threaded"
},
{ {
"name": "3758", "name": "3758",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3758" "url": "https://www.exploit-db.com/exploits/3758"
}, },
{
"name" : "23542",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23542"
},
{
"name" : "ADV-2007-1432",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1432"
},
{
"name" : "34999",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/34999"
},
{ {
"name": "24939", "name": "24939",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -87,10 +67,30 @@
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2593" "url": "http://securityreason.com/securityalert/2593"
}, },
{
"name": "23542",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23542"
},
{
"name": "34999",
"refsource": "OSVDB",
"url": "http://osvdb.org/34999"
},
{
"name": "20070417 ShoutPro 1.5.2 - arbitrary code execution",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/466037/100/0/threaded"
},
{ {
"name": "shoutpro-shouts-code-execution(33727)", "name": "shoutpro-shouts-code-execution(33727)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33727" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33727"
},
{
"name": "ADV-2007-1432",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1432"
} }
] ]
} }

View File

@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://bugs.mysql.com/bug.php?id=23675",
"refsource" : "MISC",
"url" : "http://bugs.mysql.com/bug.php?id=23675"
},
{ {
"name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html", "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html" "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html"
}, },
{
"name" : "24008",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24008"
},
{
"name" : "ADV-2007-1804",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1804"
},
{ {
"name": "1018071", "name": "1018071",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018071" "url": "http://www.securitytracker.com/id?1018071"
}, },
{ {
"name" : "25301", "name": "ADV-2007-1804",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/25301" "url": "http://www.vupen.com/english/advisories/2007/1804"
},
{
"name": "http://bugs.mysql.com/bug.php?id=23675",
"refsource": "MISC",
"url": "http://bugs.mysql.com/bug.php?id=23675"
}, },
{ {
"name": "mysql-alter-information-disclosure(34349)", "name": "mysql-alter-information-disclosure(34349)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34349" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34349"
},
{
"name": "25301",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25301"
},
{
"name": "24008",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24008"
} }
] ]
} }

View File

@ -53,24 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070820 ZDI-07-049: EMC Legato Networker Remote Exec Service Stack Overflow Vulnerabilities", "name": "3043",
"refsource" : "BUGTRAQ", "refsource": "SREASON",
"url" : "http://www.securityfocus.com/archive/1/477172/100/0/threaded" "url": "http://securityreason.com/securityalert/3043"
}, },
{ {
"name": "http://www.zerodayinitiative.com/advisories/ZDI-07-049.html", "name": "http://www.zerodayinitiative.com/advisories/ZDI-07-049.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-07-049.html" "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-049.html"
}, },
{
"name": "ADV-2007-2931",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2931"
},
{
"name": "20070820 ZDI-07-049: EMC Legato Networker Remote Exec Service Stack Overflow Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/477172/100/0/threaded"
},
{
"name": "26517",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26517"
},
{ {
"name": "25375", "name": "25375",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/25375" "url": "http://www.securityfocus.com/bid/25375"
}, },
{ {
"name" : "ADV-2007-2931", "name": "networker-nsrexecd-bo(36123)",
"refsource" : "VUPEN", "refsource": "XF",
"url" : "http://www.vupen.com/english/advisories/2007/2931" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36123"
}, },
{ {
"name": "39744", "name": "39744",
@ -81,21 +96,6 @@
"name": "1018590", "name": "1018590",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018590" "url": "http://www.securitytracker.com/id?1018590"
},
{
"name" : "26517",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26517"
},
{
"name" : "3043",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/3043"
},
{
"name" : "networker-nsrexecd-bo(36123)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36123"
} }
] ]
} }

View File

@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070711 Cisco Unified Communications Manager and Presence Server Unauthorized Access Vulnerabilities",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/warp/public/707/cisco-sa-20070711-voip.shtml"
},
{
"name" : "24867",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24867"
},
{
"name" : "36124",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/36124"
},
{
"name" : "ADV-2007-2511",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2511"
},
{ {
"name": "1018368", "name": "1018368",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1018368" "url": "http://securitytracker.com/id?1018368"
}, },
{
"name": "20070711 Cisco Unified Communications Manager and Presence Server Unauthorized Access Vulnerabilities",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20070711-voip.shtml"
},
{ {
"name": "26039", "name": "26039",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26039" "url": "http://secunia.com/advisories/26039"
}, },
{
"name": "24867",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24867"
},
{
"name": "ADV-2007-2511",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2511"
},
{ {
"name": "cisco-callmanager-presence-info-disclosure(35344)", "name": "cisco-callmanager-presence-info-disclosure(35344)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35344" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35344"
},
{
"name": "36124",
"refsource": "OSVDB",
"url": "http://osvdb.org/36124"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://lostmon.blogspot.com/2007/07/alstrasoft-multiple-products-multiple.html",
"refsource" : "MISC",
"url" : "http://lostmon.blogspot.com/2007/07/alstrasoft-multiple-products-multiple.html"
},
{ {
"name": "37088", "name": "37088",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/37088" "url": "http://osvdb.org/37088"
},
{
"name": "http://lostmon.blogspot.com/2007/07/alstrasoft-multiple-products-multiple.html",
"refsource": "MISC",
"url": "http://lostmon.blogspot.com/2007/07/alstrasoft-multiple-products-multiple.html"
} }
] ]
} }

View File

@ -52,26 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.hitachi-support.com/security_e/vuls_e/HS07-021_e/index-e.html",
"refsource" : "CONFIRM",
"url" : "http://www.hitachi-support.com/security_e/vuls_e/HS07-021_e/index-e.html"
},
{ {
"name": "25144", "name": "25144",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/25144" "url": "http://www.securityfocus.com/bid/25144"
}, },
{ {
"name" : "ADV-2007-2722", "name": "http://www.hitachi-support.com/security_e/vuls_e/HS07-021_e/index-e.html",
"refsource" : "VUPEN", "refsource": "CONFIRM",
"url" : "http://www.vupen.com/english/advisories/2007/2722" "url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-021_e/index-e.html"
}, },
{ {
"name": "37853", "name": "37853",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/37853" "url": "http://osvdb.org/37853"
}, },
{
"name": "ADV-2007-2722",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2722"
},
{ {
"name": "26242", "name": "26242",
"refsource": "SECUNIA", "refsource": "SECUNIA",

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20071201 PR06-11: BEA Plumtree portal search facility leaks usernames to unauthenticated users",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/484469/100/0/threaded"
},
{ {
"name": "http://procheckup.com/Vulnerability_PR06-11.php", "name": "http://procheckup.com/Vulnerability_PR06-11.php",
"refsource": "MISC", "refsource": "MISC",
"url": "http://procheckup.com/Vulnerability_PR06-11.php" "url": "http://procheckup.com/Vulnerability_PR06-11.php"
}, },
{
"name": "20071201 PR06-11: BEA Plumtree portal search facility leaks usernames to unauthenticated users",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/484469/100/0/threaded"
},
{ {
"name": "26620", "name": "26620",
"refsource": "BID", "refsource": "BID",

View File

@ -63,14 +63,9 @@
"url": "https://www.exploit-db.com/exploits/4705" "url": "https://www.exploit-db.com/exploits/4705"
}, },
{ {
"name" : "26782", "name": "43892",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26782"
},
{
"name" : "43890",
"refsource": "OSVDB", "refsource": "OSVDB",
"url" : "http://osvdb.org/43890" "url": "http://osvdb.org/43892"
}, },
{ {
"name": "43891", "name": "43891",
@ -78,9 +73,14 @@
"url": "http://osvdb.org/43891" "url": "http://osvdb.org/43891"
}, },
{ {
"name" : "43892", "name": "43890",
"refsource": "OSVDB", "refsource": "OSVDB",
"url" : "http://osvdb.org/43892" "url": "http://osvdb.org/43890"
},
{
"name": "26782",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26782"
} }
] ]
} }

View File

@ -52,36 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "28973",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28973"
},
{ {
"name": "20071213 Hosting Controller - Multiple Security Bugs (Extremely Critical)", "name": "20071213 Hosting Controller - Multiple Security Bugs (Extremely Critical)",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/485028/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/485028/100/0/threaded"
}, },
{
"name" : "4730",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4730"
},
{ {
"name": "http://hostingcontroller.com/english/logs/Post-Hotfix-3_3-sec-Patch-ReleaseNotes.html", "name": "http://hostingcontroller.com/english/logs/Post-Hotfix-3_3-sec-Patch-ReleaseNotes.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://hostingcontroller.com/english/logs/Post-Hotfix-3_3-sec-Patch-ReleaseNotes.html" "url": "http://hostingcontroller.com/english/logs/Post-Hotfix-3_3-sec-Patch-ReleaseNotes.html"
}, },
{
"name" : "26862",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26862"
},
{
"name" : "1019222",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1019222"
},
{
"name" : "28973",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28973"
},
{ {
"name": "3474", "name": "3474",
"refsource": "SREASON", "refsource": "SREASON",
@ -92,6 +77,21 @@
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39039" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39039"
}, },
{
"name": "4730",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4730"
},
{
"name": "26862",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26862"
},
{
"name": "1019222",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1019222"
},
{ {
"name": "hostingcontroller-path-info-disclosure(39043)", "name": "hostingcontroller-path-info-disclosure(39043)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2007-12-24",
"refsource" : "CONFIRM",
"url" : "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2007-12-24"
},
{
"name" : "http://jira.atlassian.com/browse/CONF-9560",
"refsource" : "CONFIRM",
"url" : "http://jira.atlassian.com/browse/CONF-9560"
},
{
"name" : "27094",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/27094"
},
{ {
"name": "27095", "name": "27095",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/27095" "url": "http://www.securityfocus.com/bid/27095"
}, },
{
"name": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2007-12-24",
"refsource": "CONFIRM",
"url": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2007-12-24"
},
{ {
"name": "42768", "name": "42768",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/42768" "url": "http://osvdb.org/42768"
}, },
{
"name": "http://jira.atlassian.com/browse/CONF-9560",
"refsource": "CONFIRM",
"url": "http://jira.atlassian.com/browse/CONF-9560"
},
{ {
"name": "27954", "name": "27954",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27954" "url": "http://secunia.com/advisories/27954"
},
{
"name": "27094",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27094"
} }
] ]
} }

View File

@ -53,44 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20090113 CVE Request -- libmikmod", "name": "34259",
"refsource" : "MLIST", "refsource": "SECUNIA",
"url" : "http://openwall.com/lists/oss-security/2009/01/13/2" "url": "http://secunia.com/advisories/34259"
},
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=461519",
"refsource" : "MISC",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=461519"
},
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=422021",
"refsource" : "CONFIRM",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=422021"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=479829",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=479829"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name" : "FEDORA-2009-9095",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01305.html"
},
{
"name" : "FEDORA-2009-9112",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01312.html"
},
{
"name" : "SUSE-SR:2009:006",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html"
}, },
{ {
"name": "33235", "name": "33235",
@ -98,9 +63,44 @@
"url": "http://www.securityfocus.com/bid/33235" "url": "http://www.securityfocus.com/bid/33235"
}, },
{ {
"name" : "34259", "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=422021",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/34259" "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=422021"
},
{
"name": "FEDORA-2009-9095",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01305.html"
},
{
"name": "SUSE-SR:2009:006",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name": "FEDORA-2009-9112",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01312.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=479829",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=479829"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=461519",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=461519"
},
{
"name": "[oss-security] 20090113 CVE Request -- libmikmod",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2009/01/13/2"
} }
] ]
} }

View File

@ -52,20 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://4004securityproject.wordpress.com/2010/02/26/dz-erotik-auktionshaus-v-4-rgo-news-php-sql-injection/",
"refsource" : "MISC",
"url" : "http://4004securityproject.wordpress.com/2010/02/26/dz-erotik-auktionshaus-v-4-rgo-news-php-sql-injection/"
},
{ {
"name": "11582", "name": "11582",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/11582" "url": "http://www.exploit-db.com/exploits/11582"
}, },
{ {
"name" : "62623", "name": "v4rgo-news-sql-injection(56581)",
"refsource" : "OSVDB", "refsource": "XF",
"url" : "http://osvdb.org/62623" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56581"
}, },
{ {
"name": "38792", "name": "38792",
@ -73,9 +68,14 @@
"url": "http://secunia.com/advisories/38792" "url": "http://secunia.com/advisories/38792"
}, },
{ {
"name" : "v4rgo-news-sql-injection(56581)", "name": "62623",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/56581" "url": "http://osvdb.org/62623"
},
{
"name": "http://4004securityproject.wordpress.com/2010/02/26/dz-erotik-auktionshaus-v-4-rgo-news-php-sql-injection/",
"refsource": "MISC",
"url": "http://4004securityproject.wordpress.com/2010/02/26/dz-erotik-auktionshaus-v-4-rgo-news-php-sql-injection/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2010-1393", "ID": "CVE-2010-1393",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,15 +53,40 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://support.apple.com/kb/HT4196", "name": "MDVSA-2011:039",
"refsource" : "CONFIRM", "refsource": "MANDRIVA",
"url" : "http://support.apple.com/kb/HT4196" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:039"
}, },
{ {
"name": "http://support.apple.com/kb/HT4220", "name": "http://support.apple.com/kb/HT4220",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4220" "url": "http://support.apple.com/kb/HT4220"
}, },
{
"name": "ADV-2010-2722",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2722"
},
{
"name": "43068",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43068"
},
{
"name": "USN-1006-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1006-1"
},
{
"name": "41856",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41856"
},
{
"name": "ADV-2011-0212",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0212"
},
{ {
"name": "http://support.apple.com/kb/HT4225", "name": "http://support.apple.com/kb/HT4225",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -72,36 +97,46 @@
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html" "url": "http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html"
}, },
{
"name": "40196",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40196"
},
{
"name": "40105",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40105"
},
{
"name": "ADV-2010-1373",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1373"
},
{ {
"name": "APPLE-SA-2010-06-16-1", "name": "APPLE-SA-2010-06-16-1",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html" "url": "http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html"
}, },
{
"name" : "APPLE-SA-2010-06-21-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html"
},
{
"name" : "MDVSA-2011:039",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:039"
},
{ {
"name": "SUSE-SR:2011:002", "name": "SUSE-SR:2011:002",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
}, },
{ {
"name" : "USN-1006-1", "name": "ADV-2010-1512",
"refsource" : "UBUNTU", "refsource": "VUPEN",
"url" : "http://www.ubuntu.com/usn/USN-1006-1" "url": "http://www.vupen.com/english/advisories/2010/1512"
}, },
{ {
"name": "40620", "name": "40620",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/40620" "url": "http://www.securityfocus.com/bid/40620"
}, },
{
"name": "ADV-2011-0552",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0552"
},
{ {
"name": "oval:org.mitre.oval:def:7346", "name": "oval:org.mitre.oval:def:7346",
"refsource": "OVAL", "refsource": "OVAL",
@ -113,49 +148,14 @@
"url": "http://securitytracker.com/id?1024067" "url": "http://securitytracker.com/id?1024067"
}, },
{ {
"name" : "40105", "name": "http://support.apple.com/kb/HT4196",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/40105" "url": "http://support.apple.com/kb/HT4196"
}, },
{ {
"name" : "40196", "name": "APPLE-SA-2010-06-21-1",
"refsource" : "SECUNIA", "refsource": "APPLE",
"url" : "http://secunia.com/advisories/40196" "url": "http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html"
},
{
"name" : "41856",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/41856"
},
{
"name" : "43068",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43068"
},
{
"name" : "ADV-2010-1373",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1373"
},
{
"name" : "ADV-2010-1512",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1512"
},
{
"name" : "ADV-2010-2722",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/2722"
},
{
"name" : "ADV-2011-0212",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0212"
},
{
"name" : "ADV-2011-0552",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0552"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-1648", "ID": "CVE-2010-1648",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[MediaWiki-announce] 20100528 MediaWiki security update: 1.15.4 and 1.16.0beta3", "name": "FEDORA-2010-10848",
"refsource" : "MLIST", "refsource": "FEDORA",
"url" : "http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-May/000091.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043856.html"
}, },
{ {
"name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=23371", "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=23371",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=23371" "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=23371"
}, },
{
"name": "[MediaWiki-announce] 20100528 MediaWiki security update: 1.15.4 and 1.16.0beta3",
"refsource": "MLIST",
"url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-May/000091.html"
},
{ {
"name": "FEDORA-2010-10779", "name": "FEDORA-2010-10779",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043803.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043803.html"
},
{
"name" : "FEDORA-2010-10848",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043856.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0028", "ID": "CVE-2014-0028",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[libvirt] 20140115 [PATCH 0/4] CVE-2014-0028: domain events vs. ACL filtering", "name": "USN-2093-1",
"refsource" : "MLIST", "refsource": "UBUNTU",
"url" : "https://www.redhat.com/archives/libvir-list/2014-January/msg00684.html" "url": "http://www.ubuntu.com/usn/USN-2093-1"
}, },
{ {
"name": "http://libvirt.org/news.html", "name": "http://libvirt.org/news.html",
@ -63,9 +63,9 @@
"url": "http://libvirt.org/news.html" "url": "http://libvirt.org/news.html"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1048637", "name": "60895",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1048637" "url": "http://secunia.com/advisories/60895"
}, },
{ {
"name": "GLSA-201412-04", "name": "GLSA-201412-04",
@ -78,14 +78,14 @@
"url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00060.html" "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00060.html"
}, },
{ {
"name" : "USN-2093-1", "name": "[libvirt] 20140115 [PATCH 0/4] CVE-2014-0028: domain events vs. ACL filtering",
"refsource" : "UBUNTU", "refsource": "MLIST",
"url" : "http://www.ubuntu.com/usn/USN-2093-1" "url": "https://www.redhat.com/archives/libvir-list/2014-January/msg00684.html"
}, },
{ {
"name" : "60895", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1048637",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/60895" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1048637"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0124", "ID": "CVE-2014-0124",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20140317 Moodle security notifications public",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2014/03/17/1"
},
{ {
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-43916", "name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-43916",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-43916" "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-43916"
}, },
{
"name": "[oss-security] 20140317 Moodle security notifications public",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2014/03/17/1"
},
{ {
"name": "https://moodle.org/mod/forum/discuss.php?d=256421", "name": "https://moodle.org/mod/forum/discuss.php?d=256421",
"refsource": "CONFIRM", "refsource": "CONFIRM",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2014-0505", "ID": "CVE-2014-0505",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2014-0532", "ID": "CVE-2014-0532",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,24 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://helpx.adobe.com/security/products/flash-player/apsb14-16.html", "name": "67973",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://helpx.adobe.com/security/products/flash-player/apsb14-16.html" "url": "http://www.securityfocus.com/bid/67973"
},
{
"name" : "GLSA-201406-17",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201406-17.xml"
},
{
"name" : "RHSA-2014:0745",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0745.html"
},
{
"name" : "SUSE-SU-2014:0806",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00021.html"
}, },
{ {
"name": "openSUSE-SU-2014:0798", "name": "openSUSE-SU-2014:0798",
@ -83,29 +68,19 @@
"url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00030.html" "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00030.html"
}, },
{ {
"name" : "67973", "name": "http://helpx.adobe.com/security/products/flash-player/apsb14-16.html",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/67973" "url": "http://helpx.adobe.com/security/products/flash-player/apsb14-16.html"
}, },
{ {
"name" : "1030368", "name": "RHSA-2014:0745",
"refsource" : "SECTRACK", "refsource": "REDHAT",
"url" : "http://www.securitytracker.com/id/1030368" "url": "http://rhn.redhat.com/errata/RHSA-2014-0745.html"
}, },
{ {
"name" : "58390", "name": "59304",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/58390" "url": "http://secunia.com/advisories/59304"
},
{
"name" : "58465",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/58465"
},
{
"name" : "58585",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/58585"
}, },
{ {
"name": "59053", "name": "59053",
@ -113,9 +88,34 @@
"url": "http://secunia.com/advisories/59053" "url": "http://secunia.com/advisories/59053"
}, },
{ {
"name" : "59304", "name": "58465",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/59304" "url": "http://secunia.com/advisories/58465"
},
{
"name": "1030368",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030368"
},
{
"name": "SUSE-SU-2014:0806",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00021.html"
},
{
"name": "58585",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/58585"
},
{
"name": "58390",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/58390"
},
{
"name": "GLSA-201406-17",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201406-17.xml"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2014-1544", "ID": "CVE-2014-1544",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,85 +52,85 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2014/mfsa2014-63.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2014/mfsa2014-63.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=963150",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=963150"
},
{ {
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
}, },
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name" : "DSA-2986",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-2986"
},
{
"name" : "DSA-2996",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-2996"
},
{
"name" : "GLSA-201504-01",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201504-01"
},
{
"name" : "68816",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/68816"
},
{
"name" : "1030617",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030617"
},
{
"name" : "59591",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59591"
},
{ {
"name": "59719", "name": "59719",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59719" "url": "http://secunia.com/advisories/59719"
}, },
{ {
"name" : "59760", "name": "60083",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/59760" "url": "http://secunia.com/advisories/60083"
}, },
{ {
"name" : "60486", "name": "68816",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/60486" "url": "http://www.securityfocus.com/bid/68816"
},
{
"name": "http://www.mozilla.org/security/announce/2014/mfsa2014-63.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2014/mfsa2014-63.html"
}, },
{ {
"name": "60621", "name": "60621",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60621" "url": "http://secunia.com/advisories/60621"
}, },
{
"name": "GLSA-201504-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201504-01"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name": "1030617",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030617"
},
{
"name": "DSA-2996",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2996"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=963150",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=963150"
},
{
"name": "60486",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60486"
},
{ {
"name": "60628", "name": "60628",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60628" "url": "http://secunia.com/advisories/60628"
}, },
{ {
"name" : "60083", "name": "DSA-2986",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2986"
},
{
"name": "59760",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/60083" "url": "http://secunia.com/advisories/59760"
},
{
"name": "59591",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59591"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2014-1569", "ID": "CVE-2014-1569",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,41 +52,61 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.intelsecurity.com/resources/wp-berserk-analysis-part-1.pdf",
"refsource" : "MISC",
"url" : "http://www.intelsecurity.com/resources/wp-berserk-analysis-part-1.pdf"
},
{
"name" : "https://www.imperialviolet.org/2014/09/26/pkcs1.html",
"refsource" : "MISC",
"url" : "https://www.imperialviolet.org/2014/09/26/pkcs1.html"
},
{
"name" : "https://www.reddit.com/r/netsec/comments/2hd1m8/rsa_signature_forgery_in_nss/cksnr02",
"refsource" : "MISC",
"url" : "https://www.reddit.com/r/netsec/comments/2hd1m8/rsa_signature_forgery_in_nss/cksnr02"
},
{ {
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1064670", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1064670",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1064670" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1064670"
}, },
{ {
"name" : "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.17.3_release_notes", "name": "openSUSE-SU-2015:0138",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.17.3_release_notes" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"
}, },
{ {
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", "name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
}, },
{
"name": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.17.3_release_notes",
"refsource": "CONFIRM",
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.17.3_release_notes"
},
{
"name": "http://www.intelsecurity.com/resources/wp-berserk-analysis-part-1.pdf",
"refsource": "MISC",
"url": "http://www.intelsecurity.com/resources/wp-berserk-analysis-part-1.pdf"
},
{
"name": "1032909",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032909"
},
{ {
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
}, },
{
"name": "SUSE-SU-2015:0173",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html"
},
{
"name": "SUSE-SU-2015:0171",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html"
},
{
"name": "https://www.imperialviolet.org/2014/09/26/pkcs1.html",
"refsource": "MISC",
"url": "https://www.imperialviolet.org/2014/09/26/pkcs1.html"
},
{
"name": "openSUSE-SU-2015:0404",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html"
},
{ {
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -98,34 +118,14 @@
"url": "http://www.debian.org/security/2015/dsa-3186" "url": "http://www.debian.org/security/2015/dsa-3186"
}, },
{ {
"name" : "SUSE-SU-2015:0171", "name": "https://www.reddit.com/r/netsec/comments/2hd1m8/rsa_signature_forgery_in_nss/cksnr02",
"refsource" : "SUSE", "refsource": "MISC",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html" "url": "https://www.reddit.com/r/netsec/comments/2hd1m8/rsa_signature_forgery_in_nss/cksnr02"
},
{
"name" : "SUSE-SU-2015:0173",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html"
}, },
{ {
"name": "SUSE-SU-2015:0180", "name": "SUSE-SU-2015:0180",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html"
},
{
"name" : "openSUSE-SU-2015:0138",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"
},
{
"name" : "openSUSE-SU-2015:0404",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html"
},
{
"name" : "1032909",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1032909"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2014-1581", "ID": "CVE-2014-1581",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,79 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.mozilla.org/security/announce/2014/mfsa2014-79.html", "name": "62021",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://www.mozilla.org/security/announce/2014/mfsa2014-79.html" "url": "http://secunia.com/advisories/62021"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1068218",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1068218"
},
{
"name" : "https://advisories.mageia.org/MGASA-2014-0421.html",
"refsource" : "CONFIRM",
"url" : "https://advisories.mageia.org/MGASA-2014-0421.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
},
{
"name" : "DSA-3050",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-3050"
},
{
"name" : "DSA-3061",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-3061"
},
{
"name" : "FEDORA-2014-13042",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html"
},
{
"name" : "FEDORA-2014-14084",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html"
},
{
"name" : "GLSA-201504-01",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201504-01"
},
{
"name" : "RHSA-2014:1635",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1635.html"
},
{
"name" : "RHSA-2014:1647",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1647.html"
},
{
"name" : "openSUSE-SU-2014:1343",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html"
},
{
"name" : "openSUSE-SU-2014:1346",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html"
},
{
"name" : "openSUSE-SU-2014:1344",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html"
},
{
"name" : "openSUSE-SU-2014:1345",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html"
}, },
{ {
"name": "openSUSE-SU-2015:0138", "name": "openSUSE-SU-2015:0138",
@ -133,24 +63,19 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"
}, },
{ {
"name" : "openSUSE-SU-2015:1266", "name": "openSUSE-SU-2014:1344",
"refsource": "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html"
}, },
{ {
"name" : "USN-2372-1", "name": "openSUSE-SU-2014:1346",
"refsource" : "UBUNTU", "refsource": "SUSE",
"url" : "http://www.ubuntu.com/usn/USN-2372-1" "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html"
}, },
{ {
"name" : "USN-2373-1", "name": "FEDORA-2014-13042",
"refsource" : "UBUNTU", "refsource": "FEDORA",
"url" : "http://www.ubuntu.com/usn/USN-2373-1" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html"
},
{
"name" : "70426",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/70426"
}, },
{ {
"name": "1031028", "name": "1031028",
@ -158,9 +83,44 @@
"url": "http://www.securitytracker.com/id/1031028" "url": "http://www.securitytracker.com/id/1031028"
}, },
{ {
"name" : "1031030", "name": "openSUSE-SU-2014:1345",
"refsource" : "SECTRACK", "refsource": "SUSE",
"url" : "http://www.securitytracker.com/id/1031030" "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html"
},
{
"name": "USN-2373-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2373-1"
},
{
"name": "https://advisories.mageia.org/MGASA-2014-0421.html",
"refsource": "CONFIRM",
"url": "https://advisories.mageia.org/MGASA-2014-0421.html"
},
{
"name": "GLSA-201504-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201504-01"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1068218",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1068218"
},
{
"name": "RHSA-2014:1635",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1635.html"
},
{
"name": "FEDORA-2014-14084",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html"
},
{
"name": "RHSA-2014:1647",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1647.html"
}, },
{ {
"name": "61387", "name": "61387",
@ -168,24 +128,64 @@
"url": "http://secunia.com/advisories/61387" "url": "http://secunia.com/advisories/61387"
}, },
{ {
"name" : "61854", "name": "USN-2372-1",
"refsource" : "SECUNIA", "refsource": "UBUNTU",
"url" : "http://secunia.com/advisories/61854" "url": "http://www.ubuntu.com/usn/USN-2372-1"
}, },
{ {
"name" : "62021", "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/62021" "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
}, },
{ {
"name": "62022", "name": "62022",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62022" "url": "http://secunia.com/advisories/62022"
}, },
{
"name": "70426",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/70426"
},
{
"name": "openSUSE-SU-2015:1266",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"
},
{
"name": "1031030",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031030"
},
{ {
"name": "62023", "name": "62023",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62023" "url": "http://secunia.com/advisories/62023"
},
{
"name": "openSUSE-SU-2014:1343",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html"
},
{
"name": "http://www.mozilla.org/security/announce/2014/mfsa2014-79.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2014/mfsa2014-79.html"
},
{
"name": "DSA-3050",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-3050"
},
{
"name": "61854",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61854"
},
{
"name": "DSA-3061",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-3061"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2014-5423", "ID": "CVE-2014-5423",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -53,35 +53,35 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "34451", "name": "http://packetstormsecurity.com/files/128031/PhpWiki-Ploticus-Command-Injection.html",
"refsource" : "EXPLOIT-DB", "refsource": "MISC",
"url" : "http://www.exploit-db.com/exploits/34451" "url": "http://packetstormsecurity.com/files/128031/PhpWiki-Ploticus-Command-Injection.html"
},
{
"name" : "20140827 PHP-Wiki Command Injection",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Aug/77"
},
{
"name" : "[oss-security] 20140827 PHP-Wiki Command Injection",
"refsource" : "MLIST",
"url" : "http://seclists.org/oss-sec/2014/q3/456"
}, },
{ {
"name": "[oss-security] 20140829 Re: PHP-Wiki Command Injection", "name": "[oss-security] 20140829 Re: PHP-Wiki Command Injection",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2014/q3/465" "url": "http://seclists.org/oss-sec/2014/q3/465"
}, },
{
"name" : "http://packetstormsecurity.com/files/128031/PhpWiki-Ploticus-Command-Injection.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/128031/PhpWiki-Ploticus-Command-Injection.html"
},
{ {
"name": "110576", "name": "110576",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/show/osvdb/110576" "url": "http://osvdb.org/show/osvdb/110576"
}, },
{
"name": "34451",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/34451"
},
{
"name": "[oss-security] 20140827 PHP-Wiki Command Injection",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2014/q3/456"
},
{
"name": "20140827 PHP-Wiki Command Injection",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Aug/77"
},
{ {
"name": "60293", "name": "60293",
"refsource": "SECUNIA", "refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5525", "ID": "CVE-2014-5525",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#582497", "name": "VU#582497",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
}, },
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#935465", "name": "VU#935465",
"refsource": "CERT-VN", "refsource": "CERT-VN",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5683", "ID": "CVE-2014-5683",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#188697", "name": "VU#188697",
"refsource": "CERT-VN", "refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497", "name": "VU#582497",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5802", "ID": "CVE-2014-5802",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "name": "VU#726113",
"refsource" : "MISC", "refsource": "CERT-VN",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" "url": "http://www.kb.cert.org/vuls/id/726113"
}, },
{ {
"name": "VU#582497", "name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
}, },
{ {
"name" : "VU#726113", "name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "CERT-VN", "refsource": "MISC",
"url" : "http://www.kb.cert.org/vuls/id/726113" "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20150310 ProjectSend r561 - SQL injection vulnerability", "name": "http://www.itas.vn/news/itas-team-found-out-a-SQL-Injection-vulnerability-in-projectsend-r561-76.html",
"refsource" : "BUGTRAQ", "refsource": "MISC",
"url" : "http://www.securityfocus.com/archive/1/534832/100/0/threaded" "url": "http://www.itas.vn/news/itas-team-found-out-a-SQL-Injection-vulnerability-in-projectsend-r561-76.html"
}, },
{ {
"name": "36303", "name": "36303",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/36303" "url": "http://www.exploit-db.com/exploits/36303"
}, },
{
"name" : "20150305 ProjectSend r561 - SQL injection vulnerability",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2015/Mar/30"
},
{ {
"name": "http://packetstormsecurity.com/files/130691/ProjectSend-r561-SQL-Injection.html", "name": "http://packetstormsecurity.com/files/130691/ProjectSend-r561-SQL-Injection.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/130691/ProjectSend-r561-SQL-Injection.html" "url": "http://packetstormsecurity.com/files/130691/ProjectSend-r561-SQL-Injection.html"
}, },
{ {
"name" : "http://www.itas.vn/news/itas-team-found-out-a-SQL-Injection-vulnerability-in-projectsend-r561-76.html", "name": "20150305 ProjectSend r561 - SQL injection vulnerability",
"refsource" : "MISC", "refsource": "FULLDISC",
"url" : "http://www.itas.vn/news/itas-team-found-out-a-SQL-Injection-vulnerability-in-projectsend-r561-76.html" "url": "http://seclists.org/fulldisclosure/2015/Mar/30"
},
{
"name": "20150310 ProjectSend r561 - SQL injection vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/534832/100/0/threaded"
}, },
{ {
"name": "119169", "name": "119169",

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://github.com/atutor/ATutor/releases/tag/atutor_2_2_2",
"refsource" : "MISC",
"url" : "https://github.com/atutor/ATutor/releases/tag/atutor_2_2_2"
},
{ {
"name": "https://www.htbridge.com/advisory/HTB23297", "name": "https://www.htbridge.com/advisory/HTB23297",
"refsource": "MISC", "refsource": "MISC",
"url": "https://www.htbridge.com/advisory/HTB23297" "url": "https://www.htbridge.com/advisory/HTB23297"
},
{
"name": "https://github.com/atutor/ATutor/releases/tag/atutor_2_2_2",
"refsource": "MISC",
"url": "https://github.com/atutor/ATutor/releases/tag/atutor_2_2_2"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20160622 Open-Xchange Security Advisory 2016-06-22", "name": "1036157",
"refsource" : "BUGTRAQ", "refsource": "SECTRACK",
"url" : "http://www.securityfocus.com/archive/1/538732/100/0/threaded" "url": "http://www.securitytracker.com/id/1036157"
}, },
{ {
"name": "http://packetstormsecurity.com/files/137599/Open-Xchange-App-Suite-7.8.1-Information-Disclosure.html", "name": "http://packetstormsecurity.com/files/137599/Open-Xchange-App-Suite-7.8.1-Information-Disclosure.html",
@ -63,9 +63,9 @@
"url": "http://packetstormsecurity.com/files/137599/Open-Xchange-App-Suite-7.8.1-Information-Disclosure.html" "url": "http://packetstormsecurity.com/files/137599/Open-Xchange-App-Suite-7.8.1-Information-Disclosure.html"
}, },
{ {
"name" : "1036157", "name": "20160622 Open-Xchange Security Advisory 2016-06-22",
"refsource" : "SECTRACK", "refsource": "BUGTRAQ",
"url" : "http://www.securitytracker.com/id/1036157" "url": "http://www.securityfocus.com/archive/1/538732/100/0/threaded"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4228", "ID": "CVE-2016-4228",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,35 +53,15 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "40309", "name": "SUSE-SU-2016:1826",
"refsource" : "EXPLOIT-DB", "refsource": "SUSE",
"url" : "https://www.exploit-db.com/exploits/40309/" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html"
},
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html"
}, },
{ {
"name": "GLSA-201607-03", "name": "GLSA-201607-03",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201607-03" "url": "https://security.gentoo.org/glsa/201607-03"
}, },
{
"name" : "MS16-093",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-093"
},
{
"name" : "RHSA-2016:1423",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1423"
},
{
"name" : "SUSE-SU-2016:1826",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html"
},
{ {
"name": "openSUSE-SU-2016:1802", "name": "openSUSE-SU-2016:1802",
"refsource": "SUSE", "refsource": "SUSE",
@ -92,6 +72,26 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/91719" "url": "http://www.securityfocus.com/bid/91719"
}, },
{
"name": "40309",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40309/"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html"
},
{
"name": "RHSA-2016:1423",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1423"
},
{
"name": "MS16-093",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-093"
},
{ {
"name": "1036280", "name": "1036280",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2016-4325", "ID": "CVE-2016-4325",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-4659", "ID": "CVE-2016-4659",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,15 +53,70 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20160515 Re: CVE Requests: Linux: use-after-free issue for ppp channel", "name": "SUSE-SU-2016:1690",
"refsource" : "MLIST", "refsource": "SUSE",
"url" : "http://www.openwall.com/lists/oss-security/2016/05/15/2" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
},
{
"name": "SUSE-SU-2016:1985",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html"
},
{
"name": "openSUSE-SU-2016:2184",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html"
},
{
"name": "USN-3021-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3021-2"
}, },
{ {
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1f461dcdd296eecedaffffc6bae2bfa90bd7eb89", "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1f461dcdd296eecedaffffc6bae2bfa90bd7eb89",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1f461dcdd296eecedaffffc6bae2bfa90bd7eb89" "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1f461dcdd296eecedaffffc6bae2bfa90bd7eb89"
}, },
{
"name": "https://github.com/torvalds/linux/commit/1f461dcdd296eecedaffffc6bae2bfa90bd7eb89",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/1f461dcdd296eecedaffffc6bae2bfa90bd7eb89"
},
{
"name": "openSUSE-SU-2016:1641",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html"
},
{
"name": "DSA-3607",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3607"
},
{
"name": "1036763",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036763"
},
{
"name": "[oss-security] 20160515 Re: CVE Requests: Linux: use-after-free issue for ppp channel",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/05/15/2"
},
{
"name": "SUSE-SU-2016:1672",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html"
},
{
"name": "USN-3021-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3021-1"
},
{ {
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.2", "name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.2",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -72,80 +127,25 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335803" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335803"
}, },
{
"name" : "https://github.com/torvalds/linux/commit/1f461dcdd296eecedaffffc6bae2bfa90bd7eb89",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/1f461dcdd296eecedaffffc6bae2bfa90bd7eb89"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
},
{ {
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html", "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html" "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html"
}, },
{
"name" : "DSA-3607",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3607"
},
{
"name" : "SUSE-SU-2016:1672",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html"
},
{
"name" : "SUSE-SU-2016:1690",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html"
},
{
"name" : "SUSE-SU-2016:1937",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html"
},
{
"name" : "openSUSE-SU-2016:1641",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html"
},
{
"name" : "SUSE-SU-2016:1985",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html"
},
{ {
"name": "SUSE-SU-2016:2105", "name": "SUSE-SU-2016:2105",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html"
}, },
{
"name" : "openSUSE-SU-2016:2184",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html"
},
{
"name" : "USN-3021-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3021-1"
},
{
"name" : "USN-3021-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3021-2"
},
{ {
"name": "90605", "name": "90605",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/90605" "url": "http://www.securityfocus.com/bid/90605"
}, },
{ {
"name" : "1036763", "name": "SUSE-SU-2016:1937",
"refsource" : "SECTRACK", "refsource": "SUSE",
"url" : "http://www.securitytracker.com/id/1036763" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-4936", "ID": "CVE-2016-4936",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-4996", "ID": "CVE-2016-4996",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1349136",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1349136"
},
{ {
"name": "RHSA-2018:0336", "name": "RHSA-2018:0336",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0336" "url": "https://access.redhat.com/errata/RHSA-2018:0336"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1349136",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349136"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-8258", "ID": "CVE-2016-8258",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -58,6 +58,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c05356363" "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c05356363"
}, },
{
"name": "1037485",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037485"
},
{ {
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722", "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -67,11 +72,6 @@
"name": "94949", "name": "94949",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/94949" "url": "http://www.securityfocus.com/bid/94949"
},
{
"name" : "1037485",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1037485"
} }
] ]
} }

View File

@ -57,6 +57,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/11/29/7" "url": "http://www.openwall.com/lists/oss-security/2016/11/29/7"
}, },
{
"name": "94589",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94589"
},
{ {
"name": "RHSA-2017:0559", "name": "RHSA-2017:0559",
"refsource": "REDHAT", "refsource": "REDHAT",
@ -66,11 +71,6 @@
"name": "RHSA-2017:0838", "name": "RHSA-2017:0838",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0838.html" "url": "http://rhn.redhat.com/errata/RHSA-2017-0838.html"
},
{
"name" : "94589",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/94589"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.securityfocus.com/archive/1/539983/30/0/threaded",
"refsource" : "CONFIRM",
"url" : "http://www.securityfocus.com/archive/1/539983/30/0/threaded"
},
{ {
"name": "95303", "name": "95303",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/95303" "url": "http://www.securityfocus.com/bid/95303"
},
{
"name": "http://www.securityfocus.com/archive/1/539983/30/0/threaded",
"refsource": "CONFIRM",
"url": "http://www.securityfocus.com/archive/1/539983/30/0/threaded"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.securityfocus.com/archive/1/540060/30/0/threaded" "url": "http://www.securityfocus.com/archive/1/540060/30/0/threaded"
}, },
{
"name" : "95824",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/95824"
},
{ {
"name": "1037733", "name": "1037733",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037733" "url": "http://www.securitytracker.com/id/1037733"
},
{
"name": "95824",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95824"
} }
] ]
} }

View File

@ -53,11 +53,31 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "106690",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106690"
},
{
"name": "USN-3863-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3863-1/"
},
{
"name": "USN-3863-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3863-2/"
},
{ {
"name": "[debian-lts-announce] 20190122 [SECURITY] [DLA 1637-1] apt security update", "name": "[debian-lts-announce] 20190122 [SECURITY] [DLA 1637-1] apt security update",
"refsource": "MLIST", "refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00013.html" "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00013.html"
}, },
{
"name": "DSA-4371",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2019/dsa-4371"
},
{ {
"name": "[debian-lts-announce] 20190122 [SECURITY] [DLA 1637-1] apt security update (amended)", "name": "[debian-lts-announce] 20190122 [SECURITY] [DLA 1637-1] apt security update (amended)",
"refsource": "MLIST", "refsource": "MLIST",
@ -67,26 +87,6 @@
"name": "https://security.netapp.com/advisory/ntap-20190125-0002/", "name": "https://security.netapp.com/advisory/ntap-20190125-0002/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20190125-0002/" "url": "https://security.netapp.com/advisory/ntap-20190125-0002/"
},
{
"name" : "DSA-4371",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2019/dsa-4371"
},
{
"name" : "USN-3863-2",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3863-2/"
},
{
"name" : "USN-3863-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3863-1/"
},
{
"name" : "106690",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/106690"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://github.com/Boolector/boolector/issues/28",
"refsource" : "MISC",
"url" : "https://github.com/Boolector/boolector/issues/28"
},
{ {
"name": "https://github.com/Boolector/boolector/issues/29", "name": "https://github.com/Boolector/boolector/issues/29",
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/Boolector/boolector/issues/29" "url": "https://github.com/Boolector/boolector/issues/29"
},
{
"name": "https://github.com/Boolector/boolector/issues/28",
"refsource": "MISC",
"url": "https://github.com/Boolector/boolector/issues/28"
} }
] ]
} }