"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 22:02:33 +00:00
parent e6d40c447e
commit 87ff3f7630
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
59 changed files with 3627 additions and 3627 deletions

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "ADV-2007-0341",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0341"
},
{ {
"name": "36634", "name": "36634",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/36634" "url": "http://osvdb.org/36634"
},
{
"name": "ADV-2007-0341",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0341"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4058" "url": "https://www.exploit-db.com/exploits/4058"
}, },
{
"name" : "24403",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24403"
},
{ {
"name": "aceftp-server-bo(34795)", "name": "aceftp-server-bo(34795)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34795" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34795"
},
{
"name": "24403",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24403"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "26112",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26112"
},
{ {
"name": "activereports-arpro2-file-overwrite(36056)", "name": "activereports-arpro2-file-overwrite(36056)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36056" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36056"
},
{
"name": "26112",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26112"
} }
] ]
} }

View File

@ -53,64 +53,64 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070829 Multiple vulnerabilities in Doomsday 1.9.0-beta5.1", "name": "3084",
"refsource" : "BUGTRAQ", "refsource": "SREASON",
"url" : "http://www.securityfocus.com/archive/1/478077/100/0/threaded" "url": "http://securityreason.com/securityalert/3084"
},
{
"name" : "http://aluigi.altervista.org/adv/dumsdei-adv.txt",
"refsource" : "MISC",
"url" : "http://aluigi.altervista.org/adv/dumsdei-adv.txt"
},
{
"name" : "http://aluigi.org/poc/dumsdei.zip",
"refsource" : "MISC",
"url" : "http://aluigi.org/poc/dumsdei.zip"
},
{
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=190835",
"refsource" : "CONFIRM",
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=190835"
},
{
"name" : "GLSA-200802-02",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200802-02.xml"
},
{
"name" : "25483",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25483"
},
{
"name" : "26524",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26524"
}, },
{ {
"name": "28821", "name": "28821",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28821" "url": "http://secunia.com/advisories/28821"
}, },
{
"name" : "3084",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/3084"
},
{ {
"name": "doomsday-dnetplayerevent-bo(36332)", "name": "doomsday-dnetplayerevent-bo(36332)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36332" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36332"
}, },
{
"name": "http://aluigi.altervista.org/adv/dumsdei-adv.txt",
"refsource": "MISC",
"url": "http://aluigi.altervista.org/adv/dumsdei-adv.txt"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=190835",
"refsource": "CONFIRM",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=190835"
},
{
"name": "26524",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26524"
},
{
"name": "20070829 Multiple vulnerabilities in Doomsday 1.9.0-beta5.1",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/478077/100/0/threaded"
},
{ {
"name": "doomsday-msgwrite-bo(36333)", "name": "doomsday-msgwrite-bo(36333)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36333" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36333"
}, },
{
"name": "25483",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25483"
},
{
"name": "GLSA-200802-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200802-02.xml"
},
{ {
"name": "doomsday-netsvreadcommands-bo(36334)", "name": "doomsday-netsvreadcommands-bo(36334)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36334" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36334"
},
{
"name": "http://aluigi.org/poc/dumsdei.zip",
"refsource": "MISC",
"url": "http://aluigi.org/poc/dumsdei.zip"
} }
] ]
} }

View File

@ -53,49 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20080122 PHP 5.2.5 cURL safe_mode bypass", "name": "ADV-2008-1412",
"refsource" : "SREASONRES", "refsource": "VUPEN",
"url" : "http://securityreason.com/achievement_securityalert/51" "url": "http://www.vupen.com/english/advisories/2008/1412"
},
{
"name" : "20080122 PHP 5.2.5 cURL safe_mode bypass",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/486856/100/0/threaded"
},
{
"name" : "20080527 rPSA-2008-0178-1 php php-mysql php-pgsql",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/492671/100/0/threaded"
},
{
"name" : "20080122 PHP 5.2.5 cURL safe_mode bypass",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059849.html"
},
{
"name" : "[oss-security] 20080502 CVE Request (PHP)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2008/05/02/2"
},
{
"name" : "http://cvs.php.net/viewcvs.cgi/php-src/NEWS?revision=1.2027.2.547.2.1047&view=markup",
"refsource" : "CONFIRM",
"url" : "http://cvs.php.net/viewcvs.cgi/php-src/NEWS?revision=1.2027.2.547.2.1047&view=markup"
},
{
"name" : "http://www.php.net/ChangeLog-5.php",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/ChangeLog-5.php"
},
{
"name" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0178",
"refsource" : "CONFIRM",
"url" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0178"
},
{
"name" : "http://support.apple.com/kb/HT3216",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT3216"
}, },
{ {
"name": "APPLE-SA-2008-07-31", "name": "APPLE-SA-2008-07-31",
@ -103,29 +63,9 @@
"url": "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html" "url": "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html"
}, },
{ {
"name" : "APPLE-SA-2008-10-09", "name": "31681",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
},
{
"name" : "MDVSA-2009:022",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:022"
},
{
"name" : "MDVSA-2009:023",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:023"
},
{
"name" : "USN-628-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-628-1"
},
{
"name" : "27413",
"refsource": "BID", "refsource": "BID",
"url" : "http://www.securityfocus.com/bid/27413" "url": "http://www.securityfocus.com/bid/31681"
}, },
{ {
"name": "29009", "name": "29009",
@ -133,14 +73,9 @@
"url": "http://www.securityfocus.com/bid/29009" "url": "http://www.securityfocus.com/bid/29009"
}, },
{ {
"name" : "31681", "name": "27413",
"refsource": "BID", "refsource": "BID",
"url" : "http://www.securityfocus.com/bid/31681" "url": "http://www.securityfocus.com/bid/27413"
},
{
"name" : "ADV-2008-1412",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/1412"
}, },
{ {
"name": "ADV-2008-2268", "name": "ADV-2008-2268",
@ -148,49 +83,114 @@
"url": "http://www.vupen.com/english/advisories/2008/2268" "url": "http://www.vupen.com/english/advisories/2008/2268"
}, },
{ {
"name" : "ADV-2008-2780", "name": "USN-628-1",
"refsource" : "VUPEN", "refsource": "UBUNTU",
"url" : "http://www.vupen.com/english/advisories/2008/2780" "url": "http://www.ubuntu.com/usn/usn-628-1"
}, },
{ {
"name" : "30048", "name": "20080122 PHP 5.2.5 cURL safe_mode bypass",
"refsource" : "SECUNIA", "refsource": "BUGTRAQ",
"url" : "http://secunia.com/advisories/30048" "url": "http://www.securityfocus.com/archive/1/486856/100/0/threaded"
},
{
"name": "20080122 PHP 5.2.5 cURL safe_mode bypass",
"refsource": "SREASONRES",
"url": "http://securityreason.com/achievement_securityalert/51"
},
{
"name": "[oss-security] 20080502 CVE Request (PHP)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/05/02/2"
},
{
"name": "20080527 rPSA-2008-0178-1 php php-mysql php-pgsql",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/492671/100/0/threaded"
}, },
{ {
"name": "30411", "name": "30411",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30411" "url": "http://secunia.com/advisories/30411"
}, },
{
"name": "http://www.php.net/ChangeLog-5.php",
"refsource": "CONFIRM",
"url": "http://www.php.net/ChangeLog-5.php"
},
{
"name": "MDVSA-2009:023",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:023"
},
{
"name": "MDVSA-2009:022",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:022"
},
{ {
"name": "31200", "name": "31200",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31200" "url": "http://secunia.com/advisories/31200"
}, },
{
"name" : "31326",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31326"
},
{ {
"name": "32222", "name": "32222",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32222" "url": "http://secunia.com/advisories/32222"
}, },
{
"name": "20080122 PHP 5.2.5 cURL safe_mode bypass",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059849.html"
},
{ {
"name": "3562", "name": "3562",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3562" "url": "http://securityreason.com/securityalert/3562"
}, },
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0178",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0178"
},
{
"name": "31326",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31326"
},
{
"name": "ADV-2008-2780",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2780"
},
{
"name": "php-safemode-directive-security-bypass(42134)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42134"
},
{ {
"name": "php-curlinit-security-bypass(39852)", "name": "php-curlinit-security-bypass(39852)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39852" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39852"
}, },
{ {
"name" : "php-safemode-directive-security-bypass(42134)", "name": "APPLE-SA-2008-10-09",
"refsource" : "XF", "refsource": "APPLE",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42134" "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
},
{
"name": "http://support.apple.com/kb/HT3216",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3216"
},
{
"name": "http://cvs.php.net/viewcvs.cgi/php-src/NEWS?revision=1.2027.2.547.2.1047&view=markup",
"refsource": "CONFIRM",
"url": "http://cvs.php.net/viewcvs.cgi/php-src/NEWS?revision=1.2027.2.547.2.1047&view=markup"
},
{
"name": "30048",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30048"
} }
] ]
} }

View File

@ -57,16 +57,6 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.nohack.cn/hacknews/20071119/1916.html" "url": "http://www.nohack.cn/hacknews/20071119/1916.html"
}, },
{
"name" : "http://www.sebug.net/exploit/2575",
"refsource" : "MISC",
"url" : "http://www.sebug.net/exploit/2575"
},
{
"name" : "26536",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26536"
},
{ {
"name": "ADV-2007-3982", "name": "ADV-2007-3982",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -77,6 +67,16 @@
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/39680" "url": "http://osvdb.org/39680"
}, },
{
"name": "26536",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26536"
},
{
"name": "http://www.sebug.net/exploit/2575",
"refsource": "MISC",
"url": "http://www.sebug.net/exploit/2575"
},
{ {
"name": "27795", "name": "27795",
"refsource": "SECUNIA", "refsource": "SECUNIA",

View File

@ -57,16 +57,16 @@
"refsource": "FULLDISC", "refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-12/0470.html" "url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-12/0470.html"
}, },
{
"name" : "http://www.heise-security.co.uk/news/100934",
"refsource" : "MISC",
"url" : "http://www.heise-security.co.uk/news/100934"
},
{ {
"name": "26967", "name": "26967",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/26967" "url": "http://www.securityfocus.com/bid/26967"
}, },
{
"name": "http://www.heise-security.co.uk/news/100934",
"refsource": "MISC",
"url": "http://www.heise-security.co.uk/news/100934"
},
{ {
"name": "hp-esupportdiagnostics-info-disclosure(39156)", "name": "hp-esupportdiagnostics-info-disclosure(39156)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "http://www.opera.com/docs/changelogs/windows/925/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/windows/925/"
},
{ {
"name": "http://bugs.gentoo.org/show_bug.cgi?id=202770", "name": "http://bugs.gentoo.org/show_bug.cgi?id=202770",
"refsource": "MISC", "refsource": "MISC",
@ -63,35 +68,40 @@
"url": "http://www.opera.com/docs/changelogs/linux/925/" "url": "http://www.opera.com/docs/changelogs/linux/925/"
}, },
{ {
"name" : "http://www.opera.com/docs/changelogs/windows/925/", "name": "1019131",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "http://www.opera.com/docs/changelogs/windows/925/" "url": "http://www.securitytracker.com/id?1019131"
}, },
{ {
"name" : "GLSA-200712-22", "name": "28314",
"refsource" : "GENTOO", "refsource": "SECUNIA",
"url" : "http://security.gentoo.org/glsa/glsa-200712-22.xml" "url": "http://secunia.com/advisories/28314"
},
{
"name" : "SUSE-SA:2008:001",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00001.html"
}, },
{ {
"name": "26937", "name": "26937",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/26937" "url": "http://www.securityfocus.com/bid/26937"
}, },
{
"name": "opera-plugins-security-bypass(39147)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39147"
},
{
"name": "SUSE-SA:2008:001",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00001.html"
},
{
"name": "GLSA-200712-22",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200712-22.xml"
},
{ {
"name": "ADV-2007-4261", "name": "ADV-2007-4261",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/4261" "url": "http://www.vupen.com/english/advisories/2007/4261"
}, },
{
"name" : "1019131",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1019131"
},
{ {
"name": "28169", "name": "28169",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -101,16 +111,6 @@
"name": "28290", "name": "28290",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28290" "url": "http://secunia.com/advisories/28290"
},
{
"name" : "28314",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28314"
},
{
"name" : "opera-plugins-security-bypass(39147)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39147"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-5103", "ID": "CVE-2010-5103",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,26 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20110113 CVE requests: ftpls, xdigger, lbreakout2, calibre, typo3",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/01/13/2"
},
{
"name" : "[oss-security] 20120510 Re: CVE-request: TYPO3 TYPO3-SA-2010-022 still without CVE",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/05/11/3"
},
{
"name" : "[oss-security] 20120511 CVE-request: TYPO3 TYPO3-SA-2010-022 still without CVE",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/05/10/7"
},
{
"name" : "[oss-security] 20120512 Re: CVE-request: TYPO3 TYPO3-SA-2010-022 still without CVE",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/05/12/5"
},
{ {
"name": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022/", "name": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -82,20 +62,40 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/45470" "url": "http://www.securityfocus.com/bid/45470"
}, },
{
"name" : "70117",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/70117"
},
{ {
"name": "35770", "name": "35770",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35770" "url": "http://secunia.com/advisories/35770"
}, },
{
"name": "[oss-security] 20120512 Re: CVE-request: TYPO3 TYPO3-SA-2010-022 still without CVE",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/05/12/5"
},
{
"name": "[oss-security] 20110113 CVE requests: ftpls, xdigger, lbreakout2, calibre, typo3",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/01/13/2"
},
{
"name": "[oss-security] 20120510 Re: CVE-request: TYPO3 TYPO3-SA-2010-022 still without CVE",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/05/11/3"
},
{ {
"name": "typo3-listmodule-sql-injection(64184)", "name": "typo3-listmodule-sql-injection(64184)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64184" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64184"
},
{
"name": "70117",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/70117"
},
{
"name": "[oss-security] 20120511 CVE-request: TYPO3 TYPO3-SA-2010-022 still without CVE",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/05/10/7"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://packetstormsecurity.org/1010-exploits/smartftp4-dllhijack.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/1010-exploits/smartftp4-dllhijack.txt"
},
{ {
"name": "41808", "name": "41808",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41808" "url": "http://secunia.com/advisories/41808"
},
{
"name": "http://packetstormsecurity.org/1010-exploits/smartftp4-dllhijack.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/1010-exploits/smartftp4-dllhijack.txt"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0036", "ID": "CVE-2014-0036",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "FEDORA-2014-3573",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130148.html"
},
{
"name": "FEDORA-2014-3526",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130180.html"
},
{ {
"name": "[oss-security] 20140306 CVE-2014-0036 rubygem-rbovirt: unsafe use of rest-client", "name": "[oss-security] 20140306 CVE-2014-0036 rubygem-rbovirt: unsafe use of rest-client",
"refsource": "MLIST", "refsource": "MLIST",
@ -61,16 +71,6 @@
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1058595", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1058595",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1058595" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1058595"
},
{
"name" : "FEDORA-2014-3526",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130180.html"
},
{
"name" : "FEDORA-2014-3573",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130148.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2014-1557", "ID": "CVE-2014-1557",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.mozilla.org/security/announce/2014/mfsa2014-64.html", "name": "59719",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://www.mozilla.org/security/announce/2014/mfsa2014-64.html" "url": "http://secunia.com/advisories/59719"
}, },
{ {
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=913805", "name": "60083",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=913805" "url": "http://secunia.com/advisories/60083"
},
{
"name": "60621",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60621"
},
{
"name": "68824",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/68824"
},
{
"name": "GLSA-201504-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201504-01"
},
{
"name": "60306",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60306"
}, },
{ {
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
@ -73,9 +93,14 @@
"url": "http://linux.oracle.com/errata/ELSA-2014-0918.html" "url": "http://linux.oracle.com/errata/ELSA-2014-0918.html"
}, },
{ {
"name" : "DSA-2986", "name": "1030620",
"refsource" : "DEBIAN", "refsource": "SECTRACK",
"url" : "http://www.debian.org/security/2014/dsa-2986" "url": "http://www.securitytracker.com/id/1030620"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=913805",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=913805"
}, },
{ {
"name": "DSA-2996", "name": "DSA-2996",
@ -83,64 +108,39 @@
"url": "http://www.debian.org/security/2014/dsa-2996" "url": "http://www.debian.org/security/2014/dsa-2996"
}, },
{ {
"name" : "GLSA-201504-01", "name": "http://www.mozilla.org/security/announce/2014/mfsa2014-64.html",
"refsource" : "GENTOO", "refsource": "CONFIRM",
"url" : "https://security.gentoo.org/glsa/201504-01" "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-64.html"
},
{
"name" : "68824",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/68824"
}, },
{ {
"name": "1030619", "name": "1030619",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030619" "url": "http://www.securitytracker.com/id/1030619"
}, },
{
"name" : "1030620",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030620"
},
{
"name" : "59591",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59591"
},
{
"name" : "59719",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59719"
},
{
"name" : "59760",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59760"
},
{
"name" : "60306",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/60306"
},
{ {
"name": "60486", "name": "60486",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60486" "url": "http://secunia.com/advisories/60486"
}, },
{
"name" : "60621",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/60621"
},
{ {
"name": "60628", "name": "60628",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60628" "url": "http://secunia.com/advisories/60628"
}, },
{ {
"name" : "60083", "name": "DSA-2986",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2986"
},
{
"name": "59760",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/60083" "url": "http://secunia.com/advisories/59760"
},
{
"name": "59591",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59591"
} }
] ]
} }

View File

@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20140122 Getting tempfile/mktemp wrong",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/01/22/3"
},
{ {
"name": "[oss-security] 20140122 Re: Getting tempfile/mktemp wrong", "name": "[oss-security] 20140122 Re: Getting tempfile/mktemp wrong",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/01/22/4" "url": "http://www.openwall.com/lists/oss-security/2014/01/22/4"
}, },
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736358",
"refsource" : "MISC",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736358"
},
{ {
"name": "102383", "name": "102383",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/102383" "url": "http://www.osvdb.org/102383"
}, },
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736358",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736358"
},
{ {
"name": "axiom-cve20141640-symlink(90663)", "name": "axiom-cve20141640-symlink(90663)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90663" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90663"
},
{
"name": "[oss-security] 20140122 Getting tempfile/mktemp wrong",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/01/22/3"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://osandamalith.wordpress.com/2014/02/02/mybb-1-6-12-post-xss-0day/",
"refsource" : "MISC",
"url" : "http://osandamalith.wordpress.com/2014/02/02/mybb-1-6-12-post-xss-0day/"
},
{ {
"name": "http://packetstormsecurity.com/files/125038/MyBB-1.6.12-POST-Cross-Site-Scripting.html", "name": "http://packetstormsecurity.com/files/125038/MyBB-1.6.12-POST-Cross-Site-Scripting.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/125038/MyBB-1.6.12-POST-Cross-Site-Scripting.html" "url": "http://packetstormsecurity.com/files/125038/MyBB-1.6.12-POST-Cross-Site-Scripting.html"
},
{
"name": "http://osandamalith.wordpress.com/2014/02/02/mybb-1-6-12-post-xss-0day/",
"refsource": "MISC",
"url": "http://osandamalith.wordpress.com/2014/02/02/mybb-1-6-12-post-xss-0day/"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20140722 Reflected XSS vulnerabilities in DELL SonicWALL GMS 7.2 Build: 7221.1701 (CVE-2014-5024)", "name": "68829",
"refsource" : "FULLDISC", "refsource": "BID",
"url" : "http://seclists.org/fulldisclosure/2014/Jul/125" "url": "http://www.securityfocus.com/bid/68829"
},
{
"name" : "http://packetstormsecurity.com/files/127575/SonicWALL-GMS-7.2-Build-7221.1701-Cross-Site-Scripting.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/127575/SonicWALL-GMS-7.2-Build-7221.1701-Cross-Site-Scripting.html"
}, },
{ {
"name": "https://support.software.dell.com/product-notification/128245", "name": "https://support.software.dell.com/product-notification/128245",
@ -68,14 +63,19 @@
"url": "https://support.software.dell.com/product-notification/128245" "url": "https://support.software.dell.com/product-notification/128245"
}, },
{ {
"name" : "68829", "name": "20140722 Reflected XSS vulnerabilities in DELL SonicWALL GMS 7.2 Build: 7221.1701 (CVE-2014-5024)",
"refsource" : "BID", "refsource": "FULLDISC",
"url" : "http://www.securityfocus.com/bid/68829" "url": "http://seclists.org/fulldisclosure/2014/Jul/125"
}, },
{ {
"name": "60287", "name": "60287",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60287" "url": "http://secunia.com/advisories/60287"
},
{
"name": "http://packetstormsecurity.com/files/127575/SonicWALL-GMS-7.2-Build-7221.1701-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/127575/SonicWALL-GMS-7.2-Build-7221.1701-Cross-Site-Scripting.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2014-5400", "ID": "CVE-2014-5400",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,16 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "openSUSE-SU-2015:0489",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html"
},
{
"name": "72941",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72941"
},
{ {
"name": "http://www.wireshark.org/security/wnpa-sec-2015-10.html", "name": "http://www.wireshark.org/security/wnpa-sec-2015-10.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2015-10.html" "url": "http://www.wireshark.org/security/wnpa-sec-2015-10.html"
}, },
{
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11023",
"refsource" : "CONFIRM",
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11023"
},
{ {
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=608cf324b3962877e9699f3e81e8f82ac9f1ea14", "name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=608cf324b3962877e9699f3e81e8f82ac9f1ea14",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -72,45 +77,40 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2015-0117.html" "url": "http://advisories.mageia.org/MGASA-2015-0117.html"
}, },
{
"name": "1031858",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031858"
},
{
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11023",
"refsource": "CONFIRM",
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11023"
},
{ {
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
}, },
{
"name" : "DSA-3210",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3210"
},
{
"name" : "GLSA-201510-03",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201510-03"
},
{ {
"name": "MDVSA-2015:183", "name": "MDVSA-2015:183",
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:183" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:183"
}, },
{
"name": "DSA-3210",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3210"
},
{ {
"name": "RHSA-2015:1460", "name": "RHSA-2015:1460",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1460.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-1460.html"
}, },
{ {
"name" : "openSUSE-SU-2015:0489", "name": "GLSA-201510-03",
"refsource" : "SUSE", "refsource": "GENTOO",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html" "url": "https://security.gentoo.org/glsa/201510-03"
},
{
"name" : "72941",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/72941"
},
{
"name" : "1031858",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1031858"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "36413", "name": "https://wpvulndb.com/vulnerabilities/7841",
"refsource" : "EXPLOIT-DB", "refsource": "MISC",
"url" : "https://www.exploit-db.com/exploits/36413/" "url": "https://wpvulndb.com/vulnerabilities/7841"
},
{
"name" : "20150312 WordPress SEO by Yoast <= 1.7.3.3 - Blind SQL Injection",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2015/Mar/73"
}, },
{ {
"name": "http://packetstormsecurity.com/files/130811/WordPress-SEO-By-Yoast-1.7.3.3-SQL-Injection.html", "name": "http://packetstormsecurity.com/files/130811/WordPress-SEO-By-Yoast-1.7.3.3-SQL-Injection.html",
@ -68,9 +63,14 @@
"url": "http://packetstormsecurity.com/files/130811/WordPress-SEO-By-Yoast-1.7.3.3-SQL-Injection.html" "url": "http://packetstormsecurity.com/files/130811/WordPress-SEO-By-Yoast-1.7.3.3-SQL-Injection.html"
}, },
{ {
"name" : "https://wpvulndb.com/vulnerabilities/7841", "name": "https://yoast.com/wordpress-seo-security-release/",
"refsource" : "MISC", "refsource": "CONFIRM",
"url" : "https://wpvulndb.com/vulnerabilities/7841" "url": "https://yoast.com/wordpress-seo-security-release/"
},
{
"name": "36413",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/36413/"
}, },
{ {
"name": "https://wordpress.org/plugins/wordpress-seo/changelog/", "name": "https://wordpress.org/plugins/wordpress-seo/changelog/",
@ -78,9 +78,9 @@
"url": "https://wordpress.org/plugins/wordpress-seo/changelog/" "url": "https://wordpress.org/plugins/wordpress-seo/changelog/"
}, },
{ {
"name" : "https://yoast.com/wordpress-seo-security-release/", "name": "20150312 WordPress SEO by Yoast <= 1.7.3.3 - Blind SQL Injection",
"refsource" : "CONFIRM", "refsource": "FULLDISC",
"url" : "https://yoast.com/wordpress-seo-security-release/" "url": "http://seclists.org/fulldisclosure/2015/Mar/73"
}, },
{ {
"name": "1031920", "name": "1031920",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-2785", "ID": "CVE-2015-2785",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20150206 byzanz: Out-of heap-based buffer write in GIF encoder",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/02/06/11"
},
{ {
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778261", "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778261",
"refsource": "MISC", "refsource": "MISC",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778261" "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778261"
}, },
{
"name": "[oss-security] 20150206 byzanz: Out-of heap-based buffer write in GIF encoder",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/02/06/11"
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=852481", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=852481",
"refsource": "CONFIRM", "refsource": "CONFIRM",

View File

@ -52,25 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=5b53445e815fd6b652d49df03ec3d60b088c4fbc",
"refsource": "CONFIRM",
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=5b53445e815fd6b652d49df03ec3d60b088c4fbc"
},
{ {
"name": "http://www.wireshark.org/security/wnpa-sec-2015-28.html", "name": "http://www.wireshark.org/security/wnpa-sec-2015-28.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2015-28.html" "url": "http://www.wireshark.org/security/wnpa-sec-2015-28.html"
}, },
{
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358",
"refsource" : "CONFIRM",
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358"
},
{ {
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=3fc4a831e035604b0af14ed8a5c9f6596a3448d0", "name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=3fc4a831e035604b0af14ed8a5c9f6596a3448d0",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=3fc4a831e035604b0af14ed8a5c9f6596a3448d0" "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=3fc4a831e035604b0af14ed8a5c9f6596a3448d0"
}, },
{ {
"name" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=5b53445e815fd6b652d49df03ec3d60b088c4fbc", "name": "FEDORA-2015-13945",
"refsource" : "CONFIRM", "refsource": "FEDORA",
"url" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=5b53445e815fd6b652d49df03ec3d60b088c4fbc" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168837.html"
},
{
"name": "1033272",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033272"
}, },
{ {
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
@ -78,19 +83,9 @@
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358"
},
{
"name" : "DSA-3367",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3367"
},
{
"name" : "FEDORA-2015-13945",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168837.html"
}, },
{ {
"name": "FEDORA-2015-13946", "name": "FEDORA-2015-13946",
@ -98,9 +93,9 @@
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165509.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165509.html"
}, },
{ {
"name" : "openSUSE-SU-2015:1836", "name": "DSA-3367",
"refsource" : "SUSE", "refsource": "DEBIAN",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html" "url": "http://www.debian.org/security/2015/dsa-3367"
}, },
{ {
"name": "76387", "name": "76387",
@ -108,9 +103,14 @@
"url": "http://www.securityfocus.com/bid/76387" "url": "http://www.securityfocus.com/bid/76387"
}, },
{ {
"name" : "1033272", "name": "openSUSE-SU-2015:1836",
"refsource" : "SECTRACK", "refsource": "SUSE",
"url" : "http://www.securitytracker.com/id/1033272" "url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
} }
] ]
} }

View File

@ -53,30 +53,30 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[MediaWiki-announce] 20150810 MediaWiki Security and Maintenance Releases: 1.25.2, 1.24.3, 1.23.10", "name": "GLSA-201510-05",
"refsource" : "MLIST", "refsource": "GENTOO",
"url" : "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html" "url": "https://security.gentoo.org/glsa/201510-05"
},
{
"name" : "[oss-security] 20150812 CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/08/12/6"
}, },
{ {
"name": "[oss-security] 20150827 Re: CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "name": "[oss-security] 20150827 Re: CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/08/27/6" "url": "http://www.openwall.com/lists/oss-security/2015/08/27/6"
}, },
{
"name": "[oss-security] 20150812 CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/08/12/6"
},
{
"name": "[MediaWiki-announce] 20150810 MediaWiki Security and Maintenance Releases: 1.25.2, 1.24.3, 1.23.10",
"refsource": "MLIST",
"url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html"
},
{ {
"name": "FEDORA-2015-13920", "name": "FEDORA-2015-13920",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html"
}, },
{
"name" : "GLSA-201510-05",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201510-05"
},
{ {
"name": "76334", "name": "76334",
"refsource": "BID", "refsource": "BID",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0568", "ID": "CVE-2016-0568",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "dgh@bouncycastle.org", "ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-1000346", "ID": "CVE-2016-1000346",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -11,18 +11,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "Bouncy Castle JCE Provider", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "1.55 and before" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "The Legion of the Bouncy Castle Inc." "vendor_name": "n/a"
} }
] ]
} }
@ -44,7 +44,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "CWE-320: Key Management Errors" "value": "n/a"
} }
] ]
} }
@ -58,9 +58,9 @@
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html" "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html"
}, },
{ {
"name" : "https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495#diff-d525a20b8acaed791ae2f0f770eb5937", "name": "RHSA-2018:2669",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495#diff-d525a20b8acaed791ae2f0f770eb5937" "url": "https://access.redhat.com/errata/RHSA-2018:2669"
}, },
{ {
"name": "https://security.netapp.com/advisory/ntap-20181127-0004/", "name": "https://security.netapp.com/advisory/ntap-20181127-0004/",
@ -68,19 +68,19 @@
"url": "https://security.netapp.com/advisory/ntap-20181127-0004/" "url": "https://security.netapp.com/advisory/ntap-20181127-0004/"
}, },
{ {
"name" : "RHSA-2018:2669", "name": "USN-3727-1",
"refsource" : "REDHAT", "refsource": "UBUNTU",
"url" : "https://access.redhat.com/errata/RHSA-2018:2669" "url": "https://usn.ubuntu.com/3727-1/"
},
{
"name": "https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495#diff-d525a20b8acaed791ae2f0f770eb5937",
"refsource": "CONFIRM",
"url": "https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495#diff-d525a20b8acaed791ae2f0f770eb5937"
}, },
{ {
"name": "RHSA-2018:2927", "name": "RHSA-2018:2927",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2927" "url": "https://access.redhat.com/errata/RHSA-2018:2927"
},
{
"name" : "USN-3727-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3727-1/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4094", "ID": "CVE-2016-4094",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
},
{ {
"name": "1035828", "name": "1035828",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035828" "url": "http://www.securitytracker.com/id/1035828"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4135", "ID": "CVE-2016-4135",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,44 +53,44 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "40087", "name": "1036117",
"refsource" : "EXPLOIT-DB", "refsource": "SECTRACK",
"url" : "https://www.exploit-db.com/exploits/40087/" "url": "http://www.securitytracker.com/id/1036117"
},
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html"
}, },
{ {
"name": "MS16-083", "name": "MS16-083",
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083"
}, },
{
"name": "openSUSE-SU-2016:1625",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html"
},
{
"name": "40087",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40087/"
},
{ {
"name": "RHSA-2016:1238", "name": "RHSA-2016:1238",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1238" "url": "https://access.redhat.com/errata/RHSA-2016:1238"
}, },
{
"name" : "SUSE-SU-2016:1613",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html"
},
{ {
"name": "openSUSE-SU-2016:1621", "name": "openSUSE-SU-2016:1621",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html"
}, },
{ {
"name" : "openSUSE-SU-2016:1625", "name": "SUSE-SU-2016:1613",
"refsource": "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html"
}, },
{ {
"name" : "1036117", "name": "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1036117" "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4216", "ID": "CVE-2016-4216",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05279098",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05279098"
},
{ {
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-523/", "name": "http://www.zerodayinitiative.com/advisories/ZDI-16-523/",
"refsource": "MISC", "refsource": "MISC",
@ -62,11 +67,6 @@
"refsource": "MISC", "refsource": "MISC",
"url": "https://www.tenable.com/security/research/tra-2016-27" "url": "https://www.tenable.com/security/research/tra-2016-27"
}, },
{
"name" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05279098",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05279098"
},
{ {
"name": "93109", "name": "93109",
"refsource": "BID", "refsource": "BID",

View File

@ -58,24 +58,24 @@
"url": "http://www.openwall.com/lists/oss-security/2016/05/09/16" "url": "http://www.openwall.com/lists/oss-security/2016/05/09/16"
}, },
{ {
"name" : "[oss-security] 20160511 Re: CVE requested: two stack exhaustation parsing xml files using mxml", "name": "90315",
"refsource" : "MLIST", "refsource": "BID",
"url" : "http://www.openwall.com/lists/oss-security/2016/05/11/14" "url": "http://www.securityfocus.com/bid/90315"
}, },
{ {
"name": "[debian-lts-announce] 20190125 [SECURITY] [DLA 1641-1] mxml security update", "name": "[debian-lts-announce] 20190125 [SECURITY] [DLA 1641-1] mxml security update",
"refsource": "MLIST", "refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00018.html" "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00018.html"
}, },
{
"name": "[oss-security] 20160511 Re: CVE requested: two stack exhaustation parsing xml files using mxml",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/05/11/14"
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1334648", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1334648",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1334648" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1334648"
},
{
"name" : "90315",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/90315"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://support.lenovo.com/us/en/product_security/LEN-11635",
"refsource" : "CONFIRM",
"url" : "https://support.lenovo.com/us/en/product_security/LEN-11635"
},
{ {
"name": "95992", "name": "95992",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/95992" "url": "http://www.securityfocus.com/bid/95992"
},
{
"name": "https://support.lenovo.com/us/en/product_security/LEN-11635",
"refsource": "CONFIRM",
"url": "https://support.lenovo.com/us/en/product_security/LEN-11635"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-9243", "ID": "CVE-2016-9243",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,31 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "FEDORA-2016-2d90e27e50",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U23KDR2M2N7W2ZSREG63BVW7D4VC6CIZ/"
},
{
"name": "USN-3138-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3138-1"
},
{
"name": "https://github.com/pyca/cryptography/commit/b924696b2e8731f39696584d12cceeb3aeb2d874",
"refsource": "CONFIRM",
"url": "https://github.com/pyca/cryptography/commit/b924696b2e8731f39696584d12cceeb3aeb2d874"
},
{
"name": "FEDORA-2016-d3a2b640ce",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQ5G7KHKZC4SI23JE7277KZXM57GEQKT/"
},
{
"name": "94216",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94216"
},
{ {
"name": "[oss-security] 20161109 Re: CVE Request: Cryptography 1.5.3: HKDF might return an empty byte-string", "name": "[oss-security] 20161109 Re: CVE Request: Cryptography 1.5.3: HKDF might return an empty byte-string",
"refsource": "MLIST", "refsource": "MLIST",
@ -62,40 +87,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://cryptography.io/en/latest/changelog" "url": "https://cryptography.io/en/latest/changelog"
}, },
{
"name" : "https://github.com/pyca/cryptography/commit/b924696b2e8731f39696584d12cceeb3aeb2d874",
"refsource" : "CONFIRM",
"url" : "https://github.com/pyca/cryptography/commit/b924696b2e8731f39696584d12cceeb3aeb2d874"
},
{
"name" : "https://github.com/pyca/cryptography/issues/3211",
"refsource" : "CONFIRM",
"url" : "https://github.com/pyca/cryptography/issues/3211"
},
{
"name" : "FEDORA-2016-2d90e27e50",
"refsource" : "FEDORA",
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U23KDR2M2N7W2ZSREG63BVW7D4VC6CIZ/"
},
{
"name" : "FEDORA-2016-d3a2b640ce",
"refsource" : "FEDORA",
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQ5G7KHKZC4SI23JE7277KZXM57GEQKT/"
},
{ {
"name": "FEDORA-2016-e77c8c1f3b", "name": "FEDORA-2016-e77c8c1f3b",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R2ZOBMPWDFFHUZ6QOZZY36A6H5CGJXL/" "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R2ZOBMPWDFFHUZ6QOZZY36A6H5CGJXL/"
}, },
{ {
"name" : "USN-3138-1", "name": "https://github.com/pyca/cryptography/issues/3211",
"refsource" : "UBUNTU", "refsource": "CONFIRM",
"url" : "http://www.ubuntu.com/usn/USN-3138-1" "url": "https://github.com/pyca/cryptography/issues/3211"
},
{
"name" : "94216",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/94216"
} }
] ]
} }

View File

@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20161209 Linux Kernel use-after-free in SCSI generic device interface", "name": "openSUSE-SU-2016:3118",
"refsource" : "MLIST", "refsource": "SUSE",
"url" : "http://www.openwall.com/lists/oss-security/2016/12/08/19" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00057.html"
},
{
"name": "SUSE-SU-2016:3248",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00088.html"
}, },
{ {
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a0ac402cfcdc904f9772e1762b3fda112dcc56a0", "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a0ac402cfcdc904f9772e1762b3fda112dcc56a0",
@ -63,14 +68,9 @@
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a0ac402cfcdc904f9772e1762b3fda112dcc56a0" "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a0ac402cfcdc904f9772e1762b3fda112dcc56a0"
}, },
{ {
"name" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.14", "name": "openSUSE-SU-2016:3085",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.14" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00040.html"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1403145",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1403145"
}, },
{ {
"name": "https://github.com/torvalds/linux/commit/a0ac402cfcdc904f9772e1762b3fda112dcc56a0", "name": "https://github.com/torvalds/linux/commit/a0ac402cfcdc904f9772e1762b3fda112dcc56a0",
@ -83,24 +83,9 @@
"url": "https://access.redhat.com/errata/RHSA-2017:2669" "url": "https://access.redhat.com/errata/RHSA-2017:2669"
}, },
{ {
"name" : "RHSA-2017:0817", "name": "SUSE-SU-2016:3188",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0817.html"
},
{
"name" : "RHSA-2017:1842",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1842"
},
{
"name" : "RHSA-2017:2077",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:2077"
},
{
"name" : "openSUSE-SU-2016:3085",
"refsource": "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00040.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00072.html"
}, },
{ {
"name": "openSUSE-SU-2016:3086", "name": "openSUSE-SU-2016:3086",
@ -112,40 +97,55 @@
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00062.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00062.html"
}, },
{
"name" : "SUSE-SU-2016:3188",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00072.html"
},
{ {
"name": "SUSE-SU-2016:3203", "name": "SUSE-SU-2016:3203",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00075.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00075.html"
}, },
{
"name": "RHSA-2017:0817",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0817.html"
},
{ {
"name": "SUSE-SU-2016:3217", "name": "SUSE-SU-2016:3217",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00081.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00081.html"
}, },
{ {
"name" : "SUSE-SU-2016:3248", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1403145",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00088.html" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403145"
}, },
{ {
"name" : "SUSE-SU-2016:3252", "name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.14",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00091.html" "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.14"
}, },
{ {
"name" : "openSUSE-SU-2016:3118", "name": "[oss-security] 20161209 Linux Kernel use-after-free in SCSI generic device interface",
"refsource" : "SUSE", "refsource": "MLIST",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00057.html" "url": "http://www.openwall.com/lists/oss-security/2016/12/08/19"
},
{
"name": "RHSA-2017:2077",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2077"
},
{
"name": "RHSA-2017:1842",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1842"
}, },
{ {
"name": "94821", "name": "94821",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/94821" "url": "http://www.securityfocus.com/bid/94821"
},
{
"name": "SUSE-SU-2016:3252",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00091.html"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-9663", "ID": "CVE-2016-9663",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-9922", "ID": "CVE-2016-9922",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20161209 Re: CVE request Qemu: display: cirrus_vga: a divide by zero in cirrus_do_copy",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/12/09/1"
},
{ {
"name": "[qemu-devel] 20161205 [PULL 4/4] display: cirrus: check vga bits per pixel(bpp) value", "name": "[qemu-devel] 20161205 [PULL 4/4] display: cirrus: check vga bits per pixel(bpp) value",
"refsource": "MLIST", "refsource": "MLIST",
@ -68,9 +63,14 @@
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html" "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
}, },
{ {
"name" : "http://git.qemu-project.org/?p=qemu.git;a=commit;h=4299b90e9ba9ce5ca9024572804ba751aa1a7e70", "name": "RHSA-2017:2392",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "http://git.qemu-project.org/?p=qemu.git;a=commit;h=4299b90e9ba9ce5ca9024572804ba751aa1a7e70" "url": "https://access.redhat.com/errata/RHSA-2017:2392"
},
{
"name": "94803",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94803"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1334398", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1334398",
@ -78,9 +78,9 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1334398" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1334398"
}, },
{ {
"name" : "RHSA-2017:2392", "name": "http://git.qemu-project.org/?p=qemu.git;a=commit;h=4299b90e9ba9ce5ca9024572804ba751aa1a7e70",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "https://access.redhat.com/errata/RHSA-2017:2392" "url": "http://git.qemu-project.org/?p=qemu.git;a=commit;h=4299b90e9ba9ce5ca9024572804ba751aa1a7e70"
}, },
{ {
"name": "RHSA-2017:2408", "name": "RHSA-2017:2408",
@ -88,9 +88,9 @@
"url": "https://access.redhat.com/errata/RHSA-2017:2408" "url": "https://access.redhat.com/errata/RHSA-2017:2408"
}, },
{ {
"name" : "94803", "name": "[oss-security] 20161209 Re: CVE request Qemu: display: cirrus_vga: a divide by zero in cirrus_do_copy",
"refsource" : "BID", "refsource": "MLIST",
"url" : "http://www.securityfocus.com/bid/94803" "url": "http://www.openwall.com/lists/oss-security/2016/12/09/1"
} }
] ]
} }

View File

@ -61,15 +61,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{ {
"name": "106617", "name": "106617",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/106617" "url": "http://www.securityfocus.com/bid/106617"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
} }
] ]
} }