mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
2103e84fc4
commit
7cb87a7e7c
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-1999-0621",
|
"ID": "CVE-1999-0621",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20000613 SmartFTP Daemon v0.2 Beta Build 9 - Remote Exploit",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-06/0100.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1344",
|
"name": "1344",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -71,6 +66,11 @@
|
|||||||
"name": "1394",
|
"name": "1394",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/1394"
|
"url": "http://www.osvdb.org/1394"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20000613 SmartFTP Daemon v0.2 Beta Build 9 - Remote Exploit",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0100.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,45 +52,45 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20000624 Possible root exploit in ISC DHCP client.",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-06/0247.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20000628 dhcp client: remote root exploit in dhcp client",
|
"name": "20000628 dhcp client: remote root exploit in dhcp client",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"url": "http://www.debian.org/security/2000/20000628"
|
"url": "http://www.debian.org/security/2000/20000628"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "FreeBSD-SA-00:34",
|
|
||||||
"refsource" : "FREEBSD",
|
|
||||||
"url" : "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:34.dhclient.asc"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20000702 [Security Announce] dhcp update",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-07/0014.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20000711 Security Hole in dhclient < 2.0",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://www.novell.com/linux/security/advisories/suse_security_announce_56.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "NetBSD-SA2000-008",
|
"name": "NetBSD-SA2000-008",
|
||||||
"refsource": "NETBSD",
|
"refsource": "NETBSD",
|
||||||
"url": "ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-008.txt.asc"
|
"url": "ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-008.txt.asc"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1388",
|
"name": "20000702 [Security Announce] dhcp update",
|
||||||
"refsource" : "BID",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.securityfocus.com/bid/1388"
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0014.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20000624 Possible root exploit in ISC DHCP client.",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0247.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openbsd-isc-dhcp(4772)",
|
"name": "openbsd-isc-dhcp(4772)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4772"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4772"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FreeBSD-SA-00:34",
|
||||||
|
"refsource": "FREEBSD",
|
||||||
|
"url": "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:34.dhclient.asc"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20000711 Security Hole in dhclient < 2.0",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://www.novell.com/linux/security/advisories/suse_security_announce_56.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1388",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/1388"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "1401",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/1401"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20000626 Glftpd privpath bugs... +fix",
|
"name": "20000626 Glftpd privpath bugs... +fix",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "20000627 Re: Glftpd privpath bugs... +fix",
|
"name": "20000627 Re: Glftpd privpath bugs... +fix",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0317.html"
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0317.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1401",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/1401"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "mssql-procedure-perms(4921)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4921"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "MS00-048",
|
"name": "MS00-048",
|
||||||
"refsource": "MS",
|
"refsource": "MS",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "1444",
|
"name": "1444",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/1444"
|
"url": "http://www.securityfocus.com/bid/1444"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "mssql-procedure-perms(4921)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/4921"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,15 +57,15 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html"
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "1872",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/1872"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "samba-swat-logging-sym-link(5443)",
|
"name": "samba-swat-logging-sym-link(5443)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5443"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5443"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1872",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/1872"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20050629 WordPress 1.5.1.2 && Earlier Multiple Vulnerabilities",
|
"name": "15831",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=112006967221438&w=2"
|
"url": "http://secunia.com/advisories/15831"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.gulftech.org/?node=research&article_id=00085-06282005",
|
"name": "http://www.gulftech.org/?node=research&article_id=00085-06282005",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.gulftech.org/?node=research&article_id=00085-06282005"
|
"url": "http://www.gulftech.org/?node=research&article_id=00085-06282005"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "15831",
|
"name": "20050629 WordPress 1.5.1.2 && Earlier Multiple Vulnerabilities",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://secunia.com/advisories/15831"
|
"url": "http://marc.info/?l=bugtraq&m=112006967221438&w=2"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -62,15 +62,15 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/14537"
|
"url": "http://www.securityfocus.com/bid/14537"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "ADV-2005-1365",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2005/1365"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "16388",
|
"name": "16388",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/16388"
|
"url": "http://secunia.com/advisories/16388"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2005-1365",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2005/1365"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2007-1323",
|
"ID": "CVE-2007-1323",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2007-1355",
|
"ID": "CVE-2007-1355",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,76 +52,21 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20070519 [CVE-2007-1355] Tomcat documentation XSS vulnerabilities",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/469067/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20090127 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities (Updated - v1.1)",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/500412/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20090124 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/500396/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://tomcat.apache.org/security-4.html",
|
"name": "http://tomcat.apache.org/security-4.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://tomcat.apache.org/security-4.html"
|
"url": "http://tomcat.apache.org/security-4.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://tomcat.apache.org/security-5.html",
|
"name": "30908",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://tomcat.apache.org/security-5.html"
|
"url": "http://secunia.com/advisories/30908"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://tomcat.apache.org/security-6.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://tomcat.apache.org/security-6.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://support.apple.com/kb/HT2163",
|
"name": "http://support.apple.com/kb/HT2163",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://support.apple.com/kb/HT2163"
|
"url": "http://support.apple.com/kb/HT2163"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2008-06-30",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2007-3456",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "HPSBUX02262",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSRT071447",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2008:0261",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0261.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "RHSA-2008:0630",
|
"name": "RHSA-2008:0630",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
@ -132,85 +77,140 @@
|
|||||||
"refsource": "SUNALERT",
|
"refsource": "SUNALERT",
|
||||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1"
|
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "24058",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/24058"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "34875",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/34875"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:6111",
|
"name": "oval:org.mitre.oval:def:6111",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6111"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6111"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "ADV-2007-3386",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/3386"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2008-1981",
|
"name": "ADV-2008-1981",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2008/1981/references"
|
"url": "http://www.vupen.com/english/advisories/2008/1981/references"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "ADV-2008-1979",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2008/1979/references"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2009-0233",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2009/0233"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "27037",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/27037"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "27727",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/27727"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "30802",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/30802"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "30908",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/30908"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "30899",
|
"name": "30899",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/30899"
|
"url": "http://secunia.com/advisories/30899"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2007-3456",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "31493",
|
"name": "31493",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/31493"
|
"url": "http://secunia.com/advisories/31493"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2008-1979",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2008/1979/references"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "34875",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/34875"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20090127 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities (Updated - v1.1)",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/500412/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "33668",
|
"name": "33668",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/33668"
|
"url": "http://secunia.com/advisories/33668"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20090124 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/500396/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "2722",
|
"name": "2722",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/2722"
|
"url": "http://securityreason.com/securityalert/2722"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2008-06-30",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "24058",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/24058"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2009-0233",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2009/0233"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://tomcat.apache.org/security-6.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://tomcat.apache.org/security-6.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2007-3386",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2007/3386"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "30802",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/30802"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "27037",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/27037"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSRT071447",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "27727",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/27727"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBUX02262",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://tomcat.apache.org/security-5.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://tomcat.apache.org/security-5.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20070519 [CVE-2007-1355] Tomcat documentation XSS vulnerabilities",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/469067/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2008:0261",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2008-0261.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "tomcat-hello-xss(34377)",
|
"name": "tomcat-hello-xss(34377)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34377"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34377"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,30 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[ANNOUNCE] 20070907 balsa-2.3.20 released",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://bugzilla.gnome.org/show_bug.cgi?id=474366",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://bugzilla.gnome.org/show_bug.cgi?id=474366"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=297581",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=297581"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://bugs.gentoo.org/show_bug.cgi?id=193179",
|
"name": "http://bugs.gentoo.org/show_bug.cgi?id=193179",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://bugs.gentoo.org/show_bug.cgi?id=193179"
|
"url": "http://bugs.gentoo.org/show_bug.cgi?id=193179"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "GLSA-200710-17",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=297581",
|
||||||
"refsource" : "GENTOO",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml"
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=297581"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "SUSE-SR:2007:019",
|
"name": "SUSE-SR:2007:019",
|
||||||
@ -88,29 +73,44 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/25777"
|
"url": "http://www.securityfocus.com/bid/25777"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2007-3263",
|
"name": "http://bugzilla.gnome.org/show_bug.cgi?id=474366",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/3263"
|
"url": "http://bugzilla.gnome.org/show_bug.cgi?id=474366"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "40585",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/40585"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "26947",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/26947"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "26987",
|
"name": "26987",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/26987"
|
"url": "http://secunia.com/advisories/26987"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "[ANNOUNCE] 20070907 balsa-2.3.20 released",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2007-3263",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2007/3263"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "27272",
|
"name": "27272",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/27272"
|
"url": "http://secunia.com/advisories/27272"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "40585",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/40585"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-200710-17",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "26947",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/26947"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://research.eeye.com/html/advisories/upcoming/20071024.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://research.eeye.com/html/advisories/upcoming/20071024.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "26210",
|
"name": "26210",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/26210"
|
"url": "http://www.securityfocus.com/bid/26210"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://research.eeye.com/html/advisories/upcoming/20071024.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://research.eeye.com/html/advisories/upcoming/20071024.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "HPSBUX02285",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01241483"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSRT071484",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01241483"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "26383",
|
"name": "26383",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -72,25 +62,35 @@
|
|||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5548"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5548"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "ADV-2007-3820",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/3820"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1018925",
|
"name": "1018925",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://securitytracker.com/id?1018925"
|
"url": "http://securitytracker.com/id?1018925"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "27606",
|
"name": "SSRT071484",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "HP",
|
||||||
"url" : "http://secunia.com/advisories/27606"
|
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01241483"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "hpux-ariesparisc-unauthorized-access(38361)",
|
"name": "hpux-ariesparisc-unauthorized-access(38361)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38361"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38361"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBUX02285",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01241483"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2007-3820",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2007/3820"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "27606",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/27606"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20090513 (GET var 'member') BLIND SQL INJECTION EXPLOIT --FAMILY CONNECTIONS <= v1.9 -->",
|
"name": "35039",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/503477/100/0/threaded"
|
"url": "http://secunia.com/advisories/35039"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "8671",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/8671"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "34935",
|
"name": "34935",
|
||||||
@ -68,9 +63,14 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/34935"
|
"url": "http://www.securityfocus.com/bid/34935"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "35039",
|
"name": "8671",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url" : "http://secunia.com/advisories/35039"
|
"url": "https://www.exploit-db.com/exploits/8671"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20090513 (GET var 'member') BLIND SQL INJECTION EXPLOIT --FAMILY CONNECTIONS <= v1.9 -->",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/503477/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2009-1306",
|
"name": "ADV-2009-1306",
|
||||||
|
@ -57,15 +57,15 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/504574/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/504574/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://websec.id3as.com/aardvark-topsites-php-521-security-vulnerabilities-disclosure/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://websec.id3as.com/aardvark-topsites-php-521-security-vulnerabilities-disclosure/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "aardvarktopsitesphp-index-info-disclosure(51392)",
|
"name": "aardvarktopsitesphp-index-info-disclosure(51392)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51392"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51392"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://websec.id3as.com/aardvark-topsites-php-521-security-vulnerabilities-disclosure/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://websec.id3as.com/aardvark-topsites-php-521-security-vulnerabilities-disclosure/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,40 +52,40 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "USN-2576-2",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "https://usn.ubuntu.com/usn/usn-2576-2/"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "36820",
|
"name": "36820",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "https://www.exploit-db.com/exploits/36820/"
|
"url": "https://www.exploit-db.com/exploits/36820/"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20150422 USBCreator D-Bus service",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2015/04/22/12"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20150504 Re: USBCreator D-Bus service",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2015/05/04/3"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://bazaar.launchpad.net/~usb-creator-hackers/usb-creator/trunk/revision/470",
|
"name": "https://bazaar.launchpad.net/~usb-creator-hackers/usb-creator/trunk/revision/470",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://bazaar.launchpad.net/~usb-creator-hackers/usb-creator/trunk/revision/470"
|
"url": "https://bazaar.launchpad.net/~usb-creator-hackers/usb-creator/trunk/revision/470"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20150504 Re: USBCreator D-Bus service",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2015/05/04/3"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-2576-1",
|
"name": "USN-2576-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "https://usn.ubuntu.com/usn/usn-2576-1/"
|
"url": "https://usn.ubuntu.com/usn/usn-2576-1/"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "USN-2576-2",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "https://usn.ubuntu.com/usn/usn-2576-2/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "74304",
|
"name": "74304",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/74304"
|
"url": "http://www.securityfocus.com/bid/74304"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20150422 USBCreator D-Bus service",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2015/04/22/12"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2015-4185",
|
"ID": "CVE-2015-4185",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20150612 Cisco IOS Software TCL Script Interpreter Privilege Escalation Vulnerability",
|
"name": "1032581",
|
||||||
"refsource" : "CISCO",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=39343"
|
"url": "http://www.securitytracker.com/id/1032581"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "72310",
|
"name": "72310",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/72310"
|
"url": "http://www.securityfocus.com/bid/72310"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1032581",
|
"name": "20150612 Cisco IOS Software TCL Script Interpreter Privilege Escalation Vulnerability",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CISCO",
|
||||||
"url" : "http://www.securitytracker.com/id/1032581"
|
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39343"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2015-4262",
|
"ID": "CVE-2015-4262",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2015-4295",
|
"ID": "CVE-2015-4295",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2015-4871",
|
"ID": "CVE-2015-4871",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,89 +53,14 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
|
"name": "SUSE-SU-2015:2182",
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-3401",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2015/dsa-3401"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-3381",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2015/dsa-3381"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201603-11",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201603-11"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201603-14",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201603-14"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:1430",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2016:1430"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:0053",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0053.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:0054",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0054.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2015:2506",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2506.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2015:2507",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2507.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2015:2509",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2509.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2015:1927",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1927.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2016:0113",
|
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SUSE-SU-2016:0265",
|
"name": "SUSE-SU-2015:2192",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2016:0269",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2016:0268",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2016:0272",
|
"name": "openSUSE-SU-2016:0272",
|
||||||
@ -147,25 +72,65 @@
|
|||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2015:2507",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:1430",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2016:1430"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2015:2506",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2015:2509",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1033884",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1033884"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2015:2166",
|
"name": "SUSE-SU-2015:2166",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SUSE-SU-2015:2168",
|
"name": "GLSA-201603-11",
|
||||||
"refsource" : "SUSE",
|
"refsource": "GENTOO",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"
|
"url": "https://security.gentoo.org/glsa/201603-11"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SUSE-SU-2015:2182",
|
"name": "RHSA-2016:0053",
|
||||||
"refsource" : "SUSE",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SUSE-SU-2015:2192",
|
"name": "SUSE-SU-2016:0269",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201603-14",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "https://security.gentoo.org/glsa/201603-14"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2015:2216",
|
"name": "SUSE-SU-2015:2216",
|
||||||
@ -173,9 +138,19 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SUSE-SU-2015:2268",
|
"name": "77238",
|
||||||
"refsource" : "SUSE",
|
"refsource": "BID",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"
|
"url": "http://www.securityfocus.com/bid/77238"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2015:1927",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3401",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2015/dsa-3401"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-2818-1",
|
"name": "USN-2818-1",
|
||||||
@ -183,14 +158,39 @@
|
|||||||
"url": "http://www.ubuntu.com/usn/USN-2818-1"
|
"url": "http://www.ubuntu.com/usn/USN-2818-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "77238",
|
"name": "SUSE-SU-2015:2268",
|
||||||
"refsource" : "BID",
|
"refsource": "SUSE",
|
||||||
"url" : "http://www.securityfocus.com/bid/77238"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1033884",
|
"name": "SUSE-SU-2015:2168",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "SUSE",
|
||||||
"url" : "http://www.securitytracker.com/id/1033884"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:0054",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3381",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2015/dsa-3381"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2016:0268",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2016:0265",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2016:0113",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20151117 Open-Xchange Security Advisory 2015-11-17",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/536923/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://packetstormsecurity.com/files/134415/Open-Xchange-Guard-2.0-Cross-Site-Scripting.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://packetstormsecurity.com/files/134415/Open-Xchange-Guard-2.0-Cross-Site-Scripting.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://software.open-xchange.com/products/guard/doc/Release_Notes_for_Patch_Release_2777_2.0.0_2015-09-30.pdf",
|
"name": "http://software.open-xchange.com/products/guard/doc/Release_Notes_for_Patch_Release_2777_2.0.0_2015-09-30.pdf",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://software.open-xchange.com/products/guard/doc/Release_Notes_for_Patch_Release_2777_2.0.0_2015-09-30.pdf"
|
"url": "http://software.open-xchange.com/products/guard/doc/Release_Notes_for_Patch_Release_2777_2.0.0_2015-09-30.pdf"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20151117 Open-Xchange Security Advisory 2015-11-17",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/536923/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1034166",
|
"name": "1034166",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1034166"
|
"url": "http://www.securitytracker.com/id/1034166"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://packetstormsecurity.com/files/134415/Open-Xchange-Guard-2.0-Cross-Site-Scripting.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://packetstormsecurity.com/files/134415/Open-Xchange-Guard-2.0-Cross-Site-Scripting.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20150929 CVE-2015-7392 Heap overflow in Freeswitch json parser < 1.6.2 & < 1.4.23",
|
"name": "https://freeswitch.org/stash/projects/FS/repos/freeswitch/commits/cf8925",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/536569/100/0/threaded"
|
"url": "https://freeswitch.org/stash/projects/FS/repos/freeswitch/commits/cf8925"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://packetstormsecurity.com/files/133781/freeswitch-Heap-Overflow.html",
|
"name": "http://packetstormsecurity.com/files/133781/freeswitch-Heap-Overflow.html",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://packetstormsecurity.com/files/133781/freeswitch-Heap-Overflow.html"
|
"url": "http://packetstormsecurity.com/files/133781/freeswitch-Heap-Overflow.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://freeswitch.org/stash/projects/FS/repos/freeswitch/commits/cf8925",
|
"name": "20150929 CVE-2015-7392 Heap overflow in Freeswitch json parser < 1.6.2 & < 1.4.23",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "https://freeswitch.org/stash/projects/FS/repos/freeswitch/commits/cf8925"
|
"url": "http://www.securityfocus.com/archive/1/536569/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@mozilla.org",
|
||||||
"ID": "CVE-2015-8510",
|
"ID": "CVE-2015-8510",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@android.com",
|
||||||
"ID": "CVE-2015-8891",
|
"ID": "CVE-2015-8891",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "91628",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/91628"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://source.android.com/security/bulletin/2016-07-01.html",
|
"name": "http://source.android.com/security/bulletin/2016-07-01.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=4f829bb52d0338c87bc6fbd0414b258f55cc7c62",
|
"name": "https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=4f829bb52d0338c87bc6fbd0414b258f55cc7c62",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=4f829bb52d0338c87bc6fbd0414b258f55cc7c62"
|
"url": "https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=4f829bb52d0338c87bc6fbd0414b258f55cc7c62"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "91628",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/91628"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@google.com",
|
||||||
"ID": "CVE-2016-1692",
|
"ID": "CVE-2016-1692",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,65 +52,65 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://codereview.chromium.org/1861243002",
|
"name": "https://codereview.chromium.org/1861243002",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://codereview.chromium.org/1861243002"
|
"url": "https://codereview.chromium.org/1861243002"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://crbug.com/598077",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://crbug.com/598077"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-3590",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2016/dsa-3590"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201607-07",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201607-07"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:1190",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2016:1190"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2016:1430",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2016:1433",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2016:1496",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-2992-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2992-1"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "90876",
|
"name": "90876",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/90876"
|
"url": "http://www.securityfocus.com/bid/90876"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2016:1496",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1035981",
|
"name": "1035981",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1035981"
|
"url": "http://www.securitytracker.com/id/1035981"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3590",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2016/dsa-3590"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-2992-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2992-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2016:1430",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:1190",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2016:1190"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://crbug.com/598077",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://crbug.com/598077"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201607-07",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "https://security.gentoo.org/glsa/201607-07"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2016:1433",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2016-1719",
|
"ID": "CVE-2016-1719",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,110 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "39359",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/39359/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "39360",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/39360/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "39361",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/39361/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "39362",
|
"name": "39362",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "https://www.exploit-db.com/exploits/39362/"
|
"url": "https://www.exploit-db.com/exploits/39362/"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "39363",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/39363/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "39364",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/39364/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://code.google.com/p/google-security-research/issues/detail?id=603",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://code.google.com/p/google-security-research/issues/detail?id=603"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://code.google.com/p/google-security-research/issues/detail?id=604",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://code.google.com/p/google-security-research/issues/detail?id=604"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://code.google.com/p/google-security-research/issues/detail?id=605",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://code.google.com/p/google-security-research/issues/detail?id=605"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://code.google.com/p/google-security-research/issues/detail?id=606",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://code.google.com/p/google-security-research/issues/detail?id=606"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://code.google.com/p/google-security-research/issues/detail?id=607",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://code.google.com/p/google-security-research/issues/detail?id=607"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://code.google.com/p/google-security-research/issues/detail?id=608",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://code.google.com/p/google-security-research/issues/detail?id=608"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://packetstormsecurity.com/files/135438/iOS-Kernel-IOReportHub-Use-After-Free.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://packetstormsecurity.com/files/135438/iOS-Kernel-IOReportHub-Use-After-Free.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://packetstormsecurity.com/files/135439/iOS-Kernel-IOHIDEventService-Use-After-Free.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://packetstormsecurity.com/files/135439/iOS-Kernel-IOHIDEventService-Use-After-Free.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://packetstormsecurity.com/files/135440/iOS-Kernel-AppleOscarCMA-Use-After-Free.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://packetstormsecurity.com/files/135440/iOS-Kernel-AppleOscarCMA-Use-After-Free.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://packetstormsecurity.com/files/135441/iOS-Kernel-AppleOscarCompass-Use-After-Free.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://packetstormsecurity.com/files/135441/iOS-Kernel-AppleOscarCompass-Use-After-Free.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://packetstormsecurity.com/files/135442/iOS-Kernel-AppleOscarAccelerometer-Use-After-Free.html",
|
"name": "http://packetstormsecurity.com/files/135442/iOS-Kernel-AppleOscarAccelerometer-Use-After-Free.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://packetstormsecurity.com/files/135442/iOS-Kernel-AppleOscarAccelerometer-Use-After-Free.html"
|
"url": "http://packetstormsecurity.com/files/135442/iOS-Kernel-AppleOscarAccelerometer-Use-After-Free.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://packetstormsecurity.com/files/135443/iOS-Kernel-AppleOscarGyro-Use-After-Free.html",
|
"name": "39360",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/39360/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://code.google.com/p/google-security-research/issues/detail?id=604",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url" : "http://packetstormsecurity.com/files/135443/iOS-Kernel-AppleOscarGyro-Use-After-Free.html"
|
"url": "https://code.google.com/p/google-security-research/issues/detail?id=604"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT205729",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT205729"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT205731",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT205731"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT205732",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT205732"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://support.apple.com/HT206168",
|
"name": "https://support.apple.com/HT206168",
|
||||||
@ -163,29 +78,114 @@
|
|||||||
"url": "https://support.apple.com/HT206168"
|
"url": "https://support.apple.com/HT206168"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "APPLE-SA-2016-01-19-1",
|
"name": "https://support.apple.com/HT205731",
|
||||||
"refsource" : "APPLE",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2016/Jan/msg00002.html"
|
"url": "https://support.apple.com/HT205731"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "APPLE-SA-2016-01-19-2",
|
"name": "https://support.apple.com/HT205729",
|
||||||
"refsource" : "APPLE",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2016/Jan/msg00003.html"
|
"url": "https://support.apple.com/HT205729"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://packetstormsecurity.com/files/135441/iOS-Kernel-AppleOscarCompass-Use-After-Free.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://packetstormsecurity.com/files/135441/iOS-Kernel-AppleOscarCompass-Use-After-Free.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://packetstormsecurity.com/files/135439/iOS-Kernel-IOHIDEventService-Use-After-Free.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://packetstormsecurity.com/files/135439/iOS-Kernel-IOHIDEventService-Use-After-Free.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2016-01-25-1",
|
"name": "APPLE-SA-2016-01-25-1",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
"url": "http://lists.apple.com/archives/security-announce/2016/Jan/msg00005.html"
|
"url": "http://lists.apple.com/archives/security-announce/2016/Jan/msg00005.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "1034736",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1034736"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2016-01-19-2",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2016/Jan/msg00003.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://code.google.com/p/google-security-research/issues/detail?id=607",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://code.google.com/p/google-security-research/issues/detail?id=607"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2016-03-21-2",
|
"name": "APPLE-SA-2016-03-21-2",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
"url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html"
|
"url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1034736",
|
"name": "http://packetstormsecurity.com/files/135438/iOS-Kernel-IOReportHub-Use-After-Free.html",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.securitytracker.com/id/1034736"
|
"url": "http://packetstormsecurity.com/files/135438/iOS-Kernel-IOReportHub-Use-After-Free.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2016-01-19-1",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2016/Jan/msg00002.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "39363",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/39363/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://packetstormsecurity.com/files/135440/iOS-Kernel-AppleOscarCMA-Use-After-Free.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://packetstormsecurity.com/files/135440/iOS-Kernel-AppleOscarCMA-Use-After-Free.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://code.google.com/p/google-security-research/issues/detail?id=605",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://code.google.com/p/google-security-research/issues/detail?id=605"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://code.google.com/p/google-security-research/issues/detail?id=603",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://code.google.com/p/google-security-research/issues/detail?id=603"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://packetstormsecurity.com/files/135443/iOS-Kernel-AppleOscarGyro-Use-After-Free.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://packetstormsecurity.com/files/135443/iOS-Kernel-AppleOscarGyro-Use-After-Free.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "39359",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/39359/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "39361",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/39361/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT205732",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT205732"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "39364",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/39364/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://code.google.com/p/google-security-research/issues/detail?id=606",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://code.google.com/p/google-security-research/issues/detail?id=606"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://code.google.com/p/google-security-research/issues/detail?id=608",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://code.google.com/p/google-security-research/issues/detail?id=608"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,11 +57,6 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://www.codeaurora.org/insufficient-memory-address-information-prevent-arbitrary-memory-access-qsee-secure-applications-cve"
|
"url": "https://www.codeaurora.org/insufficient-memory-address-information-prevent-arbitrary-memory-access-qsee-secure-applications-cve"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://www.qualcomm.com/company/product-security/security-advisories",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.qualcomm.com/company/product-security/security-advisories"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://source.android.com/security/bulletin/2017-04-01",
|
"name": "https://source.android.com/security/bulletin/2017-04-01",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -72,6 +67,11 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/97364"
|
"url": "http://www.securityfocus.com/bid/97364"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.qualcomm.com/company/product-security/security-advisories",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.qualcomm.com/company/product-security/security-advisories"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1038201",
|
"name": "1038201",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2016-5437",
|
"ID": "CVE-2016-5437",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,20 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "USN-3040-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-3040-1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "USN-3040-1",
|
"name": "1036362",
|
||||||
"refsource" : "UBUNTU",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-3040-1"
|
"url": "http://www.securitytracker.com/id/1036362"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "91787",
|
"name": "91787",
|
||||||
@ -71,11 +76,6 @@
|
|||||||
"name": "91917",
|
"name": "91917",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/91917"
|
"url": "http://www.securityfocus.com/bid/91917"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1036362",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1036362"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2016-5613",
|
"ID": "CVE-2016-5613",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "GLSA-201612-27",
|
"name": "GLSA-201612-27",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "https://security.gentoo.org/glsa/201612-27"
|
"url": "https://security.gentoo.org/glsa/201612-27"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "93728",
|
"name": "93728",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@microfocus.com",
|
"ASSIGNER": "security@suse.com",
|
||||||
"ID": "CVE-2016-5747",
|
"ID": "CVE-2016-5747",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -62,15 +62,15 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "102691",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/102691"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1040202",
|
"name": "1040202",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1040202"
|
"url": "http://www.securitytracker.com/id/1040202"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "102691",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/102691"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,16 +53,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "104783",
|
"name": "104783",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/104783"
|
"url": "http://www.securityfocus.com/bid/104783"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1041303",
|
"name": "1041303",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
|
Loading…
x
Reference in New Issue
Block a user