"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 22:02:33 +00:00
parent e6d40c447e
commit 87ff3f7630
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
59 changed files with 3627 additions and 3627 deletions

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "ADV-2007-0341",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0341"
},
{
"name": "36634",
"refsource": "OSVDB",
"url": "http://osvdb.org/36634"
},
{
"name": "ADV-2007-0341",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0341"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4058"
},
{
"name" : "24403",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24403"
},
{
"name": "aceftp-server-bo(34795)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34795"
},
{
"name": "24403",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24403"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "26112",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26112"
},
{
"name": "activereports-arpro2-file-overwrite(36056)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36056"
},
{
"name": "26112",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26112"
}
]
}

View File

@ -53,64 +53,64 @@
"references": {
"reference_data": [
{
"name" : "20070829 Multiple vulnerabilities in Doomsday 1.9.0-beta5.1",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/478077/100/0/threaded"
},
{
"name" : "http://aluigi.altervista.org/adv/dumsdei-adv.txt",
"refsource" : "MISC",
"url" : "http://aluigi.altervista.org/adv/dumsdei-adv.txt"
},
{
"name" : "http://aluigi.org/poc/dumsdei.zip",
"refsource" : "MISC",
"url" : "http://aluigi.org/poc/dumsdei.zip"
},
{
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=190835",
"refsource" : "CONFIRM",
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=190835"
},
{
"name" : "GLSA-200802-02",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200802-02.xml"
},
{
"name" : "25483",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25483"
},
{
"name" : "26524",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26524"
"name": "3084",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3084"
},
{
"name": "28821",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28821"
},
{
"name" : "3084",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/3084"
},
{
"name": "doomsday-dnetplayerevent-bo(36332)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36332"
},
{
"name": "http://aluigi.altervista.org/adv/dumsdei-adv.txt",
"refsource": "MISC",
"url": "http://aluigi.altervista.org/adv/dumsdei-adv.txt"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=190835",
"refsource": "CONFIRM",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=190835"
},
{
"name": "26524",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26524"
},
{
"name": "20070829 Multiple vulnerabilities in Doomsday 1.9.0-beta5.1",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/478077/100/0/threaded"
},
{
"name": "doomsday-msgwrite-bo(36333)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36333"
},
{
"name": "25483",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25483"
},
{
"name": "GLSA-200802-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200802-02.xml"
},
{
"name": "doomsday-netsvreadcommands-bo(36334)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36334"
},
{
"name": "http://aluigi.org/poc/dumsdei.zip",
"refsource": "MISC",
"url": "http://aluigi.org/poc/dumsdei.zip"
}
]
}

View File

@ -53,49 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20080122 PHP 5.2.5 cURL safe_mode bypass",
"refsource" : "SREASONRES",
"url" : "http://securityreason.com/achievement_securityalert/51"
},
{
"name" : "20080122 PHP 5.2.5 cURL safe_mode bypass",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/486856/100/0/threaded"
},
{
"name" : "20080527 rPSA-2008-0178-1 php php-mysql php-pgsql",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/492671/100/0/threaded"
},
{
"name" : "20080122 PHP 5.2.5 cURL safe_mode bypass",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059849.html"
},
{
"name" : "[oss-security] 20080502 CVE Request (PHP)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2008/05/02/2"
},
{
"name" : "http://cvs.php.net/viewcvs.cgi/php-src/NEWS?revision=1.2027.2.547.2.1047&view=markup",
"refsource" : "CONFIRM",
"url" : "http://cvs.php.net/viewcvs.cgi/php-src/NEWS?revision=1.2027.2.547.2.1047&view=markup"
},
{
"name" : "http://www.php.net/ChangeLog-5.php",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/ChangeLog-5.php"
},
{
"name" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0178",
"refsource" : "CONFIRM",
"url" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0178"
},
{
"name" : "http://support.apple.com/kb/HT3216",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT3216"
"name": "ADV-2008-1412",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1412"
},
{
"name": "APPLE-SA-2008-07-31",
@ -103,29 +63,9 @@
"url": "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html"
},
{
"name" : "APPLE-SA-2008-10-09",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
},
{
"name" : "MDVSA-2009:022",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:022"
},
{
"name" : "MDVSA-2009:023",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:023"
},
{
"name" : "USN-628-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-628-1"
},
{
"name" : "27413",
"name": "31681",
"refsource": "BID",
"url" : "http://www.securityfocus.com/bid/27413"
"url": "http://www.securityfocus.com/bid/31681"
},
{
"name": "29009",
@ -133,14 +73,9 @@
"url": "http://www.securityfocus.com/bid/29009"
},
{
"name" : "31681",
"name": "27413",
"refsource": "BID",
"url" : "http://www.securityfocus.com/bid/31681"
},
{
"name" : "ADV-2008-1412",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/1412"
"url": "http://www.securityfocus.com/bid/27413"
},
{
"name": "ADV-2008-2268",
@ -148,49 +83,114 @@
"url": "http://www.vupen.com/english/advisories/2008/2268"
},
{
"name" : "ADV-2008-2780",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2780"
"name": "USN-628-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-628-1"
},
{
"name" : "30048",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30048"
"name": "20080122 PHP 5.2.5 cURL safe_mode bypass",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/486856/100/0/threaded"
},
{
"name": "20080122 PHP 5.2.5 cURL safe_mode bypass",
"refsource": "SREASONRES",
"url": "http://securityreason.com/achievement_securityalert/51"
},
{
"name": "[oss-security] 20080502 CVE Request (PHP)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/05/02/2"
},
{
"name": "20080527 rPSA-2008-0178-1 php php-mysql php-pgsql",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/492671/100/0/threaded"
},
{
"name": "30411",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30411"
},
{
"name": "http://www.php.net/ChangeLog-5.php",
"refsource": "CONFIRM",
"url": "http://www.php.net/ChangeLog-5.php"
},
{
"name": "MDVSA-2009:023",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:023"
},
{
"name": "MDVSA-2009:022",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:022"
},
{
"name": "31200",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31200"
},
{
"name" : "31326",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31326"
},
{
"name": "32222",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32222"
},
{
"name": "20080122 PHP 5.2.5 cURL safe_mode bypass",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059849.html"
},
{
"name": "3562",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3562"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0178",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0178"
},
{
"name": "31326",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31326"
},
{
"name": "ADV-2008-2780",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2780"
},
{
"name": "php-safemode-directive-security-bypass(42134)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42134"
},
{
"name": "php-curlinit-security-bypass(39852)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39852"
},
{
"name" : "php-safemode-directive-security-bypass(42134)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42134"
"name": "APPLE-SA-2008-10-09",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
},
{
"name": "http://support.apple.com/kb/HT3216",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3216"
},
{
"name": "http://cvs.php.net/viewcvs.cgi/php-src/NEWS?revision=1.2027.2.547.2.1047&view=markup",
"refsource": "CONFIRM",
"url": "http://cvs.php.net/viewcvs.cgi/php-src/NEWS?revision=1.2027.2.547.2.1047&view=markup"
},
{
"name": "30048",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30048"
}
]
}

View File

@ -57,16 +57,6 @@
"refsource": "MISC",
"url": "http://www.nohack.cn/hacknews/20071119/1916.html"
},
{
"name" : "http://www.sebug.net/exploit/2575",
"refsource" : "MISC",
"url" : "http://www.sebug.net/exploit/2575"
},
{
"name" : "26536",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26536"
},
{
"name": "ADV-2007-3982",
"refsource": "VUPEN",
@ -77,6 +67,16 @@
"refsource": "OSVDB",
"url": "http://osvdb.org/39680"
},
{
"name": "26536",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26536"
},
{
"name": "http://www.sebug.net/exploit/2575",
"refsource": "MISC",
"url": "http://www.sebug.net/exploit/2575"
},
{
"name": "27795",
"refsource": "SECUNIA",

View File

@ -57,16 +57,16 @@
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-12/0470.html"
},
{
"name" : "http://www.heise-security.co.uk/news/100934",
"refsource" : "MISC",
"url" : "http://www.heise-security.co.uk/news/100934"
},
{
"name": "26967",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26967"
},
{
"name": "http://www.heise-security.co.uk/news/100934",
"refsource": "MISC",
"url": "http://www.heise-security.co.uk/news/100934"
},
{
"name": "hp-esupportdiagnostics-info-disclosure(39156)",
"refsource": "XF",

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "http://www.opera.com/docs/changelogs/windows/925/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/windows/925/"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=202770",
"refsource": "MISC",
@ -63,35 +68,40 @@
"url": "http://www.opera.com/docs/changelogs/linux/925/"
},
{
"name" : "http://www.opera.com/docs/changelogs/windows/925/",
"refsource" : "CONFIRM",
"url" : "http://www.opera.com/docs/changelogs/windows/925/"
"name": "1019131",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019131"
},
{
"name" : "GLSA-200712-22",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200712-22.xml"
},
{
"name" : "SUSE-SA:2008:001",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00001.html"
"name": "28314",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28314"
},
{
"name": "26937",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26937"
},
{
"name": "opera-plugins-security-bypass(39147)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39147"
},
{
"name": "SUSE-SA:2008:001",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00001.html"
},
{
"name": "GLSA-200712-22",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200712-22.xml"
},
{
"name": "ADV-2007-4261",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/4261"
},
{
"name" : "1019131",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1019131"
},
{
"name": "28169",
"refsource": "SECUNIA",
@ -101,16 +111,6 @@
"name": "28290",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28290"
},
{
"name" : "28314",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28314"
},
{
"name" : "opera-plugins-security-bypass(39147)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39147"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-5103",
"STATE": "PUBLIC"
},
@ -52,26 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20110113 CVE requests: ftpls, xdigger, lbreakout2, calibre, typo3",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/01/13/2"
},
{
"name" : "[oss-security] 20120510 Re: CVE-request: TYPO3 TYPO3-SA-2010-022 still without CVE",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/05/11/3"
},
{
"name" : "[oss-security] 20120511 CVE-request: TYPO3 TYPO3-SA-2010-022 still without CVE",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/05/10/7"
},
{
"name" : "[oss-security] 20120512 Re: CVE-request: TYPO3 TYPO3-SA-2010-022 still without CVE",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/05/12/5"
},
{
"name": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022/",
"refsource": "CONFIRM",
@ -82,20 +62,40 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45470"
},
{
"name" : "70117",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/70117"
},
{
"name": "35770",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35770"
},
{
"name": "[oss-security] 20120512 Re: CVE-request: TYPO3 TYPO3-SA-2010-022 still without CVE",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/05/12/5"
},
{
"name": "[oss-security] 20110113 CVE requests: ftpls, xdigger, lbreakout2, calibre, typo3",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/01/13/2"
},
{
"name": "[oss-security] 20120510 Re: CVE-request: TYPO3 TYPO3-SA-2010-022 still without CVE",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/05/11/3"
},
{
"name": "typo3-listmodule-sql-injection(64184)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64184"
},
{
"name": "70117",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/70117"
},
{
"name": "[oss-security] 20120511 CVE-request: TYPO3 TYPO3-SA-2010-022 still without CVE",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/05/10/7"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://packetstormsecurity.org/1010-exploits/smartftp4-dllhijack.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/1010-exploits/smartftp4-dllhijack.txt"
},
{
"name": "41808",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41808"
},
{
"name": "http://packetstormsecurity.org/1010-exploits/smartftp4-dllhijack.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/1010-exploits/smartftp4-dllhijack.txt"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0036",
"STATE": "PUBLIC"
},
@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "FEDORA-2014-3573",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130148.html"
},
{
"name": "FEDORA-2014-3526",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130180.html"
},
{
"name": "[oss-security] 20140306 CVE-2014-0036 rubygem-rbovirt: unsafe use of rest-client",
"refsource": "MLIST",
@ -61,16 +71,6 @@
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1058595",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1058595"
},
{
"name" : "FEDORA-2014-3526",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130180.html"
},
{
"name" : "FEDORA-2014-3573",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130148.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2014-1557",
"STATE": "PUBLIC"
},
@ -53,14 +53,34 @@
"references": {
"reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2014/mfsa2014-64.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2014/mfsa2014-64.html"
"name": "59719",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59719"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=913805",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=913805"
"name": "60083",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60083"
},
{
"name": "60621",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60621"
},
{
"name": "68824",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/68824"
},
{
"name": "GLSA-201504-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201504-01"
},
{
"name": "60306",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60306"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
@ -73,9 +93,14 @@
"url": "http://linux.oracle.com/errata/ELSA-2014-0918.html"
},
{
"name" : "DSA-2986",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-2986"
"name": "1030620",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030620"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=913805",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=913805"
},
{
"name": "DSA-2996",
@ -83,64 +108,39 @@
"url": "http://www.debian.org/security/2014/dsa-2996"
},
{
"name" : "GLSA-201504-01",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201504-01"
},
{
"name" : "68824",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/68824"
"name": "http://www.mozilla.org/security/announce/2014/mfsa2014-64.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2014/mfsa2014-64.html"
},
{
"name": "1030619",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030619"
},
{
"name" : "1030620",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030620"
},
{
"name" : "59591",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59591"
},
{
"name" : "59719",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59719"
},
{
"name" : "59760",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59760"
},
{
"name" : "60306",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/60306"
},
{
"name": "60486",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60486"
},
{
"name" : "60621",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/60621"
},
{
"name": "60628",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60628"
},
{
"name" : "60083",
"name": "DSA-2986",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2986"
},
{
"name": "59760",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/60083"
"url": "http://secunia.com/advisories/59760"
},
{
"name": "59591",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59591"
}
]
}

View File

@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20140122 Getting tempfile/mktemp wrong",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/01/22/3"
},
{
"name": "[oss-security] 20140122 Re: Getting tempfile/mktemp wrong",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/01/22/4"
},
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736358",
"refsource" : "MISC",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736358"
},
{
"name": "102383",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/102383"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736358",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736358"
},
{
"name": "axiom-cve20141640-symlink(90663)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90663"
},
{
"name": "[oss-security] 20140122 Getting tempfile/mktemp wrong",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/01/22/3"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://osandamalith.wordpress.com/2014/02/02/mybb-1-6-12-post-xss-0day/",
"refsource" : "MISC",
"url" : "http://osandamalith.wordpress.com/2014/02/02/mybb-1-6-12-post-xss-0day/"
},
{
"name": "http://packetstormsecurity.com/files/125038/MyBB-1.6.12-POST-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/125038/MyBB-1.6.12-POST-Cross-Site-Scripting.html"
},
{
"name": "http://osandamalith.wordpress.com/2014/02/02/mybb-1-6-12-post-xss-0day/",
"refsource": "MISC",
"url": "http://osandamalith.wordpress.com/2014/02/02/mybb-1-6-12-post-xss-0day/"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20140722 Reflected XSS vulnerabilities in DELL SonicWALL GMS 7.2 Build: 7221.1701 (CVE-2014-5024)",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Jul/125"
},
{
"name" : "http://packetstormsecurity.com/files/127575/SonicWALL-GMS-7.2-Build-7221.1701-Cross-Site-Scripting.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/127575/SonicWALL-GMS-7.2-Build-7221.1701-Cross-Site-Scripting.html"
"name": "68829",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/68829"
},
{
"name": "https://support.software.dell.com/product-notification/128245",
@ -68,14 +63,19 @@
"url": "https://support.software.dell.com/product-notification/128245"
},
{
"name" : "68829",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/68829"
"name": "20140722 Reflected XSS vulnerabilities in DELL SonicWALL GMS 7.2 Build: 7221.1701 (CVE-2014-5024)",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Jul/125"
},
{
"name": "60287",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60287"
},
{
"name": "http://packetstormsecurity.com/files/127575/SonicWALL-GMS-7.2-Build-7221.1701-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/127575/SonicWALL-GMS-7.2-Build-7221.1701-Cross-Site-Scripting.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2014-5400",
"STATE": "PUBLIC"
},

View File

@ -52,16 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "openSUSE-SU-2015:0489",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html"
},
{
"name": "72941",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72941"
},
{
"name": "http://www.wireshark.org/security/wnpa-sec-2015-10.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2015-10.html"
},
{
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11023",
"refsource" : "CONFIRM",
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11023"
},
{
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=608cf324b3962877e9699f3e81e8f82ac9f1ea14",
"refsource": "CONFIRM",
@ -72,45 +77,40 @@
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2015-0117.html"
},
{
"name": "1031858",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031858"
},
{
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11023",
"refsource": "CONFIRM",
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11023"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"name" : "DSA-3210",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3210"
},
{
"name" : "GLSA-201510-03",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201510-03"
},
{
"name": "MDVSA-2015:183",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:183"
},
{
"name": "DSA-3210",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3210"
},
{
"name": "RHSA-2015:1460",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1460.html"
},
{
"name" : "openSUSE-SU-2015:0489",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html"
},
{
"name" : "72941",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/72941"
},
{
"name" : "1031858",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1031858"
"name": "GLSA-201510-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201510-03"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "36413",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/36413/"
},
{
"name" : "20150312 WordPress SEO by Yoast <= 1.7.3.3 - Blind SQL Injection",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2015/Mar/73"
"name": "https://wpvulndb.com/vulnerabilities/7841",
"refsource": "MISC",
"url": "https://wpvulndb.com/vulnerabilities/7841"
},
{
"name": "http://packetstormsecurity.com/files/130811/WordPress-SEO-By-Yoast-1.7.3.3-SQL-Injection.html",
@ -68,9 +63,14 @@
"url": "http://packetstormsecurity.com/files/130811/WordPress-SEO-By-Yoast-1.7.3.3-SQL-Injection.html"
},
{
"name" : "https://wpvulndb.com/vulnerabilities/7841",
"refsource" : "MISC",
"url" : "https://wpvulndb.com/vulnerabilities/7841"
"name": "https://yoast.com/wordpress-seo-security-release/",
"refsource": "CONFIRM",
"url": "https://yoast.com/wordpress-seo-security-release/"
},
{
"name": "36413",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/36413/"
},
{
"name": "https://wordpress.org/plugins/wordpress-seo/changelog/",
@ -78,9 +78,9 @@
"url": "https://wordpress.org/plugins/wordpress-seo/changelog/"
},
{
"name" : "https://yoast.com/wordpress-seo-security-release/",
"refsource" : "CONFIRM",
"url" : "https://yoast.com/wordpress-seo-security-release/"
"name": "20150312 WordPress SEO by Yoast <= 1.7.3.3 - Blind SQL Injection",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Mar/73"
},
{
"name": "1031920",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-2785",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20150206 byzanz: Out-of heap-based buffer write in GIF encoder",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/02/06/11"
},
{
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778261",
"refsource": "MISC",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778261"
},
{
"name": "[oss-security] 20150206 byzanz: Out-of heap-based buffer write in GIF encoder",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/02/06/11"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=852481",
"refsource": "CONFIRM",

View File

@ -52,25 +52,30 @@
},
"references": {
"reference_data": [
{
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=5b53445e815fd6b652d49df03ec3d60b088c4fbc",
"refsource": "CONFIRM",
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=5b53445e815fd6b652d49df03ec3d60b088c4fbc"
},
{
"name": "http://www.wireshark.org/security/wnpa-sec-2015-28.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2015-28.html"
},
{
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358",
"refsource" : "CONFIRM",
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358"
},
{
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=3fc4a831e035604b0af14ed8a5c9f6596a3448d0",
"refsource": "CONFIRM",
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=3fc4a831e035604b0af14ed8a5c9f6596a3448d0"
},
{
"name" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=5b53445e815fd6b652d49df03ec3d60b088c4fbc",
"refsource" : "CONFIRM",
"url" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=5b53445e815fd6b652d49df03ec3d60b088c4fbc"
"name": "FEDORA-2015-13945",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168837.html"
},
{
"name": "1033272",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033272"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
@ -78,19 +83,9 @@
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358",
"refsource": "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
},
{
"name" : "DSA-3367",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3367"
},
{
"name" : "FEDORA-2015-13945",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168837.html"
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358"
},
{
"name": "FEDORA-2015-13946",
@ -98,9 +93,9 @@
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165509.html"
},
{
"name" : "openSUSE-SU-2015:1836",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html"
"name": "DSA-3367",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3367"
},
{
"name": "76387",
@ -108,9 +103,14 @@
"url": "http://www.securityfocus.com/bid/76387"
},
{
"name" : "1033272",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1033272"
"name": "openSUSE-SU-2015:1836",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
}
]
}

View File

@ -53,30 +53,30 @@
"references": {
"reference_data": [
{
"name" : "[MediaWiki-announce] 20150810 MediaWiki Security and Maintenance Releases: 1.25.2, 1.24.3, 1.23.10",
"refsource" : "MLIST",
"url" : "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html"
},
{
"name" : "[oss-security] 20150812 CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/08/12/6"
"name": "GLSA-201510-05",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201510-05"
},
{
"name": "[oss-security] 20150827 Re: CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/08/27/6"
},
{
"name": "[oss-security] 20150812 CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/08/12/6"
},
{
"name": "[MediaWiki-announce] 20150810 MediaWiki Security and Maintenance Releases: 1.25.2, 1.24.3, 1.23.10",
"refsource": "MLIST",
"url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html"
},
{
"name": "FEDORA-2015-13920",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html"
},
{
"name" : "GLSA-201510-05",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201510-05"
},
{
"name": "76334",
"refsource": "BID",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0568",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "dgh@bouncycastle.org",
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-1000346",
"STATE": "PUBLIC"
},
@ -11,18 +11,18 @@
"product": {
"product_data": [
{
"product_name" : "Bouncy Castle JCE Provider",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "1.55 and before"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "The Legion of the Bouncy Castle Inc."
"vendor_name": "n/a"
}
]
}
@ -44,7 +44,7 @@
"description": [
{
"lang": "eng",
"value" : "CWE-320: Key Management Errors"
"value": "n/a"
}
]
}
@ -58,9 +58,9 @@
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html"
},
{
"name" : "https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495#diff-d525a20b8acaed791ae2f0f770eb5937",
"refsource" : "CONFIRM",
"url" : "https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495#diff-d525a20b8acaed791ae2f0f770eb5937"
"name": "RHSA-2018:2669",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
},
{
"name": "https://security.netapp.com/advisory/ntap-20181127-0004/",
@ -68,19 +68,19 @@
"url": "https://security.netapp.com/advisory/ntap-20181127-0004/"
},
{
"name" : "RHSA-2018:2669",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:2669"
"name": "USN-3727-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3727-1/"
},
{
"name": "https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495#diff-d525a20b8acaed791ae2f0f770eb5937",
"refsource": "CONFIRM",
"url": "https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495#diff-d525a20b8acaed791ae2f0f770eb5937"
},
{
"name": "RHSA-2018:2927",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2927"
},
{
"name" : "USN-3727-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3727-1/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4094",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
},
{
"name": "1035828",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035828"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4135",
"STATE": "PUBLIC"
},
@ -53,44 +53,44 @@
"references": {
"reference_data": [
{
"name" : "40087",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/40087/"
},
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html"
"name": "1036117",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036117"
},
{
"name": "MS16-083",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083"
},
{
"name": "openSUSE-SU-2016:1625",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html"
},
{
"name": "40087",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40087/"
},
{
"name": "RHSA-2016:1238",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1238"
},
{
"name" : "SUSE-SU-2016:1613",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html"
},
{
"name": "openSUSE-SU-2016:1621",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html"
},
{
"name" : "openSUSE-SU-2016:1625",
"name": "SUSE-SU-2016:1613",
"refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html"
},
{
"name" : "1036117",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036117"
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4216",
"STATE": "PUBLIC"
},

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05279098",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05279098"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-523/",
"refsource": "MISC",
@ -62,11 +67,6 @@
"refsource": "MISC",
"url": "https://www.tenable.com/security/research/tra-2016-27"
},
{
"name" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05279098",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05279098"
},
{
"name": "93109",
"refsource": "BID",

View File

@ -58,24 +58,24 @@
"url": "http://www.openwall.com/lists/oss-security/2016/05/09/16"
},
{
"name" : "[oss-security] 20160511 Re: CVE requested: two stack exhaustation parsing xml files using mxml",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/05/11/14"
"name": "90315",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/90315"
},
{
"name": "[debian-lts-announce] 20190125 [SECURITY] [DLA 1641-1] mxml security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00018.html"
},
{
"name": "[oss-security] 20160511 Re: CVE requested: two stack exhaustation parsing xml files using mxml",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/05/11/14"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1334648",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1334648"
},
{
"name" : "90315",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/90315"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://support.lenovo.com/us/en/product_security/LEN-11635",
"refsource" : "CONFIRM",
"url" : "https://support.lenovo.com/us/en/product_security/LEN-11635"
},
{
"name": "95992",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95992"
},
{
"name": "https://support.lenovo.com/us/en/product_security/LEN-11635",
"refsource": "CONFIRM",
"url": "https://support.lenovo.com/us/en/product_security/LEN-11635"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-9243",
"STATE": "PUBLIC"
},
@ -52,6 +52,31 @@
},
"references": {
"reference_data": [
{
"name": "FEDORA-2016-2d90e27e50",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U23KDR2M2N7W2ZSREG63BVW7D4VC6CIZ/"
},
{
"name": "USN-3138-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3138-1"
},
{
"name": "https://github.com/pyca/cryptography/commit/b924696b2e8731f39696584d12cceeb3aeb2d874",
"refsource": "CONFIRM",
"url": "https://github.com/pyca/cryptography/commit/b924696b2e8731f39696584d12cceeb3aeb2d874"
},
{
"name": "FEDORA-2016-d3a2b640ce",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQ5G7KHKZC4SI23JE7277KZXM57GEQKT/"
},
{
"name": "94216",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94216"
},
{
"name": "[oss-security] 20161109 Re: CVE Request: Cryptography 1.5.3: HKDF might return an empty byte-string",
"refsource": "MLIST",
@ -62,40 +87,15 @@
"refsource": "CONFIRM",
"url": "https://cryptography.io/en/latest/changelog"
},
{
"name" : "https://github.com/pyca/cryptography/commit/b924696b2e8731f39696584d12cceeb3aeb2d874",
"refsource" : "CONFIRM",
"url" : "https://github.com/pyca/cryptography/commit/b924696b2e8731f39696584d12cceeb3aeb2d874"
},
{
"name" : "https://github.com/pyca/cryptography/issues/3211",
"refsource" : "CONFIRM",
"url" : "https://github.com/pyca/cryptography/issues/3211"
},
{
"name" : "FEDORA-2016-2d90e27e50",
"refsource" : "FEDORA",
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U23KDR2M2N7W2ZSREG63BVW7D4VC6CIZ/"
},
{
"name" : "FEDORA-2016-d3a2b640ce",
"refsource" : "FEDORA",
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQ5G7KHKZC4SI23JE7277KZXM57GEQKT/"
},
{
"name": "FEDORA-2016-e77c8c1f3b",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R2ZOBMPWDFFHUZ6QOZZY36A6H5CGJXL/"
},
{
"name" : "USN-3138-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3138-1"
},
{
"name" : "94216",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/94216"
"name": "https://github.com/pyca/cryptography/issues/3211",
"refsource": "CONFIRM",
"url": "https://github.com/pyca/cryptography/issues/3211"
}
]
}

View File

@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20161209 Linux Kernel use-after-free in SCSI generic device interface",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/12/08/19"
"name": "openSUSE-SU-2016:3118",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00057.html"
},
{
"name": "SUSE-SU-2016:3248",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00088.html"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a0ac402cfcdc904f9772e1762b3fda112dcc56a0",
@ -63,14 +68,9 @@
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a0ac402cfcdc904f9772e1762b3fda112dcc56a0"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.14",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.14"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1403145",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1403145"
"name": "openSUSE-SU-2016:3085",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00040.html"
},
{
"name": "https://github.com/torvalds/linux/commit/a0ac402cfcdc904f9772e1762b3fda112dcc56a0",
@ -83,24 +83,9 @@
"url": "https://access.redhat.com/errata/RHSA-2017:2669"
},
{
"name" : "RHSA-2017:0817",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0817.html"
},
{
"name" : "RHSA-2017:1842",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1842"
},
{
"name" : "RHSA-2017:2077",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:2077"
},
{
"name" : "openSUSE-SU-2016:3085",
"name": "SUSE-SU-2016:3188",
"refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00040.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00072.html"
},
{
"name": "openSUSE-SU-2016:3086",
@ -112,40 +97,55 @@
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00062.html"
},
{
"name" : "SUSE-SU-2016:3188",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00072.html"
},
{
"name": "SUSE-SU-2016:3203",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00075.html"
},
{
"name": "RHSA-2017:0817",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0817.html"
},
{
"name": "SUSE-SU-2016:3217",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00081.html"
},
{
"name" : "SUSE-SU-2016:3248",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00088.html"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1403145",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403145"
},
{
"name" : "SUSE-SU-2016:3252",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00091.html"
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.14",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.14"
},
{
"name" : "openSUSE-SU-2016:3118",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00057.html"
"name": "[oss-security] 20161209 Linux Kernel use-after-free in SCSI generic device interface",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/12/08/19"
},
{
"name": "RHSA-2017:2077",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2077"
},
{
"name": "RHSA-2017:1842",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1842"
},
{
"name": "94821",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94821"
},
{
"name": "SUSE-SU-2016:3252",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00091.html"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-9663",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-9922",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20161209 Re: CVE request Qemu: display: cirrus_vga: a divide by zero in cirrus_do_copy",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/12/09/1"
},
{
"name": "[qemu-devel] 20161205 [PULL 4/4] display: cirrus: check vga bits per pixel(bpp) value",
"refsource": "MLIST",
@ -68,9 +63,14 @@
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
},
{
"name" : "http://git.qemu-project.org/?p=qemu.git;a=commit;h=4299b90e9ba9ce5ca9024572804ba751aa1a7e70",
"refsource" : "CONFIRM",
"url" : "http://git.qemu-project.org/?p=qemu.git;a=commit;h=4299b90e9ba9ce5ca9024572804ba751aa1a7e70"
"name": "RHSA-2017:2392",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2392"
},
{
"name": "94803",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94803"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1334398",
@ -78,9 +78,9 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1334398"
},
{
"name" : "RHSA-2017:2392",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:2392"
"name": "http://git.qemu-project.org/?p=qemu.git;a=commit;h=4299b90e9ba9ce5ca9024572804ba751aa1a7e70",
"refsource": "CONFIRM",
"url": "http://git.qemu-project.org/?p=qemu.git;a=commit;h=4299b90e9ba9ce5ca9024572804ba751aa1a7e70"
},
{
"name": "RHSA-2017:2408",
@ -88,9 +88,9 @@
"url": "https://access.redhat.com/errata/RHSA-2017:2408"
},
{
"name" : "94803",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/94803"
"name": "[oss-security] 20161209 Re: CVE request Qemu: display: cirrus_vga: a divide by zero in cirrus_do_copy",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/12/09/1"
}
]
}

View File

@ -61,15 +61,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name": "106617",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106617"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
}
]
}