"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 01:31:39 +00:00
parent 4b3dcca889
commit 964a7f04d3
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
61 changed files with 3273 additions and 3273 deletions

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2007-0043",
"STATE": "PUBLIC"
},
@ -63,14 +63,9 @@
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-040"
},
{
"name" : "TA07-191A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-191A.html"
},
{
"name" : "24811",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24811"
"name": "ADV-2007-2482",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2482"
},
{
"name": "35956",
@ -78,29 +73,34 @@
"url": "http://osvdb.org/35956"
},
{
"name" : "ADV-2007-2482",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2482"
"name": "26003",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26003"
},
{
"name": "oval:org.mitre.oval:def:1873",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1873"
},
{
"name": "ms-dotnet-jit-bo(34639)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34639"
},
{
"name": "TA07-191A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-191A.html"
},
{
"name": "1018356",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018356"
},
{
"name" : "26003",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26003"
},
{
"name" : "ms-dotnet-jit-bo(34639)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34639"
"name": "24811",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24811"
}
]
}

View File

@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name" : "20070105 Coppermine Photo Gallery <= 1.4.10 SQL Injection Exploit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/456051/100/0/threaded"
},
{
"name": "20070108 Source verify - Coppermine Photo Gallery <= 1.4.10 code injection",
"refsource": "VIM",
"url": "http://www.attrition.org/pipermail/vim/2007-January/001218.html"
},
{
"name" : "http://acid-root.new.fr/poc/19070104.txt",
"refsource" : "MISC",
"url" : "http://acid-root.new.fr/poc/19070104.txt"
},
{
"name": "33383",
"refsource": "OSVDB",
"url": "http://osvdb.org/33383"
},
{
"name": "http://acid-root.new.fr/poc/19070104.txt",
"refsource": "MISC",
"url": "http://acid-root.new.fr/poc/19070104.txt"
},
{
"name": "2107",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2107"
},
{
"name": "20070105 Coppermine Photo Gallery <= 1.4.10 SQL Injection Exploit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/456051/100/0/threaded"
}
]
}

View File

@ -52,60 +52,60 @@
},
"references": {
"reference_data": [
{
"name" : "20070111 DMA[2007-0107a] OmniWeb Javascript Alert Format String Vulnerabiity and DMA[2007-0109a] Apple Finder Disk Image Volume Label Overflow / DoS",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/456578/100/0/threaded"
},
{
"name" : "http://projects.info-pull.com/moab/MOAB-07-01-2007.html",
"refsource" : "MISC",
"url" : "http://projects.info-pull.com/moab/MOAB-07-01-2007.html"
},
{
"name" : "3098",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3098"
},
{
"name" : "http://www.digitalmunition.com/DMA%5B2007-0107a%5D.txt",
"refsource" : "MISC",
"url" : "http://www.digitalmunition.com/DMA%5B2007-0107a%5D.txt"
},
{
"name": "http://www.omnigroup.com/applications/omniweb/releasenotes/",
"refsource": "CONFIRM",
"url": "http://www.omnigroup.com/applications/omniweb/releasenotes/"
},
{
"name" : "http://blog.omnigroup.com/2007/01/07/omniweb-552-now-available-and-more-secure/",
"refsource" : "CONFIRM",
"url" : "http://blog.omnigroup.com/2007/01/07/omniweb-552-now-available-and-more-secure/"
},
{
"name": "21911",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21911"
},
{
"name" : "ADV-2007-0075",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0075"
},
{
"name" : "31222",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/31222"
"name": "3098",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3098"
},
{
"name": "23624",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23624"
},
{
"name": "http://blog.omnigroup.com/2007/01/07/omniweb-552-now-available-and-more-secure/",
"refsource": "CONFIRM",
"url": "http://blog.omnigroup.com/2007/01/07/omniweb-552-now-available-and-more-secure/"
},
{
"name": "ADV-2007-0075",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0075"
},
{
"name": "omniweb-alert-format-string(31324)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31324"
},
{
"name": "http://projects.info-pull.com/moab/MOAB-07-01-2007.html",
"refsource": "MISC",
"url": "http://projects.info-pull.com/moab/MOAB-07-01-2007.html"
},
{
"name": "20070111 DMA[2007-0107a] OmniWeb Javascript Alert Format String Vulnerabiity and DMA[2007-0109a] Apple Finder Disk Image Volume Label Overflow / DoS",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/456578/100/0/threaded"
},
{
"name": "31222",
"refsource": "OSVDB",
"url": "http://osvdb.org/31222"
},
{
"name": "http://www.digitalmunition.com/DMA%5B2007-0107a%5D.txt",
"refsource": "MISC",
"url": "http://www.digitalmunition.com/DMA%5B2007-0107a%5D.txt"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20070108 MKPortal Full Path Disclosure",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/456257/100/0/threaded"
},
{
"name": "33407",
"refsource": "OSVDB",
"url": "http://osvdb.org/33407"
},
{
"name": "20070108 MKPortal Full Path Disclosure",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/456257/100/0/threaded"
},
{
"name": "mkportal-admin-path-disclosure(31333)",
"refsource": "XF",

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "3280",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3280"
"name": "22442",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22442"
},
{
"name": "20070207 false: Agermenu 0.03",
@ -63,29 +63,29 @@
"url": "http://www.attrition.org/pipermail/vim/2007-February/001297.html"
},
{
"name" : "20070207 true: agermenu",
"refsource" : "VIM",
"url" : "http://www.attrition.org/pipermail/vim/2007-February/001288.html"
},
{
"name" : "22442",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22442"
"name": "3280",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3280"
},
{
"name": "ADV-2007-0512",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0512"
},
{
"name" : "33681",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33681"
},
{
"name": "agermenu-topinc-file-include(32283)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32283"
},
{
"name": "20070207 true: agermenu",
"refsource": "VIM",
"url": "http://www.attrition.org/pipermail/vim/2007-February/001288.html"
},
{
"name": "33681",
"refsource": "OSVDB",
"url": "http://osvdb.org/33681"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070221 Cisco Unified IP Conference Station and IP Phone Vulnerabilities",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/warp/public/707/cisco-sa-20070221-phone.shtml"
"name": "cisco-unified-ip-phone-default-user-account(32627)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32627"
},
{
"name": "20070221 Identifying and Mitigating Exploitation of Cisco Unified IP Conference Station and IP Phone Vulnerabilities",
@ -63,34 +63,34 @@
"url": "http://www.cisco.com/warp/public/707/cisco-air-20070221-phone.shtml"
},
{
"name" : "22647",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22647"
},
{
"name" : "ADV-2007-0689",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0689"
"name": "20070221 Cisco Unified IP Conference Station and IP Phone Vulnerabilities",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20070221-phone.shtml"
},
{
"name": "45246",
"refsource": "OSVDB",
"url": "http://osvdb.org/45246"
},
{
"name" : "1017681",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017681"
},
{
"name": "24262",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24262"
},
{
"name" : "cisco-unified-ip-phone-default-user-account(32627)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32627"
"name": "ADV-2007-0689",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0689"
},
{
"name": "22647",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22647"
},
{
"name": "1017681",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017681"
}
]
}

View File

@ -57,11 +57,6 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/461071/100/0/threaded"
},
{
"name" : "33756",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33756"
},
{
"name": "33757",
"refsource": "OSVDB",
@ -72,6 +67,11 @@
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2295"
},
{
"name": "33756",
"refsource": "OSVDB",
"url": "http://osvdb.org/33756"
},
{
"name": "shopkitplus-events-stylecss-info-disclosure(32661)",
"refsource": "XF",

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/461373/100/0/threaded"
},
{
"name" : "http://securityvulns.com/Qdocument120.html",
"refsource" : "MISC",
"url" : "http://securityvulns.com/Qdocument120.html"
},
{
"name": "34489",
"refsource": "OSVDB",
"url": "http://osvdb.org/34489"
},
{
"name": "http://securityvulns.com/Qdocument120.html",
"refsource": "MISC",
"url": "http://securityvulns.com/Qdocument120.html"
}
]
}

View File

@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070309 Remote File Include In Script copyright (c) James Coyle; JCcorp",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/462310/100/0/threaded"
},
{
"name" : "20070322 Remote File Include In copyright &copy; James Coyle; JCcorp",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/463523/100/0/threaded"
},
{
"name" : "22894",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22894"
"name": "33982",
"refsource": "OSVDB",
"url": "http://osvdb.org/33982"
},
{
"name": "ADV-2007-0902",
@ -73,19 +63,29 @@
"url": "http://www.vupen.com/english/advisories/2007/0902"
},
{
"name" : "33982",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33982"
"name": "22894",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22894"
},
{
"name": "24340",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24340"
},
{
"name": "20070309 Remote File Include In Script copyright (c) James Coyle; JCcorp",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/462310/100/0/threaded"
},
{
"name": "2415",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2415"
},
{
"name": "20070322 Remote File Include In copyright &copy; James Coyle; JCcorp",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/463523/100/0/threaded"
}
]
}

View File

@ -53,15 +53,25 @@
"references": {
"reference_data": [
{
"name" : "3599",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3599"
"name": "codebb-passcode-file-include(33293)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33293"
},
{
"name": "23185",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23185"
},
{
"name": "35423",
"refsource": "OSVDB",
"url": "http://osvdb.org/35423"
},
{
"name": "3599",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3599"
},
{
"name": "ADV-2007-1148",
"refsource": "VUPEN",
@ -71,16 +81,6 @@
"name": "35422",
"refsource": "OSVDB",
"url": "http://osvdb.org/35422"
},
{
"name" : "35423",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/35423"
},
{
"name" : "codebb-passcode-file-include(33293)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33293"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2007-5581",
"STATE": "PUBLIC"
},
@ -58,14 +58,9 @@
"url": "http://www.cisco.com/warp/public/707/cisco-sr-20071107-mp.shtml"
},
{
"name" : "26364",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26364"
},
{
"name" : "ADV-2007-3772",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3772"
"name": "26462",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26462"
},
{
"name": "1018904",
@ -73,14 +68,19 @@
"url": "http://securitytracker.com/id?1018904"
},
{
"name" : "26462",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26462"
"name": "26364",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26364"
},
{
"name": "cisco-meetingplace-mpx-xss(38298)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38298"
},
{
"name": "ADV-2007-3772",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3772"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-3040",
"STATE": "PUBLIC"
},
@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html"
},
{
"name" : "GLSA-201504-07",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201504-07"
},
{
"name" : "RHSA-2015:0813",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0813.html"
"name": "openSUSE-SU-2015:0718",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html"
},
{
"name": "SUSE-SU-2015:0722",
@ -73,14 +63,24 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html"
},
{
"name" : "SUSE-SU-2015:0723",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html"
"name": "GLSA-201504-07",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201504-07"
},
{
"name" : "openSUSE-SU-2015:0718",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html"
"name": "1032105",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032105"
},
{
"name": "RHSA-2015:0813",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0813.html"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html"
},
{
"name": "openSUSE-SU-2015:0725",
@ -88,9 +88,9 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html"
},
{
"name" : "1032105",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1032105"
"name": "SUSE-SU-2015:0723",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html"
}
]
}

View File

@ -57,30 +57,30 @@
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/05/13/11"
},
{
"name": "https://github.com/rofl0r/proxychains-ng/commit/9ab7dbeb3baff67a51d0c5e71465c453be0890b5#diff-803c5170888b8642f2a97e5e9423d399",
"refsource": "CONFIRM",
"url": "https://github.com/rofl0r/proxychains-ng/commit/9ab7dbeb3baff67a51d0c5e71465c453be0890b5#diff-803c5170888b8642f2a97e5e9423d399"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1147013",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1147013"
},
{
"name": "74648",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/74648"
},
{
"name": "https://github.com/rofl0r/proxychains-ng/blob/v4.9/README#L56",
"refsource": "CONFIRM",
"url": "https://github.com/rofl0r/proxychains-ng/blob/v4.9/README#L56"
},
{
"name" : "https://github.com/rofl0r/proxychains-ng/commit/9ab7dbeb3baff67a51d0c5e71465c453be0890b5#diff-803c5170888b8642f2a97e5e9423d399",
"refsource" : "CONFIRM",
"url" : "https://github.com/rofl0r/proxychains-ng/commit/9ab7dbeb3baff67a51d0c5e71465c453be0890b5#diff-803c5170888b8642f2a97e5e9423d399"
},
{
"name": "https://github.com/rofl0r/proxychains-ng/issues/60",
"refsource": "CONFIRM",
"url": "https://github.com/rofl0r/proxychains-ng/issues/60"
},
{
"name" : "74648",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/74648"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2015-6621",
"STATE": "PUBLIC"
},

View File

@ -53,35 +53,35 @@
"references": {
"reference_data": [
{
"name" : "[MediaWiki-announce] 20150810 MediaWiki Security and Maintenance Releases: 1.25.2, 1.24.3, 1.23.10",
"refsource" : "MLIST",
"url" : "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html"
},
{
"name" : "[oss-security] 20150812 CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/08/12/6"
"name": "GLSA-201510-05",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201510-05"
},
{
"name": "[oss-security] 20150827 Re: CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/08/27/6"
},
{
"name": "[oss-security] 20150812 CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/08/12/6"
},
{
"name": "https://phabricator.wikimedia.org/T103391",
"refsource": "CONFIRM",
"url": "https://phabricator.wikimedia.org/T103391"
},
{
"name": "[MediaWiki-announce] 20150810 MediaWiki Security and Maintenance Releases: 1.25.2, 1.24.3, 1.23.10",
"refsource": "MLIST",
"url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html"
},
{
"name": "FEDORA-2015-13920",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html"
},
{
"name" : "GLSA-201510-05",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201510-05"
},
{
"name": "76334",
"refsource": "BID",

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://www.drupal.org/node/2542380",
"refsource" : "MISC",
"url" : "https://www.drupal.org/node/2542380"
},
{
"name": "https://www.drupal.org/node/2541832",
"refsource": "CONFIRM",
"url": "https://www.drupal.org/node/2541832"
},
{
"name": "https://www.drupal.org/node/2542380",
"refsource": "MISC",
"url": "https://www.drupal.org/node/2542380"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-7512",
"STATE": "PUBLIC"
},
@ -52,21 +52,26 @@
},
"references": {
"reference_data": [
{
"name": "RHSA-2015:2694",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2694.html"
},
{
"name": "[oss-security] 20151130 CVE-2015-7512 Qemu: net: pcnet: buffer overflow in non-loopback mode",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/11/30/3"
},
{
"name" : "http://git.qemu.org/?p=qemu.git;a=commit;h=8b98a2f07175d46c3f7217639bd5e03f",
"refsource" : "CONFIRM",
"url" : "http://git.qemu.org/?p=qemu.git;a=commit;h=8b98a2f07175d46c3f7217639bd5e03f"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
},
{
"name": "http://git.qemu.org/?p=qemu.git;a=commit;h=8b98a2f07175d46c3f7217639bd5e03f",
"refsource": "CONFIRM",
"url": "http://git.qemu.org/?p=qemu.git;a=commit;h=8b98a2f07175d46c3f7217639bd5e03f"
},
{
"name": "DSA-3469",
"refsource": "DEBIAN",
@ -77,6 +82,16 @@
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3470"
},
{
"name": "78230",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/78230"
},
{
"name": "1034527",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034527"
},
{
"name": "DSA-3471",
"refsource": "DEBIAN",
@ -87,30 +102,15 @@
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201602-01"
},
{
"name" : "RHSA-2015:2694",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2694.html"
},
{
"name" : "RHSA-2015:2695",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2695.html"
},
{
"name": "RHSA-2015:2696",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2696.html"
},
{
"name" : "78230",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/78230"
},
{
"name" : "1034527",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034527"
"name": "RHSA-2015:2695",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2695.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-7543",
"STATE": "PUBLIC"
},

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-7594",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-8436",
"STATE": "PUBLIC"
},
@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://zerodayinitiative.com/advisories/ZDI-15-603",
"refsource" : "MISC",
"url" : "http://zerodayinitiative.com/advisories/ZDI-15-603"
},
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
"name": "openSUSE-SU-2015:2239",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680",
@ -73,39 +63,49 @@
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html",
"refsource": "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
},
{
"name" : "GLSA-201601-03",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201601-03"
},
{
"name" : "SUSE-SU-2015:2236",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html"
},
{
"name" : "SUSE-SU-2015:2247",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html"
},
{
"name" : "openSUSE-SU-2015:2239",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html"
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html"
},
{
"name": "78715",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/78715"
},
{
"name": "SUSE-SU-2015:2236",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
},
{
"name": "SUSE-SU-2015:2247",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html"
},
{
"name": "1034318",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034318"
},
{
"name": "http://zerodayinitiative.com/advisories/ZDI-15-603",
"refsource": "MISC",
"url": "http://zerodayinitiative.com/advisories/ZDI-15-603"
},
{
"name": "GLSA-201601-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201601-03"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-8911",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-0174",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-16-280",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-16-280"
"name": "1035841",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035841"
},
{
"name": "MS16-062",
@ -68,9 +68,9 @@
"url": "http://www.securityfocus.com/bid/90065"
},
{
"name" : "1035841",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035841"
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-280",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-280"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0578",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0639",
"STATE": "PUBLIC"
},
@ -53,25 +53,20 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
},
{
"name" : "RHSA-2016:0705",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0705.html"
},
{
"name" : "openSUSE-SU-2016:1332",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html"
"name": "1035606",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035606"
},
{
"name": "USN-2953-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2953-1"
},
{
"name": "openSUSE-SU-2016:1332",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html"
},
{
"name": "USN-2954-1",
"refsource": "UBUNTU",
@ -83,9 +78,14 @@
"url": "http://www.securityfocus.com/bid/86418"
},
{
"name" : "1035606",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035606"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
},
{
"name": "RHSA-2016:0705",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0705.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0648",
"STATE": "PUBLIC"
},
@ -53,64 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
},
{
"name" : "https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/",
"refsource" : "CONFIRM",
"url" : "https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/"
},
{
"name" : "https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/",
"refsource" : "CONFIRM",
"url" : "https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/"
},
{
"name" : "https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/",
"refsource" : "CONFIRM",
"url" : "https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
},
{
"name" : "DSA-3595",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3595"
},
{
"name" : "DSA-3557",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3557"
},
{
"name" : "RHSA-2016:0705",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0705.html"
},
{
"name" : "RHSA-2016:1602",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1602.html"
},
{
"name" : "RHSA-2016:1132",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1132"
},
{
"name" : "RHSA-2016:1480",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1480.html"
"name": "SUSE-SU-2016:1620",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"
},
{
"name": "RHSA-2016:1481",
@ -118,54 +63,109 @@
"url": "http://rhn.redhat.com/errata/RHSA-2016-1481.html"
},
{
"name" : "openSUSE-SU-2016:1686",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"
"name": "RHSA-2016:1132",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1132"
},
{
"name" : "SUSE-SU-2016:1619",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"
"name": "1035606",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035606"
},
{
"name" : "SUSE-SU-2016:1620",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"
},
{
"name" : "openSUSE-SU-2016:1664",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"
},
{
"name" : "SUSE-SU-2016:1279",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html"
},
{
"name" : "openSUSE-SU-2016:1332",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html"
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
},
{
"name": "USN-2953-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2953-1"
},
{
"name": "https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/",
"refsource": "CONFIRM",
"url": "https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/"
},
{
"name": "openSUSE-SU-2016:1332",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html"
},
{
"name": "USN-2954-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2954-1"
},
{
"name": "SUSE-SU-2016:1619",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"
},
{
"name": "RHSA-2016:1480",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1480.html"
},
{
"name": "openSUSE-SU-2016:1664",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"
},
{
"name": "https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/",
"refsource": "CONFIRM",
"url": "https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168"
},
{
"name": "DSA-3557",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3557"
},
{
"name": "RHSA-2016:1602",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1602.html"
},
{
"name": "DSA-3595",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3595"
},
{
"name": "86457",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/86457"
},
{
"name" : "1035606",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035606"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
},
{
"name": "openSUSE-SU-2016:1686",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"
},
{
"name": "RHSA-2016:0705",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0705.html"
},
{
"name": "https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/",
"refsource": "CONFIRM",
"url": "https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/"
},
{
"name": "SUSE-SU-2016:1279",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-0670",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1462",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1036472",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036472"
},
{
"name": "20160727 Cisco Prime Service Catalog Reflected Cross-Site Scripting Vulnerability",
"refsource": "CISCO",
@ -61,11 +66,6 @@
"name": "92156",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92156"
},
{
"name" : "1036472",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036472"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2016-1769",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "39635",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/39635/"
"name": "APPLE-SA-2016-03-21-5",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html"
},
{
"name": "https://support.apple.com/HT206167",
@ -63,9 +63,9 @@
"url": "https://support.apple.com/HT206167"
},
{
"name" : "APPLE-SA-2016-03-21-5",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html"
"name": "39635",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/39635/"
},
{
"name": "1035363",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2016-5266",
"STATE": "PUBLIC"
},
@ -53,29 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2016/mfsa2016-81.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2016/mfsa2016-81.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1226977",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1226977"
},
{
"name" : "GLSA-201701-15",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201701-15"
},
{
"name" : "openSUSE-SU-2016:1964",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html"
},
{
"name" : "openSUSE-SU-2016:2026",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"
"name": "1036508",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036508"
},
{
"name": "USN-3044-1",
@ -88,9 +68,29 @@
"url": "http://www.securityfocus.com/bid/92260"
},
{
"name" : "1036508",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036508"
"name": "GLSA-201701-15",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-15"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1226977",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1226977"
},
{
"name": "openSUSE-SU-2016:1964",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html"
},
{
"name": "http://www.mozilla.org/security/announce/2016/mfsa2016-81.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2016/mfsa2016-81.html"
},
{
"name": "openSUSE-SU-2016:2026",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"
}
]
}

View File

@ -53,44 +53,44 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20160614 Various invalid memory reads in ImageMagick (WPG, DDS, DCM)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/06/14/5"
},
{
"name" : "[oss-security] 20160617 Re: Various invalid memory reads in ImageMagick (WPG, DDS, DCM)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/06/17/3"
"name": "91283",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91283"
},
{
"name": "https://blog.fuzzing-project.org/46-Various-invalid-memory-reads-in-ImageMagick-WPG,-DDS,-DCM.html",
"refsource": "MISC",
"url": "https://blog.fuzzing-project.org/46-Various-invalid-memory-reads-in-ImageMagick-WPG,-DDS,-DCM.html"
},
{
"name": "https://github.com/ImageMagick/ImageMagick/commit/5511ef530576ed18fd636baa3bb4eda3d667665d",
"refsource": "CONFIRM",
"url": "https://github.com/ImageMagick/ImageMagick/commit/5511ef530576ed18fd636baa3bb4eda3d667665d"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"name" : "https://github.com/ImageMagick/ImageMagick/blob/6.9.4-5/ChangeLog",
"refsource" : "CONFIRM",
"url" : "https://github.com/ImageMagick/ImageMagick/blob/6.9.4-5/ChangeLog"
},
{
"name": "https://github.com/ImageMagick/ImageMagick/blob/7.0.1-7/ChangeLog",
"refsource": "CONFIRM",
"url": "https://github.com/ImageMagick/ImageMagick/blob/7.0.1-7/ChangeLog"
},
{
"name" : "https://github.com/ImageMagick/ImageMagick/commit/5511ef530576ed18fd636baa3bb4eda3d667665d",
"name": "https://github.com/ImageMagick/ImageMagick/blob/6.9.4-5/ChangeLog",
"refsource": "CONFIRM",
"url" : "https://github.com/ImageMagick/ImageMagick/commit/5511ef530576ed18fd636baa3bb4eda3d667665d"
"url": "https://github.com/ImageMagick/ImageMagick/blob/6.9.4-5/ChangeLog"
},
{
"name" : "91283",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/91283"
"name": "[oss-security] 20160617 Re: Various invalid memory reads in ImageMagick (WPG, DDS, DCM)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/06/17/3"
},
{
"name": "[oss-security] 20160614 Various invalid memory reads in ImageMagick (WPG, DDS, DCM)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/06/14/5"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20160810 [CORE-2016-0006] - SAP CAR Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/539180/100/0/threaded"
},
{
"name": "40230",
"refsource": "EXPLOIT-DB",
@ -67,6 +62,16 @@
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2016/Aug/46"
},
{
"name": "92406",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92406"
},
{
"name": "20160810 [CORE-2016-0006] - SAP CAR Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/539180/100/0/threaded"
},
{
"name": "http://packetstormsecurity.com/files/138284/SAP-CAR-Archive-Tool-Denial-Of-Service-Security-Bypass.html",
"refsource": "MISC",
@ -76,11 +81,6 @@
"name": "https://www.coresecurity.com/advisories/sap-car-multiple-vulnerabilities",
"refsource": "MISC",
"url": "https://www.coresecurity.com/advisories/sap-car-multiple-vulnerabilities"
},
{
"name" : "92406",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/92406"
}
]
}