"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 03:49:46 +00:00
parent 2103e84fc4
commit 7cb87a7e7c
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
65 changed files with 3911 additions and 3911 deletions

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-1999-0621", "ID": "CVE-1999-0621",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20000613 SmartFTP Daemon v0.2 Beta Build 9 - Remote Exploit",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-06/0100.html"
},
{ {
"name": "1344", "name": "1344",
"refsource": "BID", "refsource": "BID",
@ -71,6 +66,11 @@
"name": "1394", "name": "1394",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/1394" "url": "http://www.osvdb.org/1394"
},
{
"name": "20000613 SmartFTP Daemon v0.2 Beta Build 9 - Remote Exploit",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0100.html"
} }
] ]
} }

View File

@ -52,45 +52,45 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20000624 Possible root exploit in ISC DHCP client.",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-06/0247.html"
},
{ {
"name": "20000628 dhcp client: remote root exploit in dhcp client", "name": "20000628 dhcp client: remote root exploit in dhcp client",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2000/20000628" "url": "http://www.debian.org/security/2000/20000628"
}, },
{
"name" : "FreeBSD-SA-00:34",
"refsource" : "FREEBSD",
"url" : "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:34.dhclient.asc"
},
{
"name" : "20000702 [Security Announce] dhcp update",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-07/0014.html"
},
{
"name" : "20000711 Security Hole in dhclient < 2.0",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/suse_security_announce_56.html"
},
{ {
"name": "NetBSD-SA2000-008", "name": "NetBSD-SA2000-008",
"refsource": "NETBSD", "refsource": "NETBSD",
"url": "ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-008.txt.asc" "url": "ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-008.txt.asc"
}, },
{ {
"name" : "1388", "name": "20000702 [Security Announce] dhcp update",
"refsource" : "BID", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/bid/1388" "url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0014.html"
},
{
"name": "20000624 Possible root exploit in ISC DHCP client.",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0247.html"
}, },
{ {
"name": "openbsd-isc-dhcp(4772)", "name": "openbsd-isc-dhcp(4772)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4772" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4772"
},
{
"name": "FreeBSD-SA-00:34",
"refsource": "FREEBSD",
"url": "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:34.dhclient.asc"
},
{
"name": "20000711 Security Hole in dhclient < 2.0",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/suse_security_announce_56.html"
},
{
"name": "1388",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/1388"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1401",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/1401"
},
{ {
"name": "20000626 Glftpd privpath bugs... +fix", "name": "20000626 Glftpd privpath bugs... +fix",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -61,11 +66,6 @@
"name": "20000627 Re: Glftpd privpath bugs... +fix", "name": "20000627 Re: Glftpd privpath bugs... +fix",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0317.html" "url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0317.html"
},
{
"name" : "1401",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/1401"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "mssql-procedure-perms(4921)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4921"
},
{ {
"name": "MS00-048", "name": "MS00-048",
"refsource": "MS", "refsource": "MS",
@ -61,11 +66,6 @@
"name": "1444", "name": "1444",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/1444" "url": "http://www.securityfocus.com/bid/1444"
},
{
"name" : "mssql-procedure-perms(4921)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/4921"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html" "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html"
}, },
{
"name" : "1872",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/1872"
},
{ {
"name": "samba-swat-logging-sym-link(5443)", "name": "samba-swat-logging-sym-link(5443)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5443" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5443"
},
{
"name": "1872",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/1872"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20050629 WordPress 1.5.1.2 && Earlier Multiple Vulnerabilities", "name": "15831",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://marc.info/?l=bugtraq&m=112006967221438&w=2" "url": "http://secunia.com/advisories/15831"
}, },
{ {
"name": "http://www.gulftech.org/?node=research&article_id=00085-06282005", "name": "http://www.gulftech.org/?node=research&article_id=00085-06282005",
@ -63,9 +63,9 @@
"url": "http://www.gulftech.org/?node=research&article_id=00085-06282005" "url": "http://www.gulftech.org/?node=research&article_id=00085-06282005"
}, },
{ {
"name" : "15831", "name": "20050629 WordPress 1.5.1.2 && Earlier Multiple Vulnerabilities",
"refsource" : "SECUNIA", "refsource": "BUGTRAQ",
"url" : "http://secunia.com/advisories/15831" "url": "http://marc.info/?l=bugtraq&m=112006967221438&w=2"
} }
] ]
} }

View File

@ -62,15 +62,15 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/14537" "url": "http://www.securityfocus.com/bid/14537"
}, },
{
"name" : "ADV-2005-1365",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2005/1365"
},
{ {
"name": "16388", "name": "16388",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/16388" "url": "http://secunia.com/advisories/16388"
},
{
"name": "ADV-2005-1365",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/1365"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2007-1323", "ID": "CVE-2007-1323",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-1355", "ID": "CVE-2007-1355",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,76 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070519 [CVE-2007-1355] Tomcat documentation XSS vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/469067/100/0/threaded"
},
{
"name" : "20090127 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities (Updated - v1.1)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/500412/100/0/threaded"
},
{
"name" : "20090124 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/500396/100/0/threaded"
},
{ {
"name": "http://tomcat.apache.org/security-4.html", "name": "http://tomcat.apache.org/security-4.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-4.html" "url": "http://tomcat.apache.org/security-4.html"
}, },
{ {
"name" : "http://tomcat.apache.org/security-5.html", "name": "30908",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://tomcat.apache.org/security-5.html" "url": "http://secunia.com/advisories/30908"
},
{
"name" : "http://tomcat.apache.org/security-6.html",
"refsource" : "CONFIRM",
"url" : "http://tomcat.apache.org/security-6.html"
}, },
{ {
"name": "http://support.apple.com/kb/HT2163", "name": "http://support.apple.com/kb/HT2163",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT2163" "url": "http://support.apple.com/kb/HT2163"
}, },
{
"name" : "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx",
"refsource" : "CONFIRM",
"url" : "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx"
},
{
"name" : "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540",
"refsource" : "CONFIRM",
"url" : "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540"
},
{
"name" : "APPLE-SA-2008-06-30",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"
},
{
"name" : "FEDORA-2007-3456",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html"
},
{
"name" : "HPSBUX02262",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
},
{
"name" : "SSRT071447",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
},
{
"name" : "RHSA-2008:0261",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0261.html"
},
{ {
"name": "RHSA-2008:0630", "name": "RHSA-2008:0630",
"refsource": "REDHAT", "refsource": "REDHAT",
@ -132,85 +77,140 @@
"refsource": "SUNALERT", "refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1" "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1"
}, },
{
"name" : "24058",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24058"
},
{
"name" : "34875",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/34875"
},
{ {
"name": "oval:org.mitre.oval:def:6111", "name": "oval:org.mitre.oval:def:6111",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6111" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6111"
}, },
{
"name" : "ADV-2007-3386",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3386"
},
{ {
"name": "ADV-2008-1981", "name": "ADV-2008-1981",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1981/references" "url": "http://www.vupen.com/english/advisories/2008/1981/references"
}, },
{
"name" : "ADV-2008-1979",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/1979/references"
},
{
"name" : "ADV-2009-0233",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/0233"
},
{
"name" : "27037",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27037"
},
{
"name" : "27727",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27727"
},
{
"name" : "30802",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30802"
},
{
"name" : "30908",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30908"
},
{ {
"name": "30899", "name": "30899",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30899" "url": "http://secunia.com/advisories/30899"
}, },
{
"name": "FEDORA-2007-3456",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html"
},
{ {
"name": "31493", "name": "31493",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31493" "url": "http://secunia.com/advisories/31493"
}, },
{
"name": "ADV-2008-1979",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1979/references"
},
{
"name": "34875",
"refsource": "OSVDB",
"url": "http://osvdb.org/34875"
},
{
"name": "20090127 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities (Updated - v1.1)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/500412/100/0/threaded"
},
{ {
"name": "33668", "name": "33668",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33668" "url": "http://secunia.com/advisories/33668"
}, },
{
"name": "20090124 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/500396/100/0/threaded"
},
{ {
"name": "2722", "name": "2722",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2722" "url": "http://securityreason.com/securityalert/2722"
}, },
{
"name": "APPLE-SA-2008-06-30",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"
},
{
"name": "24058",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24058"
},
{
"name": "ADV-2009-0233",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0233"
},
{
"name": "http://tomcat.apache.org/security-6.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"name": "ADV-2007-3386",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3386"
},
{
"name": "30802",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30802"
},
{
"name": "27037",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27037"
},
{
"name": "SSRT071447",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
},
{
"name": "27727",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27727"
},
{
"name": "HPSBUX02262",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
},
{
"name": "http://tomcat.apache.org/security-5.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"name": "20070519 [CVE-2007-1355] Tomcat documentation XSS vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/469067/100/0/threaded"
},
{
"name": "RHSA-2008:0261",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0261.html"
},
{ {
"name": "tomcat-hello-xss(34377)", "name": "tomcat-hello-xss(34377)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34377" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34377"
},
{
"name": "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx",
"refsource": "CONFIRM",
"url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx"
},
{
"name": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540",
"refsource": "CONFIRM",
"url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540"
} }
] ]
} }

View File

@ -52,30 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[ANNOUNCE] 20070907 balsa-2.3.20 released",
"refsource" : "MLIST",
"url" : "http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html"
},
{
"name" : "http://bugzilla.gnome.org/show_bug.cgi?id=474366",
"refsource" : "CONFIRM",
"url" : "http://bugzilla.gnome.org/show_bug.cgi?id=474366"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=297581",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=297581"
},
{ {
"name": "http://bugs.gentoo.org/show_bug.cgi?id=193179", "name": "http://bugs.gentoo.org/show_bug.cgi?id=193179",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=193179" "url": "http://bugs.gentoo.org/show_bug.cgi?id=193179"
}, },
{ {
"name" : "GLSA-200710-17", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=297581",
"refsource" : "GENTOO", "refsource": "CONFIRM",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=297581"
}, },
{ {
"name": "SUSE-SR:2007:019", "name": "SUSE-SR:2007:019",
@ -88,29 +73,44 @@
"url": "http://www.securityfocus.com/bid/25777" "url": "http://www.securityfocus.com/bid/25777"
}, },
{ {
"name" : "ADV-2007-3263", "name": "http://bugzilla.gnome.org/show_bug.cgi?id=474366",
"refsource" : "VUPEN", "refsource": "CONFIRM",
"url" : "http://www.vupen.com/english/advisories/2007/3263" "url": "http://bugzilla.gnome.org/show_bug.cgi?id=474366"
},
{
"name" : "40585",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/40585"
},
{
"name" : "26947",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26947"
}, },
{ {
"name": "26987", "name": "26987",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26987" "url": "http://secunia.com/advisories/26987"
}, },
{
"name": "[ANNOUNCE] 20070907 balsa-2.3.20 released",
"refsource": "MLIST",
"url": "http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html"
},
{
"name": "ADV-2007-3263",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3263"
},
{ {
"name": "27272", "name": "27272",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27272" "url": "http://secunia.com/advisories/27272"
},
{
"name": "40585",
"refsource": "OSVDB",
"url": "http://osvdb.org/40585"
},
{
"name": "GLSA-200710-17",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml"
},
{
"name": "26947",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26947"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://research.eeye.com/html/advisories/upcoming/20071024.html",
"refsource" : "MISC",
"url" : "http://research.eeye.com/html/advisories/upcoming/20071024.html"
},
{ {
"name": "26210", "name": "26210",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/26210" "url": "http://www.securityfocus.com/bid/26210"
},
{
"name": "http://research.eeye.com/html/advisories/upcoming/20071024.html",
"refsource": "MISC",
"url": "http://research.eeye.com/html/advisories/upcoming/20071024.html"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "HPSBUX02285",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01241483"
},
{
"name" : "SSRT071484",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01241483"
},
{ {
"name": "26383", "name": "26383",
"refsource": "BID", "refsource": "BID",
@ -72,25 +62,35 @@
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5548" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5548"
}, },
{
"name" : "ADV-2007-3820",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3820"
},
{ {
"name": "1018925", "name": "1018925",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1018925" "url": "http://securitytracker.com/id?1018925"
}, },
{ {
"name" : "27606", "name": "SSRT071484",
"refsource" : "SECUNIA", "refsource": "HP",
"url" : "http://secunia.com/advisories/27606" "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01241483"
}, },
{ {
"name": "hpux-ariesparisc-unauthorized-access(38361)", "name": "hpux-ariesparisc-unauthorized-access(38361)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38361" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38361"
},
{
"name": "HPSBUX02285",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01241483"
},
{
"name": "ADV-2007-3820",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3820"
},
{
"name": "27606",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27606"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20090513 (GET var 'member') BLIND SQL INJECTION EXPLOIT --FAMILY CONNECTIONS <= v1.9 -->", "name": "35039",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/503477/100/0/threaded" "url": "http://secunia.com/advisories/35039"
},
{
"name" : "8671",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/8671"
}, },
{ {
"name": "34935", "name": "34935",
@ -68,9 +63,14 @@
"url": "http://www.securityfocus.com/bid/34935" "url": "http://www.securityfocus.com/bid/34935"
}, },
{ {
"name" : "35039", "name": "8671",
"refsource" : "SECUNIA", "refsource": "EXPLOIT-DB",
"url" : "http://secunia.com/advisories/35039" "url": "https://www.exploit-db.com/exploits/8671"
},
{
"name": "20090513 (GET var 'member') BLIND SQL INJECTION EXPLOIT --FAMILY CONNECTIONS <= v1.9 -->",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/503477/100/0/threaded"
}, },
{ {
"name": "ADV-2009-1306", "name": "ADV-2009-1306",

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/504574/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/504574/100/0/threaded"
}, },
{
"name" : "http://websec.id3as.com/aardvark-topsites-php-521-security-vulnerabilities-disclosure/",
"refsource" : "MISC",
"url" : "http://websec.id3as.com/aardvark-topsites-php-521-security-vulnerabilities-disclosure/"
},
{ {
"name": "aardvarktopsitesphp-index-info-disclosure(51392)", "name": "aardvarktopsitesphp-index-info-disclosure(51392)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51392" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51392"
},
{
"name": "http://websec.id3as.com/aardvark-topsites-php-521-security-vulnerabilities-disclosure/",
"refsource": "MISC",
"url": "http://websec.id3as.com/aardvark-topsites-php-521-security-vulnerabilities-disclosure/"
} }
] ]
} }

View File

@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "USN-2576-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/usn/usn-2576-2/"
},
{ {
"name": "36820", "name": "36820",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/36820/" "url": "https://www.exploit-db.com/exploits/36820/"
}, },
{
"name" : "[oss-security] 20150422 USBCreator D-Bus service",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/04/22/12"
},
{
"name" : "[oss-security] 20150504 Re: USBCreator D-Bus service",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/05/04/3"
},
{ {
"name": "https://bazaar.launchpad.net/~usb-creator-hackers/usb-creator/trunk/revision/470", "name": "https://bazaar.launchpad.net/~usb-creator-hackers/usb-creator/trunk/revision/470",
"refsource": "MISC", "refsource": "MISC",
"url": "https://bazaar.launchpad.net/~usb-creator-hackers/usb-creator/trunk/revision/470" "url": "https://bazaar.launchpad.net/~usb-creator-hackers/usb-creator/trunk/revision/470"
}, },
{
"name": "[oss-security] 20150504 Re: USBCreator D-Bus service",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/05/04/3"
},
{ {
"name": "USN-2576-1", "name": "USN-2576-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/usn/usn-2576-1/" "url": "https://usn.ubuntu.com/usn/usn-2576-1/"
}, },
{
"name" : "USN-2576-2",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/usn/usn-2576-2/"
},
{ {
"name": "74304", "name": "74304",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/74304" "url": "http://www.securityfocus.com/bid/74304"
},
{
"name": "[oss-security] 20150422 USBCreator D-Bus service",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/04/22/12"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-4185", "ID": "CVE-2015-4185",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20150612 Cisco IOS Software TCL Script Interpreter Privilege Escalation Vulnerability", "name": "1032581",
"refsource" : "CISCO", "refsource": "SECTRACK",
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=39343" "url": "http://www.securitytracker.com/id/1032581"
}, },
{ {
"name": "72310", "name": "72310",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/72310" "url": "http://www.securityfocus.com/bid/72310"
}, },
{ {
"name" : "1032581", "name": "20150612 Cisco IOS Software TCL Script Interpreter Privilege Escalation Vulnerability",
"refsource" : "SECTRACK", "refsource": "CISCO",
"url" : "http://www.securitytracker.com/id/1032581" "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39343"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-4262", "ID": "CVE-2015-4262",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-4295", "ID": "CVE-2015-4295",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-4871", "ID": "CVE-2015-4871",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,89 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", "name": "SUSE-SU-2015:2182",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
},
{
"name" : "DSA-3401",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3401"
},
{
"name" : "DSA-3381",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3381"
},
{
"name" : "GLSA-201603-11",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201603-11"
},
{
"name" : "GLSA-201603-14",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201603-14"
},
{
"name" : "RHSA-2016:1430",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1430"
},
{
"name" : "RHSA-2016:0053",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0053.html"
},
{
"name" : "RHSA-2016:0054",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0054.html"
},
{
"name" : "RHSA-2015:2506",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2506.html"
},
{
"name" : "RHSA-2015:2507",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2507.html"
},
{
"name" : "RHSA-2015:2509",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2509.html"
},
{
"name" : "RHSA-2015:1927",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1927.html"
},
{
"name" : "SUSE-SU-2016:0113",
"refsource": "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"
}, },
{ {
"name" : "SUSE-SU-2016:0265", "name": "SUSE-SU-2015:2192",
"refsource": "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"
},
{
"name" : "SUSE-SU-2016:0269",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"
},
{
"name" : "openSUSE-SU-2016:0268",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"
}, },
{ {
"name": "openSUSE-SU-2016:0272", "name": "openSUSE-SU-2016:0272",
@ -147,25 +72,65 @@
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"
}, },
{
"name": "RHSA-2015:2507",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
},
{
"name": "RHSA-2016:1430",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1430"
},
{
"name": "RHSA-2015:2506",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html"
},
{
"name": "RHSA-2015:2509",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html"
},
{
"name": "1033884",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033884"
},
{ {
"name": "SUSE-SU-2015:2166", "name": "SUSE-SU-2015:2166",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"
}, },
{ {
"name" : "SUSE-SU-2015:2168", "name": "GLSA-201603-11",
"refsource" : "SUSE", "refsource": "GENTOO",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" "url": "https://security.gentoo.org/glsa/201603-11"
}, },
{ {
"name" : "SUSE-SU-2015:2182", "name": "RHSA-2016:0053",
"refsource" : "SUSE", "refsource": "REDHAT",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" "url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html"
}, },
{ {
"name" : "SUSE-SU-2015:2192", "name": "SUSE-SU-2016:0269",
"refsource": "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"
},
{
"name": "GLSA-201603-14",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201603-14"
}, },
{ {
"name": "SUSE-SU-2015:2216", "name": "SUSE-SU-2015:2216",
@ -173,9 +138,19 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"
}, },
{ {
"name" : "SUSE-SU-2015:2268", "name": "77238",
"refsource" : "SUSE", "refsource": "BID",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" "url": "http://www.securityfocus.com/bid/77238"
},
{
"name": "RHSA-2015:1927",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html"
},
{
"name": "DSA-3401",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3401"
}, },
{ {
"name": "USN-2818-1", "name": "USN-2818-1",
@ -183,14 +158,39 @@
"url": "http://www.ubuntu.com/usn/USN-2818-1" "url": "http://www.ubuntu.com/usn/USN-2818-1"
}, },
{ {
"name" : "77238", "name": "SUSE-SU-2015:2268",
"refsource" : "BID", "refsource": "SUSE",
"url" : "http://www.securityfocus.com/bid/77238" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"
}, },
{ {
"name" : "1033884", "name": "SUSE-SU-2015:2168",
"refsource" : "SECTRACK", "refsource": "SUSE",
"url" : "http://www.securitytracker.com/id/1033884" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"
},
{
"name": "RHSA-2016:0054",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html"
},
{
"name": "DSA-3381",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3381"
},
{
"name": "openSUSE-SU-2016:0268",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"
},
{
"name": "SUSE-SU-2016:0265",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"
},
{
"name": "SUSE-SU-2016:0113",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20151117 Open-Xchange Security Advisory 2015-11-17",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/536923/100/0/threaded"
},
{
"name" : "http://packetstormsecurity.com/files/134415/Open-Xchange-Guard-2.0-Cross-Site-Scripting.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/134415/Open-Xchange-Guard-2.0-Cross-Site-Scripting.html"
},
{ {
"name": "http://software.open-xchange.com/products/guard/doc/Release_Notes_for_Patch_Release_2777_2.0.0_2015-09-30.pdf", "name": "http://software.open-xchange.com/products/guard/doc/Release_Notes_for_Patch_Release_2777_2.0.0_2015-09-30.pdf",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://software.open-xchange.com/products/guard/doc/Release_Notes_for_Patch_Release_2777_2.0.0_2015-09-30.pdf" "url": "http://software.open-xchange.com/products/guard/doc/Release_Notes_for_Patch_Release_2777_2.0.0_2015-09-30.pdf"
}, },
{
"name": "20151117 Open-Xchange Security Advisory 2015-11-17",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/536923/100/0/threaded"
},
{ {
"name": "1034166", "name": "1034166",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034166" "url": "http://www.securitytracker.com/id/1034166"
},
{
"name": "http://packetstormsecurity.com/files/134415/Open-Xchange-Guard-2.0-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/134415/Open-Xchange-Guard-2.0-Cross-Site-Scripting.html"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20150929 CVE-2015-7392 Heap overflow in Freeswitch json parser < 1.6.2 & < 1.4.23", "name": "https://freeswitch.org/stash/projects/FS/repos/freeswitch/commits/cf8925",
"refsource" : "BUGTRAQ", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/archive/1/536569/100/0/threaded" "url": "https://freeswitch.org/stash/projects/FS/repos/freeswitch/commits/cf8925"
}, },
{ {
"name": "http://packetstormsecurity.com/files/133781/freeswitch-Heap-Overflow.html", "name": "http://packetstormsecurity.com/files/133781/freeswitch-Heap-Overflow.html",
@ -63,9 +63,9 @@
"url": "http://packetstormsecurity.com/files/133781/freeswitch-Heap-Overflow.html" "url": "http://packetstormsecurity.com/files/133781/freeswitch-Heap-Overflow.html"
}, },
{ {
"name" : "https://freeswitch.org/stash/projects/FS/repos/freeswitch/commits/cf8925", "name": "20150929 CVE-2015-7392 Heap overflow in Freeswitch json parser < 1.6.2 & < 1.4.23",
"refsource" : "CONFIRM", "refsource": "BUGTRAQ",
"url" : "https://freeswitch.org/stash/projects/FS/repos/freeswitch/commits/cf8925" "url": "http://www.securityfocus.com/archive/1/536569/100/0/threaded"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2015-8510", "ID": "CVE-2015-8510",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2015-8891", "ID": "CVE-2015-8891",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "91628",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91628"
},
{ {
"name": "http://source.android.com/security/bulletin/2016-07-01.html", "name": "http://source.android.com/security/bulletin/2016-07-01.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=4f829bb52d0338c87bc6fbd0414b258f55cc7c62", "name": "https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=4f829bb52d0338c87bc6fbd0414b258f55cc7c62",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=4f829bb52d0338c87bc6fbd0414b258f55cc7c62" "url": "https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=4f829bb52d0338c87bc6fbd0414b258f55cc7c62"
},
{
"name" : "91628",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/91628"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2016-1692", "ID": "CVE-2016-1692",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,65 +52,65 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
},
{ {
"name": "https://codereview.chromium.org/1861243002", "name": "https://codereview.chromium.org/1861243002",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://codereview.chromium.org/1861243002" "url": "https://codereview.chromium.org/1861243002"
}, },
{
"name" : "https://crbug.com/598077",
"refsource" : "CONFIRM",
"url" : "https://crbug.com/598077"
},
{
"name" : "DSA-3590",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3590"
},
{
"name" : "GLSA-201607-07",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201607-07"
},
{
"name" : "RHSA-2016:1190",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1190"
},
{
"name" : "openSUSE-SU-2016:1430",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
},
{
"name" : "openSUSE-SU-2016:1433",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
},
{
"name" : "openSUSE-SU-2016:1496",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
},
{
"name" : "USN-2992-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2992-1"
},
{ {
"name": "90876", "name": "90876",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/90876" "url": "http://www.securityfocus.com/bid/90876"
}, },
{
"name": "openSUSE-SU-2016:1496",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
},
{ {
"name": "1035981", "name": "1035981",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035981" "url": "http://www.securitytracker.com/id/1035981"
},
{
"name": "DSA-3590",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3590"
},
{
"name": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
},
{
"name": "USN-2992-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2992-1"
},
{
"name": "openSUSE-SU-2016:1430",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
},
{
"name": "RHSA-2016:1190",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1190"
},
{
"name": "https://crbug.com/598077",
"refsource": "CONFIRM",
"url": "https://crbug.com/598077"
},
{
"name": "GLSA-201607-07",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201607-07"
},
{
"name": "openSUSE-SU-2016:1433",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2016-1719", "ID": "CVE-2016-1719",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,110 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "39359",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/39359/"
},
{
"name" : "39360",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/39360/"
},
{
"name" : "39361",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/39361/"
},
{ {
"name": "39362", "name": "39362",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/39362/" "url": "https://www.exploit-db.com/exploits/39362/"
}, },
{
"name" : "39363",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/39363/"
},
{
"name" : "39364",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/39364/"
},
{
"name" : "https://code.google.com/p/google-security-research/issues/detail?id=603",
"refsource" : "MISC",
"url" : "https://code.google.com/p/google-security-research/issues/detail?id=603"
},
{
"name" : "https://code.google.com/p/google-security-research/issues/detail?id=604",
"refsource" : "MISC",
"url" : "https://code.google.com/p/google-security-research/issues/detail?id=604"
},
{
"name" : "https://code.google.com/p/google-security-research/issues/detail?id=605",
"refsource" : "MISC",
"url" : "https://code.google.com/p/google-security-research/issues/detail?id=605"
},
{
"name" : "https://code.google.com/p/google-security-research/issues/detail?id=606",
"refsource" : "MISC",
"url" : "https://code.google.com/p/google-security-research/issues/detail?id=606"
},
{
"name" : "https://code.google.com/p/google-security-research/issues/detail?id=607",
"refsource" : "MISC",
"url" : "https://code.google.com/p/google-security-research/issues/detail?id=607"
},
{
"name" : "https://code.google.com/p/google-security-research/issues/detail?id=608",
"refsource" : "MISC",
"url" : "https://code.google.com/p/google-security-research/issues/detail?id=608"
},
{
"name" : "http://packetstormsecurity.com/files/135438/iOS-Kernel-IOReportHub-Use-After-Free.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/135438/iOS-Kernel-IOReportHub-Use-After-Free.html"
},
{
"name" : "http://packetstormsecurity.com/files/135439/iOS-Kernel-IOHIDEventService-Use-After-Free.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/135439/iOS-Kernel-IOHIDEventService-Use-After-Free.html"
},
{
"name" : "http://packetstormsecurity.com/files/135440/iOS-Kernel-AppleOscarCMA-Use-After-Free.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/135440/iOS-Kernel-AppleOscarCMA-Use-After-Free.html"
},
{
"name" : "http://packetstormsecurity.com/files/135441/iOS-Kernel-AppleOscarCompass-Use-After-Free.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/135441/iOS-Kernel-AppleOscarCompass-Use-After-Free.html"
},
{ {
"name": "http://packetstormsecurity.com/files/135442/iOS-Kernel-AppleOscarAccelerometer-Use-After-Free.html", "name": "http://packetstormsecurity.com/files/135442/iOS-Kernel-AppleOscarAccelerometer-Use-After-Free.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/135442/iOS-Kernel-AppleOscarAccelerometer-Use-After-Free.html" "url": "http://packetstormsecurity.com/files/135442/iOS-Kernel-AppleOscarAccelerometer-Use-After-Free.html"
}, },
{ {
"name" : "http://packetstormsecurity.com/files/135443/iOS-Kernel-AppleOscarGyro-Use-After-Free.html", "name": "39360",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/39360/"
},
{
"name": "https://code.google.com/p/google-security-research/issues/detail?id=604",
"refsource": "MISC", "refsource": "MISC",
"url" : "http://packetstormsecurity.com/files/135443/iOS-Kernel-AppleOscarGyro-Use-After-Free.html" "url": "https://code.google.com/p/google-security-research/issues/detail?id=604"
},
{
"name" : "https://support.apple.com/HT205729",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205729"
},
{
"name" : "https://support.apple.com/HT205731",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205731"
},
{
"name" : "https://support.apple.com/HT205732",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205732"
}, },
{ {
"name": "https://support.apple.com/HT206168", "name": "https://support.apple.com/HT206168",
@ -163,29 +78,114 @@
"url": "https://support.apple.com/HT206168" "url": "https://support.apple.com/HT206168"
}, },
{ {
"name" : "APPLE-SA-2016-01-19-1", "name": "https://support.apple.com/HT205731",
"refsource" : "APPLE", "refsource": "CONFIRM",
"url" : "http://lists.apple.com/archives/security-announce/2016/Jan/msg00002.html" "url": "https://support.apple.com/HT205731"
}, },
{ {
"name" : "APPLE-SA-2016-01-19-2", "name": "https://support.apple.com/HT205729",
"refsource" : "APPLE", "refsource": "CONFIRM",
"url" : "http://lists.apple.com/archives/security-announce/2016/Jan/msg00003.html" "url": "https://support.apple.com/HT205729"
},
{
"name": "http://packetstormsecurity.com/files/135441/iOS-Kernel-AppleOscarCompass-Use-After-Free.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/135441/iOS-Kernel-AppleOscarCompass-Use-After-Free.html"
},
{
"name": "http://packetstormsecurity.com/files/135439/iOS-Kernel-IOHIDEventService-Use-After-Free.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/135439/iOS-Kernel-IOHIDEventService-Use-After-Free.html"
}, },
{ {
"name": "APPLE-SA-2016-01-25-1", "name": "APPLE-SA-2016-01-25-1",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jan/msg00005.html" "url": "http://lists.apple.com/archives/security-announce/2016/Jan/msg00005.html"
}, },
{
"name": "1034736",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034736"
},
{
"name": "APPLE-SA-2016-01-19-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jan/msg00003.html"
},
{
"name": "https://code.google.com/p/google-security-research/issues/detail?id=607",
"refsource": "MISC",
"url": "https://code.google.com/p/google-security-research/issues/detail?id=607"
},
{ {
"name": "APPLE-SA-2016-03-21-2", "name": "APPLE-SA-2016-03-21-2",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html" "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html"
}, },
{ {
"name" : "1034736", "name": "http://packetstormsecurity.com/files/135438/iOS-Kernel-IOReportHub-Use-After-Free.html",
"refsource" : "SECTRACK", "refsource": "MISC",
"url" : "http://www.securitytracker.com/id/1034736" "url": "http://packetstormsecurity.com/files/135438/iOS-Kernel-IOReportHub-Use-After-Free.html"
},
{
"name": "APPLE-SA-2016-01-19-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jan/msg00002.html"
},
{
"name": "39363",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/39363/"
},
{
"name": "http://packetstormsecurity.com/files/135440/iOS-Kernel-AppleOscarCMA-Use-After-Free.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/135440/iOS-Kernel-AppleOscarCMA-Use-After-Free.html"
},
{
"name": "https://code.google.com/p/google-security-research/issues/detail?id=605",
"refsource": "MISC",
"url": "https://code.google.com/p/google-security-research/issues/detail?id=605"
},
{
"name": "https://code.google.com/p/google-security-research/issues/detail?id=603",
"refsource": "MISC",
"url": "https://code.google.com/p/google-security-research/issues/detail?id=603"
},
{
"name": "http://packetstormsecurity.com/files/135443/iOS-Kernel-AppleOscarGyro-Use-After-Free.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/135443/iOS-Kernel-AppleOscarGyro-Use-After-Free.html"
},
{
"name": "39359",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/39359/"
},
{
"name": "39361",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/39361/"
},
{
"name": "https://support.apple.com/HT205732",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205732"
},
{
"name": "39364",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/39364/"
},
{
"name": "https://code.google.com/p/google-security-research/issues/detail?id=606",
"refsource": "MISC",
"url": "https://code.google.com/p/google-security-research/issues/detail?id=606"
},
{
"name": "https://code.google.com/p/google-security-research/issues/detail?id=608",
"refsource": "MISC",
"url": "https://code.google.com/p/google-security-research/issues/detail?id=608"
} }
] ]
} }

View File

@ -57,11 +57,6 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.codeaurora.org/insufficient-memory-address-information-prevent-arbitrary-memory-access-qsee-secure-applications-cve" "url": "https://www.codeaurora.org/insufficient-memory-address-information-prevent-arbitrary-memory-access-qsee-secure-applications-cve"
}, },
{
"name" : "https://www.qualcomm.com/company/product-security/security-advisories",
"refsource" : "CONFIRM",
"url" : "https://www.qualcomm.com/company/product-security/security-advisories"
},
{ {
"name": "https://source.android.com/security/bulletin/2017-04-01", "name": "https://source.android.com/security/bulletin/2017-04-01",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -72,6 +67,11 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/97364" "url": "http://www.securityfocus.com/bid/97364"
}, },
{
"name": "https://www.qualcomm.com/company/product-security/security-advisories",
"refsource": "CONFIRM",
"url": "https://www.qualcomm.com/company/product-security/security-advisories"
},
{ {
"name": "1038201", "name": "1038201",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5437", "ID": "CVE-2016-5437",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "USN-3040-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3040-1"
},
{ {
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
}, },
{ {
"name" : "USN-3040-1", "name": "1036362",
"refsource" : "UBUNTU", "refsource": "SECTRACK",
"url" : "http://www.ubuntu.com/usn/USN-3040-1" "url": "http://www.securitytracker.com/id/1036362"
}, },
{ {
"name": "91787", "name": "91787",
@ -71,11 +76,6 @@
"name": "91917", "name": "91917",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/91917" "url": "http://www.securityfocus.com/bid/91917"
},
{
"name" : "1036362",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036362"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5613", "ID": "CVE-2016-5613",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{ {
"name": "GLSA-201612-27", "name": "GLSA-201612-27",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201612-27" "url": "https://security.gentoo.org/glsa/201612-27"
}, },
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{ {
"name": "93728", "name": "93728",
"refsource": "BID", "refsource": "BID",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@microfocus.com", "ASSIGNER": "security@suse.com",
"ID": "CVE-2016-5747", "ID": "CVE-2016-5747",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -62,15 +62,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
}, },
{
"name" : "102691",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/102691"
},
{ {
"name": "1040202", "name": "1040202",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040202" "url": "http://www.securitytracker.com/id/1040202"
},
{
"name": "102691",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102691"
} }
] ]
} }

View File

@ -53,16 +53,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{ {
"name": "104783", "name": "104783",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/104783" "url": "http://www.securityfocus.com/bid/104783"
}, },
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{ {
"name": "1041303", "name": "1041303",
"refsource": "SECTRACK", "refsource": "SECTRACK",