mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
e6d40c447e
commit
87ff3f7630
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "ADV-2007-0341",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/0341"
|
||||
},
|
||||
{
|
||||
"name": "36634",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/36634"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-0341",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/0341"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/4058"
|
||||
},
|
||||
{
|
||||
"name" : "24403",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/24403"
|
||||
},
|
||||
{
|
||||
"name": "aceftp-server-bo(34795)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34795"
|
||||
},
|
||||
{
|
||||
"name": "24403",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/24403"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "26112",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26112"
|
||||
},
|
||||
{
|
||||
"name": "activereports-arpro2-file-overwrite(36056)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36056"
|
||||
},
|
||||
{
|
||||
"name": "26112",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26112"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,64 +53,64 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070829 Multiple vulnerabilities in Doomsday 1.9.0-beta5.1",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/478077/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://aluigi.altervista.org/adv/dumsdei-adv.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://aluigi.altervista.org/adv/dumsdei-adv.txt"
|
||||
},
|
||||
{
|
||||
"name" : "http://aluigi.org/poc/dumsdei.zip",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://aluigi.org/poc/dumsdei.zip"
|
||||
},
|
||||
{
|
||||
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=190835",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=190835"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200802-02",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200802-02.xml"
|
||||
},
|
||||
{
|
||||
"name" : "25483",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/25483"
|
||||
},
|
||||
{
|
||||
"name" : "26524",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26524"
|
||||
"name": "3084",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3084"
|
||||
},
|
||||
{
|
||||
"name": "28821",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28821"
|
||||
},
|
||||
{
|
||||
"name" : "3084",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/3084"
|
||||
},
|
||||
{
|
||||
"name": "doomsday-dnetplayerevent-bo(36332)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36332"
|
||||
},
|
||||
{
|
||||
"name": "http://aluigi.altervista.org/adv/dumsdei-adv.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://aluigi.altervista.org/adv/dumsdei-adv.txt"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.gentoo.org/show_bug.cgi?id=190835",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugs.gentoo.org/show_bug.cgi?id=190835"
|
||||
},
|
||||
{
|
||||
"name": "26524",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26524"
|
||||
},
|
||||
{
|
||||
"name": "20070829 Multiple vulnerabilities in Doomsday 1.9.0-beta5.1",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/478077/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "doomsday-msgwrite-bo(36333)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36333"
|
||||
},
|
||||
{
|
||||
"name": "25483",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25483"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200802-02",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200802-02.xml"
|
||||
},
|
||||
{
|
||||
"name": "doomsday-netsvreadcommands-bo(36334)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36334"
|
||||
},
|
||||
{
|
||||
"name": "http://aluigi.org/poc/dumsdei.zip",
|
||||
"refsource": "MISC",
|
||||
"url": "http://aluigi.org/poc/dumsdei.zip"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,49 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080122 PHP 5.2.5 cURL safe_mode bypass",
|
||||
"refsource" : "SREASONRES",
|
||||
"url" : "http://securityreason.com/achievement_securityalert/51"
|
||||
},
|
||||
{
|
||||
"name" : "20080122 PHP 5.2.5 cURL safe_mode bypass",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/486856/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20080527 rPSA-2008-0178-1 php php-mysql php-pgsql",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/492671/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20080122 PHP 5.2.5 cURL safe_mode bypass",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059849.html"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20080502 CVE Request (PHP)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2008/05/02/2"
|
||||
},
|
||||
{
|
||||
"name" : "http://cvs.php.net/viewcvs.cgi/php-src/NEWS?revision=1.2027.2.547.2.1047&view=markup",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://cvs.php.net/viewcvs.cgi/php-src/NEWS?revision=1.2027.2.547.2.1047&view=markup"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.php.net/ChangeLog-5.php",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.php.net/ChangeLog-5.php"
|
||||
},
|
||||
{
|
||||
"name" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0178",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0178"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT3216",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT3216"
|
||||
"name": "ADV-2008-1412",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/1412"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2008-07-31",
|
||||
@ -103,29 +63,9 @@
|
||||
"url": "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2008-10-09",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2009:022",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:022"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2009:023",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:023"
|
||||
},
|
||||
{
|
||||
"name" : "USN-628-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/usn-628-1"
|
||||
},
|
||||
{
|
||||
"name" : "27413",
|
||||
"name": "31681",
|
||||
"refsource": "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/27413"
|
||||
"url": "http://www.securityfocus.com/bid/31681"
|
||||
},
|
||||
{
|
||||
"name": "29009",
|
||||
@ -133,14 +73,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/29009"
|
||||
},
|
||||
{
|
||||
"name" : "31681",
|
||||
"name": "27413",
|
||||
"refsource": "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/31681"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-1412",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/1412"
|
||||
"url": "http://www.securityfocus.com/bid/27413"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2268",
|
||||
@ -148,49 +83,114 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2268"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-2780",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/2780"
|
||||
"name": "USN-628-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/usn-628-1"
|
||||
},
|
||||
{
|
||||
"name" : "30048",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/30048"
|
||||
"name": "20080122 PHP 5.2.5 cURL safe_mode bypass",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/486856/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "20080122 PHP 5.2.5 cURL safe_mode bypass",
|
||||
"refsource": "SREASONRES",
|
||||
"url": "http://securityreason.com/achievement_securityalert/51"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20080502 CVE Request (PHP)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2008/05/02/2"
|
||||
},
|
||||
{
|
||||
"name": "20080527 rPSA-2008-0178-1 php php-mysql php-pgsql",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/492671/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "30411",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30411"
|
||||
},
|
||||
{
|
||||
"name": "http://www.php.net/ChangeLog-5.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.php.net/ChangeLog-5.php"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2009:023",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:023"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2009:022",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:022"
|
||||
},
|
||||
{
|
||||
"name": "31200",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31200"
|
||||
},
|
||||
{
|
||||
"name" : "31326",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31326"
|
||||
},
|
||||
{
|
||||
"name": "32222",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32222"
|
||||
},
|
||||
{
|
||||
"name": "20080122 PHP 5.2.5 cURL safe_mode bypass",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059849.html"
|
||||
},
|
||||
{
|
||||
"name": "3562",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3562"
|
||||
},
|
||||
{
|
||||
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0178",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0178"
|
||||
},
|
||||
{
|
||||
"name": "31326",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31326"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2780",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2780"
|
||||
},
|
||||
{
|
||||
"name": "php-safemode-directive-security-bypass(42134)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42134"
|
||||
},
|
||||
{
|
||||
"name": "php-curlinit-security-bypass(39852)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39852"
|
||||
},
|
||||
{
|
||||
"name" : "php-safemode-directive-security-bypass(42134)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42134"
|
||||
"name": "APPLE-SA-2008-10-09",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT3216",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT3216"
|
||||
},
|
||||
{
|
||||
"name": "http://cvs.php.net/viewcvs.cgi/php-src/NEWS?revision=1.2027.2.547.2.1047&view=markup",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://cvs.php.net/viewcvs.cgi/php-src/NEWS?revision=1.2027.2.547.2.1047&view=markup"
|
||||
},
|
||||
{
|
||||
"name": "30048",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30048"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,16 +57,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.nohack.cn/hacknews/20071119/1916.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.sebug.net/exploit/2575",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.sebug.net/exploit/2575"
|
||||
},
|
||||
{
|
||||
"name" : "26536",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/26536"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-3982",
|
||||
"refsource": "VUPEN",
|
||||
@ -77,6 +67,16 @@
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/39680"
|
||||
},
|
||||
{
|
||||
"name": "26536",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26536"
|
||||
},
|
||||
{
|
||||
"name": "http://www.sebug.net/exploit/2575",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.sebug.net/exploit/2575"
|
||||
},
|
||||
{
|
||||
"name": "27795",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -57,16 +57,16 @@
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-12/0470.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.heise-security.co.uk/news/100934",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.heise-security.co.uk/news/100934"
|
||||
},
|
||||
{
|
||||
"name": "26967",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26967"
|
||||
},
|
||||
{
|
||||
"name": "http://www.heise-security.co.uk/news/100934",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.heise-security.co.uk/news/100934"
|
||||
},
|
||||
{
|
||||
"name": "hp-esupportdiagnostics-info-disclosure(39156)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://www.opera.com/docs/changelogs/windows/925/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.opera.com/docs/changelogs/windows/925/"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.gentoo.org/show_bug.cgi?id=202770",
|
||||
"refsource": "MISC",
|
||||
@ -63,35 +68,40 @@
|
||||
"url": "http://www.opera.com/docs/changelogs/linux/925/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.opera.com/docs/changelogs/windows/925/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.opera.com/docs/changelogs/windows/925/"
|
||||
"name": "1019131",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1019131"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200712-22",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200712-22.xml"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2008:001",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00001.html"
|
||||
"name": "28314",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28314"
|
||||
},
|
||||
{
|
||||
"name": "26937",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26937"
|
||||
},
|
||||
{
|
||||
"name": "opera-plugins-security-bypass(39147)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39147"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2008:001",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200712-22",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200712-22.xml"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-4261",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/4261"
|
||||
},
|
||||
{
|
||||
"name" : "1019131",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1019131"
|
||||
},
|
||||
{
|
||||
"name": "28169",
|
||||
"refsource": "SECUNIA",
|
||||
@ -101,16 +111,6 @@
|
||||
"name": "28290",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28290"
|
||||
},
|
||||
{
|
||||
"name" : "28314",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28314"
|
||||
},
|
||||
{
|
||||
"name" : "opera-plugins-security-bypass(39147)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39147"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2010-5103",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,26 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20110113 CVE requests: ftpls, xdigger, lbreakout2, calibre, typo3",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2011/01/13/2"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20120510 Re: CVE-request: TYPO3 TYPO3-SA-2010-022 still without CVE",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2012/05/11/3"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20120511 CVE-request: TYPO3 TYPO3-SA-2010-022 still without CVE",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2012/05/10/7"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20120512 Re: CVE-request: TYPO3 TYPO3-SA-2010-022 still without CVE",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2012/05/12/5"
|
||||
},
|
||||
{
|
||||
"name": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022/",
|
||||
"refsource": "CONFIRM",
|
||||
@ -82,20 +62,40 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/45470"
|
||||
},
|
||||
{
|
||||
"name" : "70117",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/70117"
|
||||
},
|
||||
{
|
||||
"name": "35770",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/35770"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20120512 Re: CVE-request: TYPO3 TYPO3-SA-2010-022 still without CVE",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/05/12/5"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20110113 CVE requests: ftpls, xdigger, lbreakout2, calibre, typo3",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2011/01/13/2"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20120510 Re: CVE-request: TYPO3 TYPO3-SA-2010-022 still without CVE",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/05/11/3"
|
||||
},
|
||||
{
|
||||
"name": "typo3-listmodule-sql-injection(64184)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64184"
|
||||
},
|
||||
{
|
||||
"name": "70117",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/70117"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20120511 CVE-request: TYPO3 TYPO3-SA-2010-022 still without CVE",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/05/10/7"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://packetstormsecurity.org/1010-exploits/smartftp4-dllhijack.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.org/1010-exploits/smartftp4-dllhijack.txt"
|
||||
},
|
||||
{
|
||||
"name": "41808",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/41808"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.org/1010-exploits/smartftp4-dllhijack.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/1010-exploits/smartftp4-dllhijack.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2014-0036",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "FEDORA-2014-3573",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130148.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2014-3526",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130180.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20140306 CVE-2014-0036 rubygem-rbovirt: unsafe use of rest-client",
|
||||
"refsource": "MLIST",
|
||||
@ -61,16 +71,6 @@
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1058595",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1058595"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2014-3526",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130180.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2014-3573",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130148.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@mozilla.org",
|
||||
"ID": "CVE-2014-1557",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2014/mfsa2014-64.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2014/mfsa2014-64.html"
|
||||
"name": "59719",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59719"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=913805",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=913805"
|
||||
"name": "60083",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/60083"
|
||||
},
|
||||
{
|
||||
"name": "60621",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/60621"
|
||||
},
|
||||
{
|
||||
"name": "68824",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/68824"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201504-01",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201504-01"
|
||||
},
|
||||
{
|
||||
"name": "60306",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/60306"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
||||
@ -73,9 +93,14 @@
|
||||
"url": "http://linux.oracle.com/errata/ELSA-2014-0918.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2986",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2014/dsa-2986"
|
||||
"name": "1030620",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030620"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=913805",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=913805"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2996",
|
||||
@ -83,64 +108,39 @@
|
||||
"url": "http://www.debian.org/security/2014/dsa-2996"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201504-01",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201504-01"
|
||||
},
|
||||
{
|
||||
"name" : "68824",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/68824"
|
||||
"name": "http://www.mozilla.org/security/announce/2014/mfsa2014-64.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2014/mfsa2014-64.html"
|
||||
},
|
||||
{
|
||||
"name": "1030619",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030619"
|
||||
},
|
||||
{
|
||||
"name" : "1030620",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1030620"
|
||||
},
|
||||
{
|
||||
"name" : "59591",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59591"
|
||||
},
|
||||
{
|
||||
"name" : "59719",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59719"
|
||||
},
|
||||
{
|
||||
"name" : "59760",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59760"
|
||||
},
|
||||
{
|
||||
"name" : "60306",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/60306"
|
||||
},
|
||||
{
|
||||
"name": "60486",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/60486"
|
||||
},
|
||||
{
|
||||
"name" : "60621",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/60621"
|
||||
},
|
||||
{
|
||||
"name": "60628",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/60628"
|
||||
},
|
||||
{
|
||||
"name" : "60083",
|
||||
"name": "DSA-2986",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2014/dsa-2986"
|
||||
},
|
||||
{
|
||||
"name": "59760",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/60083"
|
||||
"url": "http://secunia.com/advisories/59760"
|
||||
},
|
||||
{
|
||||
"name": "59591",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59591"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20140122 Getting tempfile/mktemp wrong",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2014/01/22/3"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20140122 Re: Getting tempfile/mktemp wrong",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2014/01/22/4"
|
||||
},
|
||||
{
|
||||
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736358",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736358"
|
||||
},
|
||||
{
|
||||
"name": "102383",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/102383"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736358",
|
||||
"refsource": "MISC",
|
||||
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736358"
|
||||
},
|
||||
{
|
||||
"name": "axiom-cve20141640-symlink(90663)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90663"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20140122 Getting tempfile/mktemp wrong",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2014/01/22/3"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://osandamalith.wordpress.com/2014/02/02/mybb-1-6-12-post-xss-0day/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://osandamalith.wordpress.com/2014/02/02/mybb-1-6-12-post-xss-0day/"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/125038/MyBB-1.6.12-POST-Cross-Site-Scripting.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/125038/MyBB-1.6.12-POST-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"name": "http://osandamalith.wordpress.com/2014/02/02/mybb-1-6-12-post-xss-0day/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://osandamalith.wordpress.com/2014/02/02/mybb-1-6-12-post-xss-0day/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20140722 Reflected XSS vulnerabilities in DELL SonicWALL GMS 7.2 Build: 7221.1701 (CVE-2014-5024)",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2014/Jul/125"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/127575/SonicWALL-GMS-7.2-Build-7221.1701-Cross-Site-Scripting.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/127575/SonicWALL-GMS-7.2-Build-7221.1701-Cross-Site-Scripting.html"
|
||||
"name": "68829",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/68829"
|
||||
},
|
||||
{
|
||||
"name": "https://support.software.dell.com/product-notification/128245",
|
||||
@ -68,14 +63,19 @@
|
||||
"url": "https://support.software.dell.com/product-notification/128245"
|
||||
},
|
||||
{
|
||||
"name" : "68829",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/68829"
|
||||
"name": "20140722 Reflected XSS vulnerabilities in DELL SonicWALL GMS 7.2 Build: 7221.1701 (CVE-2014-5024)",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2014/Jul/125"
|
||||
},
|
||||
{
|
||||
"name": "60287",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/60287"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/127575/SonicWALL-GMS-7.2-Build-7221.1701-Cross-Site-Scripting.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/127575/SonicWALL-GMS-7.2-Build-7221.1701-Cross-Site-Scripting.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
||||
"ID": "CVE-2014-5400",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,16 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "openSUSE-SU-2015:0489",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html"
|
||||
},
|
||||
{
|
||||
"name": "72941",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/72941"
|
||||
},
|
||||
{
|
||||
"name": "http://www.wireshark.org/security/wnpa-sec-2015-10.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.wireshark.org/security/wnpa-sec-2015-10.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11023",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11023"
|
||||
},
|
||||
{
|
||||
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=608cf324b3962877e9699f3e81e8f82ac9f1ea14",
|
||||
"refsource": "CONFIRM",
|
||||
@ -72,45 +77,40 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://advisories.mageia.org/MGASA-2015-0117.html"
|
||||
},
|
||||
{
|
||||
"name": "1031858",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1031858"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11023",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11023"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3210",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2015/dsa-3210"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201510-03",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201510-03"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2015:183",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:183"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3210",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3210"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:1460",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1460.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:0489",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html"
|
||||
},
|
||||
{
|
||||
"name" : "72941",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/72941"
|
||||
},
|
||||
{
|
||||
"name" : "1031858",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1031858"
|
||||
"name": "GLSA-201510-03",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201510-03"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "36413",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/36413/"
|
||||
},
|
||||
{
|
||||
"name" : "20150312 WordPress SEO by Yoast <= 1.7.3.3 - Blind SQL Injection",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2015/Mar/73"
|
||||
"name": "https://wpvulndb.com/vulnerabilities/7841",
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpvulndb.com/vulnerabilities/7841"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/130811/WordPress-SEO-By-Yoast-1.7.3.3-SQL-Injection.html",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "http://packetstormsecurity.com/files/130811/WordPress-SEO-By-Yoast-1.7.3.3-SQL-Injection.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://wpvulndb.com/vulnerabilities/7841",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://wpvulndb.com/vulnerabilities/7841"
|
||||
"name": "https://yoast.com/wordpress-seo-security-release/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://yoast.com/wordpress-seo-security-release/"
|
||||
},
|
||||
{
|
||||
"name": "36413",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/36413/"
|
||||
},
|
||||
{
|
||||
"name": "https://wordpress.org/plugins/wordpress-seo/changelog/",
|
||||
@ -78,9 +78,9 @@
|
||||
"url": "https://wordpress.org/plugins/wordpress-seo/changelog/"
|
||||
},
|
||||
{
|
||||
"name" : "https://yoast.com/wordpress-seo-security-release/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://yoast.com/wordpress-seo-security-release/"
|
||||
"name": "20150312 WordPress SEO by Yoast <= 1.7.3.3 - Blind SQL Injection",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2015/Mar/73"
|
||||
},
|
||||
{
|
||||
"name": "1031920",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2015-2785",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20150206 byzanz: Out-of heap-based buffer write in GIF encoder",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2015/02/06/11"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778261",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778261"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20150206 byzanz: Out-of heap-based buffer write in GIF encoder",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/02/06/11"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=852481",
|
||||
"refsource": "CONFIRM",
|
||||
|
@ -52,25 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=5b53445e815fd6b652d49df03ec3d60b088c4fbc",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=5b53445e815fd6b652d49df03ec3d60b088c4fbc"
|
||||
},
|
||||
{
|
||||
"name": "http://www.wireshark.org/security/wnpa-sec-2015-28.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.wireshark.org/security/wnpa-sec-2015-28.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358"
|
||||
},
|
||||
{
|
||||
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=3fc4a831e035604b0af14ed8a5c9f6596a3448d0",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=3fc4a831e035604b0af14ed8a5c9f6596a3448d0"
|
||||
},
|
||||
{
|
||||
"name" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=5b53445e815fd6b652d49df03ec3d60b088c4fbc",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=5b53445e815fd6b652d49df03ec3d60b088c4fbc"
|
||||
"name": "FEDORA-2015-13945",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168837.html"
|
||||
},
|
||||
{
|
||||
"name": "1033272",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1033272"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
|
||||
@ -78,19 +83,9 @@
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
|
||||
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3367",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2015/dsa-3367"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2015-13945",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168837.html"
|
||||
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2015-13946",
|
||||
@ -98,9 +93,9 @@
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165509.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:1836",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html"
|
||||
"name": "DSA-3367",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3367"
|
||||
},
|
||||
{
|
||||
"name": "76387",
|
||||
@ -108,9 +103,14 @@
|
||||
"url": "http://www.securityfocus.com/bid/76387"
|
||||
},
|
||||
{
|
||||
"name" : "1033272",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1033272"
|
||||
"name": "openSUSE-SU-2015:1836",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,30 +53,30 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[MediaWiki-announce] 20150810 MediaWiki Security and Maintenance Releases: 1.25.2, 1.24.3, 1.23.10",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20150812 CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2015/08/12/6"
|
||||
"name": "GLSA-201510-05",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201510-05"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20150827 Re: CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/08/27/6"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20150812 CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/08/12/6"
|
||||
},
|
||||
{
|
||||
"name": "[MediaWiki-announce] 20150810 MediaWiki Security and Maintenance Releases: 1.25.2, 1.24.3, 1.23.10",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2015-13920",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201510-05",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201510-05"
|
||||
},
|
||||
{
|
||||
"name": "76334",
|
||||
"refsource": "BID",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2016-0568",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "dgh@bouncycastle.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2016-1000346",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -11,18 +11,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Bouncy Castle JCE Provider",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "1.55 and before"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "The Legion of the Bouncy Castle Inc."
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -44,7 +44,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "CWE-320: Key Management Errors"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,9 +58,9 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495#diff-d525a20b8acaed791ae2f0f770eb5937",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495#diff-d525a20b8acaed791ae2f0f770eb5937"
|
||||
"name": "RHSA-2018:2669",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
|
||||
},
|
||||
{
|
||||
"name": "https://security.netapp.com/advisory/ntap-20181127-0004/",
|
||||
@ -68,19 +68,19 @@
|
||||
"url": "https://security.netapp.com/advisory/ntap-20181127-0004/"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:2669",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:2669"
|
||||
"name": "USN-3727-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3727-1/"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495#diff-d525a20b8acaed791ae2f0f770eb5937",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495#diff-d525a20b8acaed791ae2f0f770eb5937"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:2927",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:2927"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3727-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3727-1/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2016-4094",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
|
||||
},
|
||||
{
|
||||
"name": "1035828",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1035828"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2016-4135",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,44 +53,44 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "40087",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/40087/"
|
||||
},
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html"
|
||||
"name": "1036117",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036117"
|
||||
},
|
||||
{
|
||||
"name": "MS16-083",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1625",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html"
|
||||
},
|
||||
{
|
||||
"name": "40087",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/40087/"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2016:1238",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2016:1238"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:1613",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1621",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1625",
|
||||
"name": "SUSE-SU-2016:1613",
|
||||
"refsource": "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html"
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html"
|
||||
},
|
||||
{
|
||||
"name" : "1036117",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1036117"
|
||||
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2016-4216",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05279098",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05279098"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-523/",
|
||||
"refsource": "MISC",
|
||||
@ -62,11 +67,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.tenable.com/security/research/tra-2016-27"
|
||||
},
|
||||
{
|
||||
"name" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05279098",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05279098"
|
||||
},
|
||||
{
|
||||
"name": "93109",
|
||||
"refsource": "BID",
|
||||
|
@ -58,24 +58,24 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/05/09/16"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20160511 Re: CVE requested: two stack exhaustation parsing xml files using mxml",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2016/05/11/14"
|
||||
"name": "90315",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/90315"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20190125 [SECURITY] [DLA 1641-1] mxml security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00018.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20160511 Re: CVE requested: two stack exhaustation parsing xml files using mxml",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/05/11/14"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1334648",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1334648"
|
||||
},
|
||||
{
|
||||
"name" : "90315",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/90315"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.lenovo.com/us/en/product_security/LEN-11635",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.lenovo.com/us/en/product_security/LEN-11635"
|
||||
},
|
||||
{
|
||||
"name": "95992",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/95992"
|
||||
},
|
||||
{
|
||||
"name": "https://support.lenovo.com/us/en/product_security/LEN-11635",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.lenovo.com/us/en/product_security/LEN-11635"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2016-9243",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,31 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "FEDORA-2016-2d90e27e50",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U23KDR2M2N7W2ZSREG63BVW7D4VC6CIZ/"
|
||||
},
|
||||
{
|
||||
"name": "USN-3138-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3138-1"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/pyca/cryptography/commit/b924696b2e8731f39696584d12cceeb3aeb2d874",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/pyca/cryptography/commit/b924696b2e8731f39696584d12cceeb3aeb2d874"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2016-d3a2b640ce",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQ5G7KHKZC4SI23JE7277KZXM57GEQKT/"
|
||||
},
|
||||
{
|
||||
"name": "94216",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94216"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20161109 Re: CVE Request: Cryptography 1.5.3: HKDF might return an empty byte-string",
|
||||
"refsource": "MLIST",
|
||||
@ -62,40 +87,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cryptography.io/en/latest/changelog"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/pyca/cryptography/commit/b924696b2e8731f39696584d12cceeb3aeb2d874",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/pyca/cryptography/commit/b924696b2e8731f39696584d12cceeb3aeb2d874"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/pyca/cryptography/issues/3211",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/pyca/cryptography/issues/3211"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2016-2d90e27e50",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U23KDR2M2N7W2ZSREG63BVW7D4VC6CIZ/"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2016-d3a2b640ce",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQ5G7KHKZC4SI23JE7277KZXM57GEQKT/"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2016-e77c8c1f3b",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R2ZOBMPWDFFHUZ6QOZZY36A6H5CGJXL/"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3138-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-3138-1"
|
||||
},
|
||||
{
|
||||
"name" : "94216",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/94216"
|
||||
"name": "https://github.com/pyca/cryptography/issues/3211",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/pyca/cryptography/issues/3211"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20161209 Linux Kernel use-after-free in SCSI generic device interface",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2016/12/08/19"
|
||||
"name": "openSUSE-SU-2016:3118",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00057.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:3248",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00088.html"
|
||||
},
|
||||
{
|
||||
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a0ac402cfcdc904f9772e1762b3fda112dcc56a0",
|
||||
@ -63,14 +68,9 @@
|
||||
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a0ac402cfcdc904f9772e1762b3fda112dcc56a0"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.14",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.14"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1403145",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1403145"
|
||||
"name": "openSUSE-SU-2016:3085",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00040.html"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/torvalds/linux/commit/a0ac402cfcdc904f9772e1762b3fda112dcc56a0",
|
||||
@ -83,24 +83,9 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:2669"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:0817",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0817.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:1842",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:1842"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:2077",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:2077"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:3085",
|
||||
"name": "SUSE-SU-2016:3188",
|
||||
"refsource": "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00040.html"
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00072.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:3086",
|
||||
@ -112,40 +97,55 @@
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00062.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:3188",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00072.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:3203",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00075.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:0817",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2017-0817.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:3217",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00081.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:3248",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00088.html"
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1403145",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403145"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:3252",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00091.html"
|
||||
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.14",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.14"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:3118",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00057.html"
|
||||
"name": "[oss-security] 20161209 Linux Kernel use-after-free in SCSI generic device interface",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/12/08/19"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:2077",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:2077"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:1842",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1842"
|
||||
},
|
||||
{
|
||||
"name": "94821",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94821"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:3252",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00091.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-9663",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2016-9922",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20161209 Re: CVE request Qemu: display: cirrus_vga: a divide by zero in cirrus_do_copy",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2016/12/09/1"
|
||||
},
|
||||
{
|
||||
"name": "[qemu-devel] 20161205 [PULL 4/4] display: cirrus: check vga bits per pixel(bpp) value",
|
||||
"refsource": "MLIST",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.qemu-project.org/?p=qemu.git;a=commit;h=4299b90e9ba9ce5ca9024572804ba751aa1a7e70",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.qemu-project.org/?p=qemu.git;a=commit;h=4299b90e9ba9ce5ca9024572804ba751aa1a7e70"
|
||||
"name": "RHSA-2017:2392",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:2392"
|
||||
},
|
||||
{
|
||||
"name": "94803",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94803"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1334398",
|
||||
@ -78,9 +78,9 @@
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1334398"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:2392",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:2392"
|
||||
"name": "http://git.qemu-project.org/?p=qemu.git;a=commit;h=4299b90e9ba9ce5ca9024572804ba751aa1a7e70",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.qemu-project.org/?p=qemu.git;a=commit;h=4299b90e9ba9ce5ca9024572804ba751aa1a7e70"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:2408",
|
||||
@ -88,9 +88,9 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:2408"
|
||||
},
|
||||
{
|
||||
"name" : "94803",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/94803"
|
||||
"name": "[oss-security] 20161209 Re: CVE request Qemu: display: cirrus_vga: a divide by zero in cirrus_do_copy",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/12/09/1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,15 +61,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
|
||||
},
|
||||
{
|
||||
"name": "106617",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/106617"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user