"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 03:54:12 +00:00
parent 4c6dc1572a
commit 85459f91a0
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
65 changed files with 4161 additions and 4161 deletions

View File

@ -53,24 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.hitachi-support.com/security_e/vuls_e/HS06-019_e/01-e.html", "name": "hitachi-jp1-hibun-request-dos(31733)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://www.hitachi-support.com/security_e/vuls_e/HS06-019_e/01-e.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31733"
},
{
"name" : "22237",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22237"
},
{
"name" : "ADV-2007-0324",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0324"
},
{
"name" : "32963",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/32963"
}, },
{ {
"name": "23854", "name": "23854",
@ -78,9 +63,24 @@
"url": "http://secunia.com/advisories/23854" "url": "http://secunia.com/advisories/23854"
}, },
{ {
"name" : "hitachi-jp1-hibun-request-dos(31733)", "name": "22237",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31733" "url": "http://www.securityfocus.com/bid/22237"
},
{
"name": "32963",
"refsource": "OSVDB",
"url": "http://osvdb.org/32963"
},
{
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS06-019_e/01-e.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS06-019_e/01-e.html"
},
{
"name": "ADV-2007-0324",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0324"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "3716", "name": "mxbb-shotcast-getinfo1-file-include(33599)",
"refsource" : "EXPLOIT-DB", "refsource": "XF",
"url" : "https://www.exploit-db.com/exploits/3716" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33599"
}, },
{ {
"name": "23444", "name": "23444",
@ -68,9 +68,9 @@
"url": "http://www.vupen.com/english/advisories/2007/1384" "url": "http://www.vupen.com/english/advisories/2007/1384"
}, },
{ {
"name" : "mxbb-shotcast-getinfo1-file-include(33599)", "name": "3716",
"refsource" : "XF", "refsource": "EXPLOIT-DB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33599" "url": "https://www.exploit-db.com/exploits/3716"
} }
] ]
} }

View File

@ -52,51 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "3812",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3812"
},
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb07-13.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb07-13.html"
},
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb07-16.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb07-16.html"
},
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb07-17.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb07-17.html"
},
{
"name" : "23698",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23698"
},
{
"name" : "ADV-2007-1577",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1577"
},
{
"name" : "ADV-2007-3442",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3442"
},
{
"name" : "ADV-2007-3443",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3443"
},
{
"name" : "35465",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/35465"
},
{ {
"name": "38063", "name": "38063",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -108,14 +63,19 @@
"url": "http://securitytracker.com/id?1018792" "url": "http://securitytracker.com/id?1018792"
}, },
{ {
"name" : "25044", "name": "35465",
"refsource" : "SECUNIA", "refsource": "OSVDB",
"url" : "http://secunia.com/advisories/25044" "url": "http://osvdb.org/35465"
}, },
{ {
"name" : "26846", "name": "ADV-2007-3442",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/26846" "url": "http://www.vupen.com/english/advisories/2007/3442"
},
{
"name": "adobe-pngfile-bo(33956)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33956"
}, },
{ {
"name": "26864", "name": "26864",
@ -123,9 +83,49 @@
"url": "http://secunia.com/advisories/26864" "url": "http://secunia.com/advisories/26864"
}, },
{ {
"name" : "adobe-pngfile-bo(33956)", "name": "26846",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33956" "url": "http://secunia.com/advisories/26846"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb07-17.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb07-17.html"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb07-13.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb07-13.html"
},
{
"name": "ADV-2007-3443",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3443"
},
{
"name": "3812",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3812"
},
{
"name": "23698",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23698"
},
{
"name": "25044",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25044"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb07-16.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb07-16.html"
},
{
"name": "ADV-2007-1577",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1577"
} }
] ]
} }

View File

@ -52,21 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "serverview-servername-command-execution(35257)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35257"
},
{ {
"name": "20070704 Fujitsu-Siemens ServerView Remote Command Execution", "name": "20070704 Fujitsu-Siemens ServerView Remote Command Execution",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/472800/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/472800/100/0/threaded"
}, },
{
"name" : "http://www.redteam-pentesting.de/advisories/rt-sa-2007-002.php",
"refsource" : "MISC",
"url" : "http://www.redteam-pentesting.de/advisories/rt-sa-2007-002.php"
},
{
"name" : "24762",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24762"
},
{ {
"name": "ADV-2007-2441", "name": "ADV-2007-2441",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -78,9 +73,9 @@
"url": "http://osvdb.org/37835" "url": "http://osvdb.org/37835"
}, },
{ {
"name" : "25944", "name": "http://www.redteam-pentesting.de/advisories/rt-sa-2007-002.php",
"refsource" : "SECUNIA", "refsource": "MISC",
"url" : "http://secunia.com/advisories/25944" "url": "http://www.redteam-pentesting.de/advisories/rt-sa-2007-002.php"
}, },
{ {
"name": "2858", "name": "2858",
@ -88,9 +83,14 @@
"url": "http://securityreason.com/securityalert/2858" "url": "http://securityreason.com/securityalert/2858"
}, },
{ {
"name" : "serverview-servername-command-execution(35257)", "name": "24762",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35257" "url": "http://www.securityfocus.com/bid/24762"
},
{
"name": "25944",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25944"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.dragoslungu.com/2007/06/10/beehive-zero-vulnerabilities-myth-busted/",
"refsource" : "MISC",
"url" : "http://www.dragoslungu.com/2007/06/10/beehive-zero-vulnerabilities-myth-busted/"
},
{
"name" : "24413",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24413"
},
{ {
"name": "ADV-2007-2146", "name": "ADV-2007-2146",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -72,6 +62,16 @@
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/36380" "url": "http://osvdb.org/36380"
}, },
{
"name": "http://www.dragoslungu.com/2007/06/10/beehive-zero-vulnerabilities-myth-busted/",
"refsource": "MISC",
"url": "http://www.dragoslungu.com/2007/06/10/beehive-zero-vulnerabilities-myth-busted/"
},
{
"name": "24413",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24413"
},
{ {
"name": "25634", "name": "25634",
"refsource": "SECUNIA", "refsource": "SECUNIA",

View File

@ -52,20 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "4070",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4070"
},
{ {
"name": "ADV-2007-2206", "name": "ADV-2007-2206",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2206" "url": "http://www.vupen.com/english/advisories/2007/2206"
}, },
{ {
"name" : "36307", "name": "xoops-cjaycontent-spawcontrol-file-include(34856)",
"refsource" : "OSVDB", "refsource": "XF",
"url" : "http://osvdb.org/36307" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34856"
},
{
"name": "4070",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4070"
}, },
{ {
"name": "25665", "name": "25665",
@ -73,9 +73,9 @@
"url": "http://secunia.com/advisories/25665" "url": "http://secunia.com/advisories/25665"
}, },
{ {
"name" : "xoops-cjaycontent-spawcontrol-file-include(34856)", "name": "36307",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34856" "url": "http://osvdb.org/36307"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070608 Wordpress default theme XSS (admin) and other problems",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/470837/100/0/threaded"
},
{
"name" : "http://www.xssnews.com/",
"refsource" : "MISC",
"url" : "http://www.xssnews.com/"
},
{ {
"name": "24490", "name": "24490",
"refsource": "BID", "refsource": "BID",
@ -72,15 +62,25 @@
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/36379" "url": "http://osvdb.org/36379"
}, },
{
"name" : "25659",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25659"
},
{ {
"name": "2807", "name": "2807",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2807" "url": "http://securityreason.com/securityalert/2807"
},
{
"name": "http://www.xssnews.com/",
"refsource": "MISC",
"url": "http://www.xssnews.com/"
},
{
"name": "20070608 Wordpress default theme XSS (admin) and other problems",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/470837/100/0/threaded"
},
{
"name": "25659",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25659"
} }
] ]
} }

View File

@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "37791",
"refsource": "OSVDB",
"url": "http://osvdb.org/37791"
},
{
"name": "intellijack-nj220-loopback-dos(35172)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35172"
},
{ {
"name": "http://support.3com.com/infodeli/tools/nj/nj220_02_00_23_readme.pdf", "name": "http://support.3com.com/infodeli/tools/nj/nj220_02_00_23_readme.pdf",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.3com.com/infodeli/tools/nj/nj220_02_00_23_readme.pdf" "url": "http://support.3com.com/infodeli/tools/nj/nj220_02_00_23_readme.pdf"
}, },
{
"name" : "24705",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24705"
},
{ {
"name": "ADV-2007-2386", "name": "ADV-2007-2386",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2386" "url": "http://www.vupen.com/english/advisories/2007/2386"
}, },
{ {
"name" : "37791", "name": "24705",
"refsource" : "OSVDB", "refsource": "BID",
"url" : "http://osvdb.org/37791" "url": "http://www.securityfocus.com/bid/24705"
}, },
{ {
"name": "25883", "name": "25883",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25883" "url": "http://secunia.com/advisories/25883"
},
{
"name" : "intellijack-nj220-loopback-dos(35172)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35172"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://isc.sans.org/diary.html?storyid=3214",
"refsource" : "MISC",
"url" : "http://isc.sans.org/diary.html?storyid=3214"
},
{
"name" : "http://docs.info.apple.com/article.html?artnum=306174",
"refsource" : "CONFIRM",
"url" : "http://docs.info.apple.com/article.html?artnum=306174"
},
{ {
"name": "40882", "name": "40882",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -72,10 +62,20 @@
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018495" "url": "http://www.securitytracker.com/id?1018495"
}, },
{
"name": "http://docs.info.apple.com/article.html?artnum=306174",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=306174"
},
{ {
"name": "safari-bookmark-bo(35712)", "name": "safari-bookmark-bo(35712)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35712" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35712"
},
{
"name": "http://isc.sans.org/diary.html?storyid=3214",
"refsource": "MISC",
"url": "http://isc.sans.org/diary.html?storyid=3214"
} }
] ]
} }

View File

@ -52,11 +52,31 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "26279",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26279"
},
{
"name": "ADV-2007-2758",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2758"
},
{ {
"name": "HPSBUX02247", "name": "HPSBUX02247",
"refsource": "HP", "refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01090656" "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01090656"
}, },
{
"name": "1018501",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018501"
},
{
"name": "oval:org.mitre.oval:def:5948",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5948"
},
{ {
"name": "SSRT071432", "name": "SSRT071432",
"refsource": "HP", "refsource": "HP",
@ -66,26 +86,6 @@
"name": "25165", "name": "25165",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/25165" "url": "http://www.securityfocus.com/bid/25165"
},
{
"name" : "oval:org.mitre.oval:def:5948",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5948"
},
{
"name" : "ADV-2007-2758",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2758"
},
{
"name" : "1018501",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018501"
},
{
"name" : "26279",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26279"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070811 php-stats xss whois.php", "name": "3003",
"refsource" : "BUGTRAQ", "refsource": "SREASON",
"url" : "http://www.securityfocus.com/archive/1/476139/100/0/threaded" "url": "http://securityreason.com/securityalert/3003"
},
{
"name" : "25275",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25275"
}, },
{ {
"name": "36421", "name": "36421",
@ -68,19 +63,24 @@
"url": "http://osvdb.org/36421" "url": "http://osvdb.org/36421"
}, },
{ {
"name" : "26422", "name": "20070811 php-stats xss whois.php",
"refsource" : "SECUNIA", "refsource": "BUGTRAQ",
"url" : "http://secunia.com/advisories/26422" "url": "http://www.securityfocus.com/archive/1/476139/100/0/threaded"
},
{
"name" : "3003",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/3003"
}, },
{ {
"name": "phpstats-whois-xss(35965)", "name": "phpstats-whois-xss(35965)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35965" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35965"
},
{
"name": "25275",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25275"
},
{
"name": "26422",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26422"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2007-4474", "ID": "CVE-2007-4474",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20071220 IBM Domino Web Access Upload Control dwa7w.dll Memory Corruption", "name": "1019138",
"refsource" : "FULLDISC", "refsource": "SECTRACK",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-December/059233.html" "url": "http://www.securitytracker.com/id?1019138"
},
{
"name" : "4820",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4820"
}, },
{ {
"name": "5111", "name": "5111",
@ -68,44 +63,49 @@
"url": "https://www.exploit-db.com/exploits/5111" "url": "https://www.exploit-db.com/exploits/5111"
}, },
{ {
"name" : "4818", "name": "26972",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26972"
},
{
"name": "20071220 IBM Domino Web Access Upload Control dwa7w.dll Memory Corruption",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-December/059233.html"
},
{
"name": "domino-dwa7w-bo(39175)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39175"
},
{
"name": "4820",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4818" "url": "https://www.exploit-db.com/exploits/4820"
}, },
{ {
"name": "VU#963889", "name": "VU#963889",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/963889" "url": "http://www.kb.cert.org/vuls/id/963889"
}, },
{
"name" : "26972",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26972"
},
{ {
"name": "ADV-2007-4296", "name": "ADV-2007-4296",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/4296" "url": "http://www.vupen.com/english/advisories/2007/4296"
}, },
{
"name" : "40954",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/40954"
},
{
"name" : "1019138",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1019138"
},
{ {
"name": "28184", "name": "28184",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28184" "url": "http://secunia.com/advisories/28184"
}, },
{ {
"name" : "domino-dwa7w-bo(39175)", "name": "4818",
"refsource" : "XF", "refsource": "EXPLOIT-DB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39175" "url": "https://www.exploit-db.com/exploits/4818"
},
{
"name": "40954",
"refsource": "OSVDB",
"url": "http://osvdb.org/40954"
} }
] ]
} }

View File

@ -52,20 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "4388",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4388"
},
{ {
"name": "25611", "name": "25611",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/25611" "url": "http://www.securityfocus.com/bid/25611"
}, },
{ {
"name" : "38982", "name": "ultracrypto-cryptox-file-overwrite(36522)",
"refsource" : "OSVDB", "refsource": "XF",
"url" : "http://osvdb.org/38982" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36522"
},
{
"name": "4388",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4388"
}, },
{ {
"name": "1018675", "name": "1018675",
@ -73,9 +73,9 @@
"url": "http://www.securitytracker.com/id?1018675" "url": "http://www.securitytracker.com/id?1018675"
}, },
{ {
"name" : "ultracrypto-cryptox-file-overwrite(36522)", "name": "38982",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36522" "url": "http://osvdb.org/38982"
} }
] ]
} }

View File

@ -52,20 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "4690",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4690"
},
{ {
"name": "http://support.apple.com/kb/HT2163", "name": "http://support.apple.com/kb/HT2163",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT2163" "url": "http://support.apple.com/kb/HT2163"
}, },
{ {
"name" : "APPLE-SA-2008-06-30", "name": "ADV-2008-1981",
"refsource" : "APPLE", "refsource": "VUPEN",
"url" : "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" "url": "http://www.vupen.com/english/advisories/2008/1981/references"
},
{
"name": "macos-vpnd-dos(38855)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38855"
}, },
{ {
"name": "26699", "name": "26699",
@ -78,14 +78,9 @@
"url": "http://www.vupen.com/english/advisories/2007/4145" "url": "http://www.vupen.com/english/advisories/2007/4145"
}, },
{ {
"name" : "ADV-2008-1981", "name": "APPLE-SA-2008-06-30",
"refsource" : "VUPEN", "refsource": "APPLE",
"url" : "http://www.vupen.com/english/advisories/2008/1981/references" "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"
},
{
"name" : "1019052",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1019052"
}, },
{ {
"name": "27938", "name": "27938",
@ -98,9 +93,14 @@
"url": "http://secunia.com/advisories/30802" "url": "http://secunia.com/advisories/30802"
}, },
{ {
"name" : "macos-vpnd-dos(38855)", "name": "1019052",
"refsource" : "XF", "refsource": "SECTRACK",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38855" "url": "http://www.securitytracker.com/id?1019052"
},
{
"name": "4690",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4690"
} }
] ]
} }

View File

@ -57,40 +57,40 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4797" "url": "https://www.exploit-db.com/exploits/4797"
}, },
{
"name" : "http://www.milw0rm.com/papers/190",
"refsource" : "MISC",
"url" : "http://www.milw0rm.com/papers/190"
},
{
"name" : "http://www.sybsecurity.com/advisors/SYBSEC-ADV14-March_Networks_DVR_3204_Logfile_Information_Disclosure",
"refsource" : "MISC",
"url" : "http://www.sybsecurity.com/advisors/SYBSEC-ADV14-March_Networks_DVR_3204_Logfile_Information_Disclosure"
},
{ {
"name": "http://www.sybsecurity.com/pages/advisors/static/dvr3204_exp.txt", "name": "http://www.sybsecurity.com/pages/advisors/static/dvr3204_exp.txt",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.sybsecurity.com/pages/advisors/static/dvr3204_exp.txt" "url": "http://www.sybsecurity.com/pages/advisors/static/dvr3204_exp.txt"
}, },
{
"name" : "http://www.sybsecurity.com/resources/static/An_Insecurity_Overview_of_the_March_Networks_DVR-CCTV_3204.pdf",
"refsource" : "MISC",
"url" : "http://www.sybsecurity.com/resources/static/An_Insecurity_Overview_of_the_March_Networks_DVR-CCTV_3204.pdf"
},
{ {
"name": "27054", "name": "27054",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/27054" "url": "http://www.securityfocus.com/bid/27054"
}, },
{
"name": "http://www.sybsecurity.com/advisors/SYBSEC-ADV14-March_Networks_DVR_3204_Logfile_Information_Disclosure",
"refsource": "MISC",
"url": "http://www.sybsecurity.com/advisors/SYBSEC-ADV14-March_Networks_DVR_3204_Logfile_Information_Disclosure"
},
{ {
"name": "39726", "name": "39726",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/39726" "url": "http://osvdb.org/39726"
}, },
{
"name": "http://www.milw0rm.com/papers/190",
"refsource": "MISC",
"url": "http://www.milw0rm.com/papers/190"
},
{ {
"name": "28211", "name": "28211",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28211" "url": "http://secunia.com/advisories/28211"
},
{
"name": "http://www.sybsecurity.com/resources/static/An_Insecurity_Overview_of_the_March_Networks_DVR-CCTV_3204.pdf",
"refsource": "MISC",
"url": "http://www.sybsecurity.com/resources/static/An_Insecurity_Overview_of_the_March_Networks_DVR-CCTV_3204.pdf"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.joomla.org/content/view/4335/116/",
"refsource" : "CONFIRM",
"url" : "http://www.joomla.org/content/view/4335/116/"
},
{
"name" : "MDVSA-2008:060",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:060"
},
{ {
"name": "28111", "name": "28111",
"refsource": "BID", "refsource": "BID",
@ -72,15 +62,25 @@
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/43276" "url": "http://osvdb.org/43276"
}, },
{
"name": "29257",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29257"
},
{
"name": "http://www.joomla.org/content/view/4335/116/",
"refsource": "CONFIRM",
"url": "http://www.joomla.org/content/view/4335/116/"
},
{ {
"name": "1019145", "name": "1019145",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1019145" "url": "http://securitytracker.com/id?1019145"
}, },
{ {
"name" : "29257", "name": "MDVSA-2008:060",
"refsource" : "SECUNIA", "refsource": "MANDRIVA",
"url" : "http://secunia.com/advisories/29257" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:060"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://websecurity.com.ua/1535/",
"refsource" : "MISC",
"url" : "http://websecurity.com.ua/1535/"
},
{ {
"name": "43444", "name": "43444",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/43444" "url": "http://osvdb.org/43444"
},
{
"name": "http://websecurity.com.ua/1535/",
"refsource": "MISC",
"url": "http://websecurity.com.ua/1535/"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2010-5132", "ID": "CVE-2010-5132",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0037", "ID": "CVE-2014-0037",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20140131 Security Flaw CVE-2014-0037",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/01/31/14"
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1056767", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1056767",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056767" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056767"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1059903", "name": "[oss-security] 20140131 Security Flaw CVE-2014-0037",
"refsource" : "CONFIRM", "refsource": "MLIST",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1059903" "url": "http://www.openwall.com/lists/oss-security/2014/01/31/14"
}, },
{ {
"name": "MDVSA-2014:044", "name": "MDVSA-2014:044",
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:044" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:044"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1059903",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1059903"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2014-0578", "ID": "CVE-2014-0578",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,29 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-16.html", "name": "1032810",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-16.html" "url": "http://www.securitytracker.com/id/1032810"
},
{
"name" : "GLSA-201507-13",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201507-13"
},
{
"name" : "RHSA-2015:1214",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1214.html"
},
{
"name" : "SUSE-SU-2015:1211",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html"
},
{
"name" : "SUSE-SU-2015:1214",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html"
}, },
{ {
"name": "75594", "name": "75594",
@ -83,9 +63,29 @@
"url": "http://www.securityfocus.com/bid/75594" "url": "http://www.securityfocus.com/bid/75594"
}, },
{ {
"name" : "1032810", "name": "SUSE-SU-2015:1211",
"refsource" : "SECTRACK", "refsource": "SUSE",
"url" : "http://www.securitytracker.com/id/1032810" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html"
},
{
"name": "RHSA-2015:1214",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1214.html"
},
{
"name": "SUSE-SU-2015:1214",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html"
},
{
"name": "GLSA-201507-13",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201507-13"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-16.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-16.html"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20140406 Pearson eSIS Enterprise Student Information System SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/531751/100/0/threaded"
},
{ {
"name": "66689", "name": "66689",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/66689" "url": "http://www.securityfocus.com/bid/66689"
},
{
"name": "20140406 Pearson eSIS Enterprise Student Information System SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/531751/100/0/threaded"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2014-1523", "ID": "CVE-2014-1523",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,70 +53,20 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.mozilla.org/security/announce/2014/mfsa2014-37.html", "name": "RHSA-2014:0448",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "http://www.mozilla.org/security/announce/2014/mfsa2014-37.html" "url": "http://rhn.redhat.com/errata/RHSA-2014-0448.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=969226",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=969226"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name" : "DSA-2918",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-2918"
},
{
"name" : "DSA-2924",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-2924"
},
{
"name" : "FEDORA-2014-5829",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132437.html"
}, },
{ {
"name": "FEDORA-2014-5833", "name": "FEDORA-2014-5833",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132332.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132332.html"
}, },
{
"name" : "GLSA-201504-01",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201504-01"
},
{
"name" : "RHSA-2014:0448",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0448.html"
},
{
"name" : "RHSA-2014:0449",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0449.html"
},
{
"name" : "SUSE-SU-2014:0665",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00006.html"
},
{ {
"name": "openSUSE-SU-2014:0602", "name": "openSUSE-SU-2014:0602",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-05/msg00013.html" "url": "http://lists.opensuse.org/opensuse-updates/2014-05/msg00013.html"
}, },
{
"name" : "openSUSE-SU-2014:0640",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-05/msg00040.html"
},
{ {
"name": "openSUSE-SU-2014:0599", "name": "openSUSE-SU-2014:0599",
"refsource": "SUSE", "refsource": "SUSE",
@ -133,14 +83,19 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00015.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00015.html"
}, },
{ {
"name" : "USN-2189-1", "name": "GLSA-201504-01",
"refsource" : "UBUNTU", "refsource": "GENTOO",
"url" : "http://www.ubuntu.com/usn/USN-2189-1" "url": "https://security.gentoo.org/glsa/201504-01"
}, },
{ {
"name" : "USN-2185-1", "name": "1030165",
"refsource" : "UBUNTU", "refsource": "SECTRACK",
"url" : "http://www.ubuntu.com/usn/USN-2185-1" "url": "http://www.securitytracker.com/id/1030165"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
}, },
{ {
"name": "67129", "name": "67129",
@ -148,9 +103,49 @@
"url": "http://www.securityfocus.com/bid/67129" "url": "http://www.securityfocus.com/bid/67129"
}, },
{ {
"name" : "1030163", "name": "openSUSE-SU-2014:0640",
"refsource" : "SECTRACK", "refsource": "SUSE",
"url" : "http://www.securitytracker.com/id/1030163" "url": "http://lists.opensuse.org/opensuse-updates/2014-05/msg00040.html"
},
{
"name": "USN-2189-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2189-1"
},
{
"name": "RHSA-2014:0449",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0449.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=969226",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=969226"
},
{
"name": "http://www.mozilla.org/security/announce/2014/mfsa2014-37.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2014/mfsa2014-37.html"
},
{
"name": "SUSE-SU-2014:0665",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00006.html"
},
{
"name": "DSA-2918",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2918"
},
{
"name": "DSA-2924",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2924"
},
{
"name": "USN-2185-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2185-1"
}, },
{ {
"name": "1030164", "name": "1030164",
@ -158,9 +153,14 @@
"url": "http://www.securitytracker.com/id/1030164" "url": "http://www.securitytracker.com/id/1030164"
}, },
{ {
"name" : "1030165", "name": "1030163",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030165" "url": "http://www.securitytracker.com/id/1030163"
},
{
"name": "FEDORA-2014-5829",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132437.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2014-1741", "ID": "CVE-2014-1741",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update.html"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=349898",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=349898"
},
{ {
"name": "https://src.chromium.org/viewvc/blink?revision=171165&view=revision", "name": "https://src.chromium.org/viewvc/blink?revision=171165&view=revision",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -77,11 +67,26 @@
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201408-16.xml" "url": "http://security.gentoo.org/glsa/glsa-201408-16.xml"
}, },
{
"name": "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update.html"
},
{
"name": "60372",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60372"
},
{ {
"name": "openSUSE-SU-2014:0783", "name": "openSUSE-SU-2014:0783",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html" "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html"
}, },
{
"name": "59155",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59155"
},
{ {
"name": "67376", "name": "67376",
"refsource": "BID", "refsource": "BID",
@ -93,14 +98,9 @@
"url": "http://www.securitytracker.com/id/1030240" "url": "http://www.securitytracker.com/id/1030240"
}, },
{ {
"name" : "59155", "name": "https://code.google.com/p/chromium/issues/detail?id=349898",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/59155" "url": "https://code.google.com/p/chromium/issues/detail?id=349898"
},
{
"name" : "60372",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/60372"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5532", "ID": "CVE-2014-5532",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "name": "VU#748553",
"refsource" : "MISC", "refsource": "CERT-VN",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" "url": "http://www.kb.cert.org/vuls/id/748553"
}, },
{ {
"name": "VU#582497", "name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
}, },
{ {
"name" : "VU#748553", "name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "CERT-VN", "refsource": "MISC",
"url" : "http://www.kb.cert.org/vuls/id/748553" "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5648", "ID": "CVE-2014-5648",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#235425", "name": "VU#235425",
"refsource": "CERT-VN", "refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497", "name": "VU#582497",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2015-2121", "ID": "CVE-2015-2121",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "SSRT101932",
"refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04657310"
},
{ {
"name": "http://zerodayinitiative.com/advisories/ZDI-15-192/", "name": "http://zerodayinitiative.com/advisories/ZDI-15-192/",
"refsource": "MISC", "refsource": "MISC",
@ -62,11 +67,6 @@
"refsource": "HP", "refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04657310" "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04657310"
}, },
{
"name" : "SSRT101932",
"refsource" : "HP",
"url" : "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04657310"
},
{ {
"name": "74583", "name": "74583",
"refsource": "BID", "refsource": "BID",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-2500", "ID": "CVE-2015-2500",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,16 +57,16 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-426" "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-426"
}, },
{
"name" : "MS15-094",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-094"
},
{ {
"name": "76581", "name": "76581",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/76581" "url": "http://www.securityfocus.com/bid/76581"
}, },
{
"name": "MS15-094",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-094"
},
{ {
"name": "1033487", "name": "1033487",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-2522", "ID": "CVE-2015-2522",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-2540", "ID": "CVE-2015-2540",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-2550", "ID": "CVE-2015-2550",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS15-111",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-111"
},
{ {
"name": "1033805", "name": "1033805",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033805" "url": "http://www.securitytracker.com/id/1033805"
},
{
"name": "MS15-111",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-111"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-6057", "ID": "CVE-2015-6057",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS15-107",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-107"
},
{ {
"name": "1033802", "name": "1033802",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033802" "url": "http://www.securitytracker.com/id/1033802"
},
{
"name": "MS15-107",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-107"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-6369", "ID": "CVE-2015-6369",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@elastic.co", "ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-1000221", "ID": "CVE-2016-1000221",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -11,18 +11,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "Logstash", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "before 2.3.4" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Elastic" "vendor_name": "n/a"
} }
] ]
} }
@ -44,7 +44,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "CWE-532: Information Exposure Through Log Files" "value": "n/a"
} }
] ]
} }
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://www.elastic.co/community/security",
"refsource" : "CONFIRM",
"url" : "https://www.elastic.co/community/security"
},
{ {
"name": "99126", "name": "99126",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/99126" "url": "http://www.securityfocus.com/bid/99126"
},
{
"name": "https://www.elastic.co/community/security",
"refsource": "CONFIRM",
"url": "https://www.elastic.co/community/security"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://wordpress.org/plugins/woocommerce/changelog/",
"refsource" : "CONFIRM",
"url" : "https://wordpress.org/plugins/woocommerce/changelog/"
},
{ {
"name": "95292", "name": "95292",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/95292" "url": "http://www.securityfocus.com/bid/95292"
},
{
"name": "https://wordpress.org/plugins/woocommerce/changelog/",
"refsource": "CONFIRM",
"url": "https://wordpress.org/plugins/woocommerce/changelog/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4133", "ID": "CVE-2016-4133",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,39 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html", "name": "1036117",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html" "url": "http://www.securitytracker.com/id/1036117"
}, },
{ {
"name": "MS16-083", "name": "MS16-083",
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083"
}, },
{
"name": "openSUSE-SU-2016:1625",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html"
},
{ {
"name": "RHSA-2016:1238", "name": "RHSA-2016:1238",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1238" "url": "https://access.redhat.com/errata/RHSA-2016:1238"
}, },
{
"name" : "SUSE-SU-2016:1613",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html"
},
{ {
"name": "openSUSE-SU-2016:1621", "name": "openSUSE-SU-2016:1621",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html"
}, },
{ {
"name" : "openSUSE-SU-2016:1625", "name": "SUSE-SU-2016:1613",
"refsource": "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html"
}, },
{ {
"name" : "1036117", "name": "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1036117" "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4197", "ID": "CVE-2016-4197",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-16-415",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-16-415"
},
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-26.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-26.html"
},
{ {
"name": "91716", "name": "91716",
"refsource": "BID", "refsource": "BID",
@ -71,6 +61,16 @@
"name": "1036281", "name": "1036281",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036281" "url": "http://www.securitytracker.com/id/1036281"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-26.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-26.html"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-415",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-415"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@debian.org",
"ID": "CVE-2016-4542", "ID": "CVE-2016-4542",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,55 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20160505 CVE Request: PHP: several issues fixed with 7.0.6, 5.6.21 and 5.5.35",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/05/05/21"
},
{
"name" : "http://php.net/ChangeLog-5.php",
"refsource" : "CONFIRM",
"url" : "http://php.net/ChangeLog-5.php"
},
{
"name" : "http://php.net/ChangeLog-7.php",
"refsource" : "CONFIRM",
"url" : "http://php.net/ChangeLog-7.php"
},
{
"name" : "https://bugs.php.net/bug.php?id=72094",
"refsource" : "CONFIRM",
"url" : "https://bugs.php.net/bug.php?id=72094"
},
{
"name" : "https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92",
"refsource" : "CONFIRM",
"url" : "https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
},
{ {
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149", "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149" "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149"
}, },
{ {
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722", "name": "89844",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722" "url": "http://www.securityfocus.com/bid/89844"
}, },
{ {
"name" : "DSA-3602", "name": "openSUSE-SU-2016:1524",
"refsource" : "DEBIAN", "refsource": "SUSE",
"url" : "http://www.debian.org/security/2016/dsa-3602" "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html"
},
{
"name" : "FEDORA-2016-f4e73663f4",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html"
}, },
{ {
"name": "GLSA-201611-22", "name": "GLSA-201611-22",
@ -113,9 +78,44 @@
"url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html" "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
}, },
{ {
"name" : "openSUSE-SU-2016:1524", "name": "[oss-security] 20160505 CVE Request: PHP: several issues fixed with 7.0.6, 5.6.21 and 5.5.35",
"refsource" : "SUSE", "refsource": "MLIST",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html" "url": "http://www.openwall.com/lists/oss-security/2016/05/05/21"
},
{
"name": "DSA-3602",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3602"
},
{
"name": "http://php.net/ChangeLog-5.php",
"refsource": "CONFIRM",
"url": "http://php.net/ChangeLog-5.php"
},
{
"name": "https://bugs.php.net/bug.php?id=72094",
"refsource": "CONFIRM",
"url": "https://bugs.php.net/bug.php?id=72094"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
},
{
"name": "http://php.net/ChangeLog-7.php",
"refsource": "CONFIRM",
"url": "http://php.net/ChangeLog-7.php"
},
{
"name": "https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92",
"refsource": "CONFIRM",
"url": "https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
}, },
{ {
"name": "openSUSE-SU-2016:1357", "name": "openSUSE-SU-2016:1357",
@ -123,9 +123,9 @@
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html" "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html"
}, },
{ {
"name" : "89844", "name": "FEDORA-2016-f4e73663f4",
"refsource" : "BID", "refsource": "FEDORA",
"url" : "http://www.securityfocus.com/bid/89844" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html"
} }
] ]
} }

View File

@ -64,11 +64,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
},
{ {
"name": "95517", "name": "95517",
"refsource": "BID", "refsource": "BID",
@ -78,6 +73,11 @@
"name": "1037636", "name": "1037636",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037636" "url": "http://www.securitytracker.com/id/1037636"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-9322", "ID": "CVE-2016-9322",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -75,11 +75,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1319524%2C1298773%2C1299098%2C1309834%2C1312609%2C1313212%2C1317805%2C1312548%2C1315631%2C1287912",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1319524%2C1298773%2C1299098%2C1309834%2C1312609%2C1313212%2C1317805%2C1312548%2C1315631%2C1287912"
},
{ {
"name": "https://www.mozilla.org/security/advisories/mfsa2016-94/", "name": "https://www.mozilla.org/security/advisories/mfsa2016-94/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -91,29 +86,9 @@
"url": "https://www.mozilla.org/security/advisories/mfsa2016-95/" "url": "https://www.mozilla.org/security/advisories/mfsa2016-95/"
}, },
{ {
"name" : "https://www.mozilla.org/security/advisories/mfsa2016-96/", "name": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1319524%2C1298773%2C1299098%2C1309834%2C1312609%2C1313212%2C1317805%2C1312548%2C1315631%2C1287912",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://www.mozilla.org/security/advisories/mfsa2016-96/" "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1319524%2C1298773%2C1299098%2C1309834%2C1312609%2C1313212%2C1317805%2C1312548%2C1315631%2C1287912"
},
{
"name" : "DSA-3757",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2017/dsa-3757"
},
{
"name" : "GLSA-201701-15",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201701-15"
},
{
"name" : "RHSA-2016:2946",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2946.html"
},
{
"name" : "RHSA-2016:2973",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2973.html"
}, },
{ {
"name": "94885", "name": "94885",
@ -124,6 +99,31 @@
"name": "1037461", "name": "1037461",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037461" "url": "http://www.securitytracker.com/id/1037461"
},
{
"name": "GLSA-201701-15",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-15"
},
{
"name": "DSA-3757",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-3757"
},
{
"name": "RHSA-2016:2973",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2973.html"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2016-96/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2016-96/"
},
{
"name": "RHSA-2016:2946",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2946.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@debian.org",
"ID": "CVE-2016-9961", "ID": "CVE-2016-9961",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,51 +52,31 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20161215 Re: CVE Request: Game Music Emulators: incorrect emulation of the SPC700 audio co-processor of SNES: arbitrary code execution via malformed SPC music file",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/12/15/11"
},
{
"name" : "https://scarybeastsecurity.blogspot.cz/2016/12/redux-compromising-linux-using-snes.html",
"refsource" : "MISC",
"url" : "https://scarybeastsecurity.blogspot.cz/2016/12/redux-compromising-linux-using-snes.html"
},
{
"name" : "https://bitbucket.org/mpyne/game-music-emu/wiki/Home",
"refsource" : "CONFIRM",
"url" : "https://bitbucket.org/mpyne/game-music-emu/wiki/Home"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1405423",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1405423"
},
{
"name" : "FEDORA-2016-04383482b4",
"refsource" : "FEDORA",
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LKMKVYS7AVB2EXC463FUYN6C6FABHME/"
},
{ {
"name": "FEDORA-2016-fbf9f8b204", "name": "FEDORA-2016-fbf9f8b204",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GGHAQI5Q2XDSPGRRKPJJM3A73VWAFSFL/" "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GGHAQI5Q2XDSPGRRKPJJM3A73VWAFSFL/"
}, },
{ {
"name" : "FEDORA-2017-3d771a1702", "name": "95305",
"refsource" : "FEDORA", "refsource": "BID",
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QHFKIFSFIDXOKFUKAH2MBNXDTY6DYBF6/" "url": "http://www.securityfocus.com/bid/95305"
}, },
{ {
"name" : "FEDORA-2017-5bf9a268df", "name": "[oss-security] 20161215 Re: CVE Request: Game Music Emulators: incorrect emulation of the SPC700 audio co-processor of SNES: arbitrary code execution via malformed SPC music file",
"refsource" : "FEDORA", "refsource": "MLIST",
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F7Z2OVERYM6NW3FGVGTJUNSL5ZNFSH2S/" "url": "http://www.openwall.com/lists/oss-security/2016/12/15/11"
}, },
{ {
"name": "GLSA-201707-02", "name": "GLSA-201707-02",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201707-02" "url": "https://security.gentoo.org/glsa/201707-02"
}, },
{
"name": "FEDORA-2017-5bf9a268df",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F7Z2OVERYM6NW3FGVGTJUNSL5ZNFSH2S/"
},
{ {
"name": "SUSE-SU-2016:3250", "name": "SUSE-SU-2016:3250",
"refsource": "SUSE", "refsource": "SUSE",
@ -108,9 +88,29 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00005.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00005.html"
}, },
{ {
"name" : "95305", "name": "https://bitbucket.org/mpyne/game-music-emu/wiki/Home",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/95305" "url": "https://bitbucket.org/mpyne/game-music-emu/wiki/Home"
},
{
"name": "FEDORA-2016-04383482b4",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LKMKVYS7AVB2EXC463FUYN6C6FABHME/"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1405423",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1405423"
},
{
"name": "FEDORA-2017-3d771a1702",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QHFKIFSFIDXOKFUKAH2MBNXDTY6DYBF6/"
},
{
"name": "https://scarybeastsecurity.blogspot.cz/2016/12/redux-compromising-linux-using-snes.html",
"refsource": "MISC",
"url": "https://scarybeastsecurity.blogspot.cz/2016/12/redux-compromising-linux-using-snes.html"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{ {
"name": "106579", "name": "106579",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/106579" "url": "http://www.securityfocus.com/bid/106579"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
} }
] ]
} }

View File

@ -58,15 +58,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
}, },
{
"name" : "https://security.netapp.com/advisory/ntap-20190118-0002/",
"refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20190118-0002/"
},
{ {
"name": "106622", "name": "106622",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/106622" "url": "http://www.securityfocus.com/bid/106622"
},
{
"name": "https://security.netapp.com/advisory/ntap-20190118-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20190118-0002/"
} }
] ]
} }