mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
3b673b3dfd
commit
9a281a4522
@ -52,35 +52,35 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "MS08-001",
|
||||||
|
"refsource": "MS",
|
||||||
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-001"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20070108 Multiple (3) Microsoft Windows TCP/IP Remote Code Execution and DoS Vulnerabilities",
|
"name": "20070108 Multiple (3) Microsoft Windows TCP/IP Remote Code Execution and DoS Vulnerabilities",
|
||||||
"refsource": "ISS",
|
"refsource": "ISS",
|
||||||
"url": "http://www.iss.net/threats/282.html"
|
"url": "http://www.iss.net/threats/282.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "TA08-008A",
|
||||||
|
"refsource": "CERT",
|
||||||
|
"url": "http://www.us-cert.gov/cas/techalerts/TA08-008A.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1019166",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://securitytracker.com/id?1019166"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://blogs.technet.com/swi/archive/2008/01/08/ms08-001-part-2-the-case-of-the-moderate-icmp-mitigations.aspx",
|
"name": "http://blogs.technet.com/swi/archive/2008/01/08/ms08-001-part-2-the-case-of-the-moderate-icmp-mitigations.aspx",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://blogs.technet.com/swi/archive/2008/01/08/ms08-001-part-2-the-case-of-the-moderate-icmp-mitigations.aspx"
|
"url": "http://blogs.technet.com/swi/archive/2008/01/08/ms08-001-part-2-the-case-of-the-moderate-icmp-mitigations.aspx"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "HPSBST02304",
|
"name": "28297",
|
||||||
"refsource" : "HP",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/486317/100/0/threaded"
|
"url": "http://secunia.com/advisories/28297"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSRT080003",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/486317/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MS08-001",
|
|
||||||
"refsource" : "MS",
|
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-001"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "TA08-008A",
|
|
||||||
"refsource" : "CERT",
|
|
||||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-008A.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "27139",
|
"name": "27139",
|
||||||
@ -97,20 +97,20 @@
|
|||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5271"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5271"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "1019166",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://securitytracker.com/id?1019166"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "28297",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/28297"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "win-tcpip-icmp-dos(39254)",
|
"name": "win-tcpip-icmp-dos(39254)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39254"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39254"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSRT080003",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/486317/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBST02304",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/486317/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20070112 Wordpress disclosure of Table Prefix Weakness",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/456731/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "33458",
|
"name": "33458",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/33458"
|
"url": "http://osvdb.org/33458"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20070112 Wordpress disclosure of Table Prefix Weakness",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/456731/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,24 +53,24 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "3120",
|
"name": "32820",
|
||||||
"refsource" : "EXPLOIT-DB",
|
"refsource": "OSVDB",
|
||||||
"url" : "https://www.exploit-db.com/exploits/3120"
|
"url": "http://osvdb.org/32820"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2007-0175",
|
"name": "ADV-2007-0175",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2007/0175"
|
"url": "http://www.vupen.com/english/advisories/2007/0175"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "32820",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/32820"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "23756",
|
"name": "23756",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/23756"
|
"url": "http://secunia.com/advisories/23756"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "3120",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/3120"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2007-0456",
|
"ID": "CVE-2007-0456",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,70 +52,20 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.wireshark.org/security/wnpa-sec-2007-01.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.wireshark.org/security/wnpa-sec-2007-01.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://issues.rpath.com/browse/RPL-985",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://issues.rpath.com/browse/RPL-985"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2007-166.htm",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2007-166.htm"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2007-207",
|
"name": "FEDORA-2007-207",
|
||||||
"refsource": "FEDORA",
|
"refsource": "FEDORA",
|
||||||
"url": "http://fedoranews.org/cms/node/2565"
|
"url": "http://fedoranews.org/cms/node/2565"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "MDKSA-2007:033",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:033"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2007:0066",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0066.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20070301-01-P",
|
|
||||||
"refsource" : "SGI",
|
|
||||||
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "22352",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/22352"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:11342",
|
"name": "oval:org.mitre.oval:def:11342",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11342"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11342"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "oval:org.mitre.oval:def:14867",
|
"name": "24970",
|
||||||
"refsource" : "OVAL",
|
"refsource": "SECUNIA",
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14867"
|
"url": "http://secunia.com/advisories/24970"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2007-0443",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/0443"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "33073",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/33073"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1017581",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://securitytracker.com/id?1017581"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "24016",
|
"name": "24016",
|
||||||
@ -123,14 +73,14 @@
|
|||||||
"url": "http://secunia.com/advisories/24016"
|
"url": "http://secunia.com/advisories/24016"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "24011",
|
"name": "ADV-2007-0443",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://secunia.com/advisories/24011"
|
"url": "http://www.vupen.com/english/advisories/2007/0443"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "24025",
|
"name": "1017581",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://secunia.com/advisories/24025"
|
"url": "http://securitytracker.com/id?1017581"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "24084",
|
"name": "24084",
|
||||||
@ -138,9 +88,29 @@
|
|||||||
"url": "http://secunia.com/advisories/24084"
|
"url": "http://secunia.com/advisories/24084"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "24515",
|
"name": "wireshark-lltdissector-dos(32056)",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "XF",
|
||||||
"url" : "http://secunia.com/advisories/24515"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32056"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDKSA-2007:033",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:033"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:14867",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14867"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-166.htm",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-166.htm"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://issues.rpath.com/browse/RPL-985",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://issues.rpath.com/browse/RPL-985"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "24650",
|
"name": "24650",
|
||||||
@ -148,14 +118,44 @@
|
|||||||
"url": "http://secunia.com/advisories/24650"
|
"url": "http://secunia.com/advisories/24650"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "24970",
|
"name": "RHSA-2007:0066",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://secunia.com/advisories/24970"
|
"url": "http://www.redhat.com/support/errata/RHSA-2007-0066.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "wireshark-lltdissector-dos(32056)",
|
"name": "24025",
|
||||||
"refsource" : "XF",
|
"refsource": "SECUNIA",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32056"
|
"url": "http://secunia.com/advisories/24025"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "33073",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/33073"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "24515",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/24515"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "24011",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/24011"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "22352",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/22352"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20070301-01-P",
|
||||||
|
"refsource": "SGI",
|
||||||
|
"url": "ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.wireshark.org/security/wnpa-sec-2007-01.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.wireshark.org/security/wnpa-sec-2007-01.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -58,9 +58,9 @@
|
|||||||
"url": "https://www.exploit-db.com/exploits/3392"
|
"url": "https://www.exploit-db.com/exploits/3392"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "22776",
|
"name": "divxwebplayer-npdivx32-dos(32759)",
|
||||||
"refsource" : "BID",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/bid/22776"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32759"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "35377",
|
"name": "35377",
|
||||||
@ -68,9 +68,9 @@
|
|||||||
"url": "http://osvdb.org/35377"
|
"url": "http://osvdb.org/35377"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "divxwebplayer-npdivx32-dos(32759)",
|
"name": "22776",
|
||||||
"refsource" : "XF",
|
"refsource": "BID",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32759"
|
"url": "http://www.securityfocus.com/bid/22776"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "24602",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/24602"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "23072",
|
"name": "23072",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -66,11 +71,6 @@
|
|||||||
"name": "34342",
|
"name": "34342",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/34342"
|
"url": "http://www.osvdb.org/34342"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "24602",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/24602"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,6 +57,11 @@
|
|||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "https://www.exploit-db.com/exploits/3543"
|
"url": "https://www.exploit-db.com/exploits/3543"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "portailphp-idnews-sql-injection(33145)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33145"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "23096",
|
"name": "23096",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -71,11 +76,6 @@
|
|||||||
"name": "24620",
|
"name": "24620",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/24620"
|
"url": "http://secunia.com/advisories/24620"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "portailphp-idnews-sql-injection(33145)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33145"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20070801 PHP-Nuke (ALL versions) Multiple XSS and HTML injection",
|
"name": "2974",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SREASON",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/475249/100/0/threaded"
|
"url": "http://securityreason.com/securityalert/2974"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "25171",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/25171"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "42538",
|
"name": "42538",
|
||||||
@ -68,9 +63,14 @@
|
|||||||
"url": "http://osvdb.org/42538"
|
"url": "http://osvdb.org/42538"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "2974",
|
"name": "25171",
|
||||||
"refsource" : "SREASON",
|
"refsource": "BID",
|
||||||
"url" : "http://securityreason.com/securityalert/2974"
|
"url": "http://www.securityfocus.com/bid/25171"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20070801 PHP-Nuke (ALL versions) Multiple XSS and HTML injection",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/475249/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,30 +52,20 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "4308",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/4308"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "6794",
|
"name": "6794",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "https://www.exploit-db.com/exploits/6794"
|
"url": "https://www.exploit-db.com/exploits/6794"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "31818",
|
"name": "4308",
|
||||||
"refsource" : "BID",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url" : "http://www.securityfocus.com/bid/31818"
|
"url": "https://www.exploit-db.com/exploits/4308"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2008-2858",
|
"name": "nicetalk-tagid-sql-injection(36224)",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "XF",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2008/2858"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36224"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "36587",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/36587"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "26576",
|
"name": "26576",
|
||||||
@ -83,9 +73,19 @@
|
|||||||
"url": "http://secunia.com/advisories/26576"
|
"url": "http://secunia.com/advisories/26576"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "nicetalk-tagid-sql-injection(36224)",
|
"name": "31818",
|
||||||
"refsource" : "XF",
|
"refsource": "BID",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36224"
|
"url": "http://www.securityfocus.com/bid/31818"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "36587",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/36587"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2008-2858",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2008/2858"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -58,24 +58,24 @@
|
|||||||
"url": "https://www.exploit-db.com/exploits/4517"
|
"url": "https://www.exploit-db.com/exploits/4517"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "26024",
|
"name": "ioncube-readfile-security-bypass(37227)",
|
||||||
"refsource" : "BID",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/bid/26024"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37227"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "41708",
|
"name": "41708",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/41708"
|
"url": "http://osvdb.org/41708"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "26024",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/26024"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "27178",
|
"name": "27178",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/27178"
|
"url": "http://secunia.com/advisories/27178"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ioncube-readfile-security-bypass(37227)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/37227"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,16 +57,6 @@
|
|||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "https://www.exploit-db.com/exploits/37395/"
|
"url": "https://www.exploit-db.com/exploits/37395/"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "20150623 XSS vulnerability in manage engine.",
|
|
||||||
"refsource" : "FULLDISC",
|
|
||||||
"url" : "http://seclists.org/fulldisclosure/2015/Jun/74"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://techtootech.blogspot.in/2015/06/found-xss-vulnerability-in-manage.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://techtootech.blogspot.in/2015/06/found-xss-vulnerability-in-manage.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://packetstormsecurity.com/files/132433/ManageEngine-Asset-Explorer-6.1-Cross-Site-Scripting.html",
|
"name": "http://packetstormsecurity.com/files/132433/ManageEngine-Asset-Explorer-6.1-Cross-Site-Scripting.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -76,6 +66,16 @@
|
|||||||
"name": "75389",
|
"name": "75389",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/75389"
|
"url": "http://www.securityfocus.com/bid/75389"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20150623 XSS vulnerability in manage engine.",
|
||||||
|
"refsource": "FULLDISC",
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2015/Jun/74"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://techtootech.blogspot.in/2015/06/found-xss-vulnerability-in-manage.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://techtootech.blogspot.in/2015/06/found-xss-vulnerability-in-manage.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@debian.org",
|
||||||
"ID": "CVE-2015-2312",
|
"ID": "CVE-2015-2312",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "https://github.com/capnproto/capnproto/commit/104870608fde3c698483fdef6b97f093fc15685d",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://github.com/capnproto/capnproto/commit/104870608fde3c698483fdef6b97f093fc15685d"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20150317 Re: CVE Request: Cap'n Proto: Several issues",
|
"name": "[oss-security] 20150317 Re: CVE Request: Cap'n Proto: Several issues",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
@ -66,11 +71,6 @@
|
|||||||
"name": "https://github.com/capnproto/capnproto/blob/master/security-advisories/2015-03-02-2-all-cpu-amplification.md",
|
"name": "https://github.com/capnproto/capnproto/blob/master/security-advisories/2015-03-02-2-all-cpu-amplification.md",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://github.com/capnproto/capnproto/blob/master/security-advisories/2015-03-02-2-all-cpu-amplification.md"
|
"url": "https://github.com/capnproto/capnproto/blob/master/security-advisories/2015-03-02-2-all-cpu-amplification.md"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://github.com/capnproto/capnproto/commit/104870608fde3c698483fdef6b97f093fc15685d",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://github.com/capnproto/capnproto/commit/104870608fde3c698483fdef6b97f093fc15685d"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
|
"name": "1032529",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://www.vmware.com/security/advisories/VMSA-2015-0004.html"
|
"url": "http://www.securitytracker.com/id/1032529"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "75092",
|
"name": "75092",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/75092"
|
"url": "http://www.securityfocus.com/bid/75092"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1032529",
|
"name": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securitytracker.com/id/1032529"
|
"url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1032530",
|
"name": "1032530",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2015-2855",
|
"ID": "CVE-2015-2855",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://bto.bluecoat.com/security-advisory/sa96",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bto.bluecoat.com/security-advisory/sa96"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "VU#498348",
|
"name": "VU#498348",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
"url": "http://www.kb.cert.org/vuls/id/498348"
|
"url": "http://www.kb.cert.org/vuls/id/498348"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bto.bluecoat.com/security-advisory/sa96",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bto.bluecoat.com/security-advisory/sa96"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "74921",
|
"name": "74921",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20150129 Re: CVEs for Drupal contributed modules - January 2015",
|
"name": "72630",
|
||||||
"refsource" : "MLIST",
|
"refsource": "BID",
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2015/01/29/6"
|
"url": "http://www.securityfocus.com/bid/72630"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://www.drupal.org/node/2403313",
|
"name": "https://www.drupal.org/node/2403313",
|
||||||
@ -68,9 +68,9 @@
|
|||||||
"url": "https://www.drupal.org/node/2402393"
|
"url": "https://www.drupal.org/node/2402393"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "72630",
|
"name": "[oss-security] 20150129 Re: CVEs for Drupal contributed modules - January 2015",
|
||||||
"refsource" : "BID",
|
"refsource": "MLIST",
|
||||||
"url" : "http://www.securityfocus.com/bid/72630"
|
"url": "http://www.openwall.com/lists/oss-security/2015/01/29/6"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2015-3734",
|
"ID": "CVE-2015-3734",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,45 +52,45 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/kb/HT205030",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/kb/HT205030"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/kb/HT205033",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/kb/HT205033"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://support.apple.com/HT205221",
|
"name": "https://support.apple.com/HT205221",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://support.apple.com/HT205221"
|
"url": "https://support.apple.com/HT205221"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "APPLE-SA-2015-08-13-1",
|
"name": "1033274",
|
||||||
"refsource" : "APPLE",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Aug/msg00000.html"
|
"url": "http://www.securitytracker.com/id/1033274"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "APPLE-SA-2015-08-13-3",
|
"name": "https://support.apple.com/kb/HT205030",
|
||||||
"refsource" : "APPLE",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html"
|
"url": "https://support.apple.com/kb/HT205030"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2015-09-16-3",
|
"name": "APPLE-SA-2015-09-16-3",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html"
|
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2015-08-13-3",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "76338",
|
"name": "76338",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/76338"
|
"url": "http://www.securityfocus.com/bid/76338"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1033274",
|
"name": "APPLE-SA-2015-08-13-1",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "APPLE",
|
||||||
"url" : "http://www.securitytracker.com/id/1033274"
|
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00000.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/kb/HT205033",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/kb/HT205033"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2015-6129",
|
"ID": "CVE-2015-6129",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2015-6235",
|
"ID": "CVE-2015-6235",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2015-6396",
|
"ID": "CVE-2015-6396",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "45986",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/45986/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20160803 Cisco RV110W, RV130W, and RV215W Routers Command Shell Injection Vulnerability",
|
"name": "20160803 Cisco RV110W, RV130W, and RV215W Routers Command Shell Injection Vulnerability",
|
||||||
"refsource": "CISCO",
|
"refsource": "CISCO",
|
||||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160803-rv110_130w1"
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160803-rv110_130w1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "45986",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/45986/"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "92269",
|
"name": "92269",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2015-6874",
|
"ID": "CVE-2015-6874",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -52,6 +52,21 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "https://www.synology.com/en-global/support/security/Video_Station_1_5_0757",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.synology.com/en-global/support/security/Video_Station_1_5_0757"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.securify.nl/advisory/SFY20150810/synology_video_station_command_injection_and_multiple_sql_injection_vulnerabilities.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://www.securify.nl/advisory/SFY20150810/synology_video_station_command_injection_and_multiple_sql_injection_vulnerabilities.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.synology.com/en-global/releaseNote/VideoStation?model=DS715",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.synology.com/en-global/releaseNote/VideoStation?model=DS715"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20150909 Synology Video Station command injection and multiple SQL injection vulnerabilities",
|
"name": "20150909 Synology Video Station command injection and multiple SQL injection vulnerabilities",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
@ -66,21 +81,6 @@
|
|||||||
"name": "http://packetstormsecurity.com/files/133519/Synology-Video-Station-1.5-0757-Command-Injection-SQL-Injection.html",
|
"name": "http://packetstormsecurity.com/files/133519/Synology-Video-Station-1.5-0757-Command-Injection-SQL-Injection.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://packetstormsecurity.com/files/133519/Synology-Video-Station-1.5-0757-Command-Injection-SQL-Injection.html"
|
"url": "http://packetstormsecurity.com/files/133519/Synology-Video-Station-1.5-0757-Command-Injection-SQL-Injection.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://www.securify.nl/advisory/SFY20150810/synology_video_station_command_injection_and_multiple_sql_injection_vulnerabilities.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://www.securify.nl/advisory/SFY20150810/synology_video_station_command_injection_and_multiple_sql_injection_vulnerabilities.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://www.synology.com/en-global/releaseNote/VideoStation?model=DS715",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.synology.com/en-global/releaseNote/VideoStation?model=DS715"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://www.synology.com/en-global/support/security/Video_Station_1_5_0757",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.synology.com/en-global/support/security/Video_Station_1_5_0757"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2015-7008",
|
"ID": "CVE-2015-7008",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://support.apple.com/HT205370",
|
"name": "APPLE-SA-2015-10-21-4",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "APPLE",
|
||||||
"url" : "https://support.apple.com/HT205370"
|
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT205375",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT205375"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2015-10-21-1",
|
"name": "APPLE-SA-2015-10-21-1",
|
||||||
@ -68,9 +63,14 @@
|
|||||||
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html"
|
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "APPLE-SA-2015-10-21-4",
|
"name": "https://support.apple.com/HT205375",
|
||||||
"refsource" : "APPLE",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html"
|
"url": "https://support.apple.com/HT205375"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT205370",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT205370"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "77263",
|
"name": "77263",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2015-7023",
|
"ID": "CVE-2015-7023",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://support.apple.com/HT205370",
|
"name": "APPLE-SA-2015-10-21-4",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "APPLE",
|
||||||
"url" : "https://support.apple.com/HT205370"
|
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT205375",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT205375"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2015-10-21-1",
|
"name": "APPLE-SA-2015-10-21-1",
|
||||||
@ -68,9 +63,14 @@
|
|||||||
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html"
|
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "APPLE-SA-2015-10-21-4",
|
"name": "https://support.apple.com/HT205375",
|
||||||
"refsource" : "APPLE",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html"
|
"url": "https://support.apple.com/HT205375"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT205370",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT205370"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "77263",
|
"name": "77263",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2015-7087",
|
"ID": "CVE-2015-7087",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT205638",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT205638"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2016-01-07-1",
|
"name": "APPLE-SA-2016-01-07-1",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "1034610",
|
"name": "1034610",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1034610"
|
"url": "http://www.securitytracker.com/id/1034610"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT205638",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT205638"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2015-7162",
|
"ID": "CVE-2015-7162",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2015-7513",
|
"ID": "CVE-2015-7513",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,40 +57,20 @@
|
|||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2016/01/07/2"
|
"url": "http://www.openwall.com/lists/oss-security/2016/01/07/2"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0185604c2d82c560dab2f2933a18f797e74ab5a8",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0185604c2d82c560dab2f2933a18f797e74ab5a8"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1284847",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1284847"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://github.com/torvalds/linux/commit/0185604c2d82c560dab2f2933a18f797e74ab5a8",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://github.com/torvalds/linux/commit/0185604c2d82c560dab2f2933a18f797e74ab5a8"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-3434",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2016/dsa-3434"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2016-26e19f042a",
|
"name": "FEDORA-2016-26e19f042a",
|
||||||
"refsource": "FEDORA",
|
"refsource": "FEDORA",
|
||||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175792.html"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175792.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "FEDORA-2016-5d43766e33",
|
"name": "USN-2887-2",
|
||||||
"refsource" : "FEDORA",
|
"refsource": "UBUNTU",
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html"
|
"url": "http://www.ubuntu.com/usn/USN-2887-2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "FEDORA-2016-b59fd603be",
|
"name": "https://github.com/torvalds/linux/commit/0185604c2d82c560dab2f2933a18f797e74ab5a8",
|
||||||
"refsource" : "FEDORA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176194.html"
|
"url": "https://github.com/torvalds/linux/commit/0185604c2d82c560dab2f2933a18f797e74ab5a8"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-2886-1",
|
"name": "USN-2886-1",
|
||||||
@ -103,49 +83,69 @@
|
|||||||
"url": "http://www.ubuntu.com/usn/USN-2887-1"
|
"url": "http://www.ubuntu.com/usn/USN-2887-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "USN-2887-2",
|
"name": "USN-2890-3",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2887-2"
|
"url": "http://www.ubuntu.com/usn/USN-2890-3"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "USN-2888-1",
|
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0185604c2d82c560dab2f2933a18f797e74ab5a8",
|
||||||
"refsource" : "UBUNTU",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2888-1"
|
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0185604c2d82c560dab2f2933a18f797e74ab5a8"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-2889-1",
|
"name": "USN-2889-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-2889-1"
|
"url": "http://www.ubuntu.com/usn/USN-2889-1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2016-b59fd603be",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176194.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-2889-2",
|
"name": "USN-2889-2",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-2889-2"
|
"url": "http://www.ubuntu.com/usn/USN-2889-2"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "USN-2890-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2890-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-2890-2",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2890-2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-2890-3",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2890-3"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "79901",
|
"name": "79901",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/79901"
|
"url": "http://www.securityfocus.com/bid/79901"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2016-5d43766e33",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-2890-2",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2890-2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1284847",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1284847"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-2890-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2890-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3434",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2016/dsa-3434"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1034602",
|
"name": "1034602",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1034602"
|
"url": "http://www.securitytracker.com/id/1034602"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-2888-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2888-1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2015-7829",
|
"ID": "CVE-2015-7829",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2016-0034",
|
"ID": "CVE-2016-0034",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "MS16-006",
|
|
||||||
"refsource" : "MS",
|
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-006"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1034655",
|
"name": "1034655",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1034655"
|
"url": "http://www.securitytracker.com/id/1034655"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MS16-006",
|
||||||
|
"refsource": "MS",
|
||||||
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-006"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2016-0092",
|
"ID": "CVE-2016-0092",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -62,15 +62,15 @@
|
|||||||
"refsource": "MS",
|
"refsource": "MS",
|
||||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-030"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-030"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "84125",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/84125"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1035208",
|
"name": "1035208",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1035208"
|
"url": "http://www.securitytracker.com/id/1035208"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "84125",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/84125"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2016-0500",
|
"ID": "CVE-2016-0500",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2016-0730",
|
"ID": "CVE-2016-0730",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@android.com",
|
||||||
"ID": "CVE-2016-0810",
|
"ID": "CVE-2016-0810",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://source.android.com/security/bulletin/2016-02-01.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://source.android.com/security/bulletin/2016-02-01.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://android.googlesource.com/platform%2Fframeworks%2Fav/+/19c47afbc402542720ddd280e1bbde3b2277b586",
|
"name": "https://android.googlesource.com/platform%2Fframeworks%2Fav/+/19c47afbc402542720ddd280e1bbde3b2277b586",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://android.googlesource.com/platform%2Fframeworks%2Fav/+/19c47afbc402542720ddd280e1bbde3b2277b586"
|
"url": "https://android.googlesource.com/platform%2Fframeworks%2Fav/+/19c47afbc402542720ddd280e1bbde3b2277b586"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://source.android.com/security/bulletin/2016-02-01.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://source.android.com/security/bulletin/2016-02-01.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@ubuntu.com",
|
||||||
"ID": "CVE-2016-1580",
|
"ID": "CVE-2016-1580",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2016-4217",
|
"ID": "CVE-2016-4217",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,25 +53,15 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html",
|
"name": "SUSE-SU-2016:1826",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SUSE",
|
||||||
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "GLSA-201607-03",
|
"name": "GLSA-201607-03",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "https://security.gentoo.org/glsa/201607-03"
|
"url": "https://security.gentoo.org/glsa/201607-03"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:1423",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2016:1423"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2016:1826",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2016:1802",
|
"name": "openSUSE-SU-2016:1802",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
@ -82,6 +72,16 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/91725"
|
"url": "http://www.securityfocus.com/bid/91725"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:1423",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2016:1423"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1036280",
|
"name": "1036280",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@debian.org",
|
||||||
"ID": "CVE-2016-4565",
|
"ID": "CVE-2016-4565",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,29 +53,14 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20160507 CVE Request: Linux: IB/security: Restrict use of the write() interface'",
|
"name": "SUSE-SU-2016:1690",
|
||||||
"refsource" : "MLIST",
|
"refsource": "SUSE",
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2016/05/07/1"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e6bd18f57aad1a2d1ef40e646d03ed0f2515c9e3",
|
"name": "USN-3006-1",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "UBUNTU",
|
||||||
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e6bd18f57aad1a2d1ef40e646d03ed0f2515c9e3"
|
"url": "http://www.ubuntu.com/usn/USN-3006-1"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.3",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.3"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1310570",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1310570"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://github.com/torvalds/linux/commit/e6bd18f57aad1a2d1ef40e646d03ed0f2515c9e3",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://github.com/torvalds/linux/commit/e6bd18f57aad1a2d1ef40e646d03ed0f2515c9e3"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
|
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
|
||||||
@ -83,124 +68,9 @@
|
|||||||
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
|
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
|
"name": "USN-3004-1",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "UBUNTU",
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
|
"url": "http://www.ubuntu.com/usn/USN-3004-1"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-3607",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2016/dsa-3607"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:1277",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2016:1277"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:1301",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2016:1301"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:1341",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2016:1341"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:1814",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1814.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:1489",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1489.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:1581",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1581.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:1617",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1617.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:1640",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1640.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:1657",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1657.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:1406",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2016:1406"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2016:1672",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2016:1690",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2016:1937",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2016:1641",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2016:1985",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2016:2000",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2016:2001",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2016:2002",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2016:2003",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2016:2006",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2016:2007",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2016:2010",
|
"name": "SUSE-SU-2016:2010",
|
||||||
@ -213,9 +83,24 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SUSE-SU-2016:1961",
|
"name": "USN-3001-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-3001-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2016:2003",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:1640",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-1640.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:1657",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-1657.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2016:1994",
|
"name": "SUSE-SU-2016:1994",
|
||||||
@ -223,69 +108,34 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SUSE-SU-2016:1995",
|
"name": "90301",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/90301"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:1406",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2016:1406"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:1341",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2016:1341"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2016:1961",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2016:2005",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2016:2009",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2016:2014",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2016:2105",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2016:2184",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-3018-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-3018-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-3018-2",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-3018-2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-3019-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-3019-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-3001-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-3001-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-3002-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-3002-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-3003-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-3003-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-3004-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-3004-1"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-3005-1",
|
"name": "USN-3005-1",
|
||||||
@ -293,19 +143,44 @@
|
|||||||
"url": "http://www.ubuntu.com/usn/USN-3005-1"
|
"url": "http://www.ubuntu.com/usn/USN-3005-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "USN-3006-1",
|
"name": "SUSE-SU-2016:2001",
|
||||||
"refsource" : "UBUNTU",
|
"refsource": "SUSE",
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-3006-1"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "USN-3007-1",
|
"name": "SUSE-SU-2016:1985",
|
||||||
"refsource" : "UBUNTU",
|
"refsource": "SUSE",
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-3007-1"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "USN-3021-1",
|
"name": "RHSA-2016:1301",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2016:1301"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e6bd18f57aad1a2d1ef40e646d03ed0f2515c9e3",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e6bd18f57aad1a2d1ef40e646d03ed0f2515c9e3"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:1814",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-1814.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2016:2184",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/torvalds/linux/commit/e6bd18f57aad1a2d1ef40e646d03ed0f2515c9e3",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://github.com/torvalds/linux/commit/e6bd18f57aad1a2d1ef40e646d03ed0f2515c9e3"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-3018-2",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-3021-1"
|
"url": "http://www.ubuntu.com/usn/USN-3018-2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-3021-2",
|
"name": "USN-3021-2",
|
||||||
@ -313,9 +188,134 @@
|
|||||||
"url": "http://www.ubuntu.com/usn/USN-3021-2"
|
"url": "http://www.ubuntu.com/usn/USN-3021-2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "90301",
|
"name": "SUSE-SU-2016:2006",
|
||||||
"refsource" : "BID",
|
"refsource": "SUSE",
|
||||||
"url" : "http://www.securityfocus.com/bid/90301"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2016:2014",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:1489",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-1489.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-3019-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-3019-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2016:1641",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.3",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.3"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3607",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2016/dsa-3607"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-3002-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-3002-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1310570",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310570"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2016:1672",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2016:2009",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-3021-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-3021-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-3018-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-3018-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:1617",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-1617.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2016:2005",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2016:2007",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-3007-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-3007-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2016:2000",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-3003-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-3003-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2016:1995",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2016:2105",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2016:2002",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:1581",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-1581.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:1277",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2016:1277"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20160507 CVE Request: Linux: IB/security: Restrict use of the write() interface'",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2016/05/07/1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2016:1937",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,29 +53,29 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://zerodayinitiative.com/advisories/ZDI-16-439/",
|
"name": "91824",
|
||||||
"refsource" : "MISC",
|
"refsource": "BID",
|
||||||
"url" : "http://zerodayinitiative.com/advisories/ZDI-16-439/"
|
"url": "http://www.securityfocus.com/bid/91824"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT206903",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT206903"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2016-07-18-1",
|
"name": "APPLE-SA-2016-07-18-1",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html"
|
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "91824",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/91824"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1036348",
|
"name": "1036348",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1036348"
|
"url": "http://www.securitytracker.com/id/1036348"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT206903",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT206903"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://zerodayinitiative.com/advisories/ZDI-16-439/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://zerodayinitiative.com/advisories/ZDI-16-439/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,15 +57,15 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://support.apple.com/HT207422"
|
"url": "https://support.apple.com/HT207422"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "94850",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/94850"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1037429",
|
"name": "1037429",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1037429"
|
"url": "http://www.securitytracker.com/id/1037429"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "94850",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/94850"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@mozilla.org",
|
||||||
"ID": "CVE-2016-5253",
|
"ID": "CVE-2016-5253",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -58,14 +58,9 @@
|
|||||||
"url": "http://www.mozilla.org/security/announce/2016/mfsa2016-69.html"
|
"url": "http://www.mozilla.org/security/announce/2016/mfsa2016-69.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1246944",
|
"name": "1036508",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1246944"
|
"url": "http://www.securitytracker.com/id/1036508"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201701-15",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201701-15"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "92260",
|
"name": "92260",
|
||||||
@ -73,9 +68,14 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/92260"
|
"url": "http://www.securityfocus.com/bid/92260"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1036508",
|
"name": "GLSA-201701-15",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "GENTOO",
|
||||||
"url" : "http://www.securitytracker.com/id/1036508"
|
"url": "https://security.gentoo.org/glsa/201701-15"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1246944",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1246944"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2016-5566",
|
"ID": "CVE-2016-5566",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "1037048",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1037048"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "93749",
|
"name": "93749",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/93749"
|
"url": "http://www.securityfocus.com/bid/93749"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1037048",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1037048"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -58,9 +58,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://launchpad.support.sap.com/#/notes/2727564",
|
"name": "106997",
|
||||||
"refsource" : "MISC",
|
"refsource": "BID",
|
||||||
"url" : "https://launchpad.support.sap.com/#/notes/2727564"
|
"url": "http://www.securityfocus.com/bid/106997"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943",
|
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943",
|
||||||
@ -68,9 +68,9 @@
|
|||||||
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943"
|
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "106997",
|
"name": "https://launchpad.support.sap.com/#/notes/2727564",
|
||||||
"refsource" : "BID",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.securityfocus.com/bid/106997"
|
"url": "https://launchpad.support.sap.com/#/notes/2727564"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://github.com/TeamSeri0us/pocs/tree/master/matio",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://github.com/TeamSeri0us/pocs/tree/master/matio"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://github.com/tbeu/matio/issues/103",
|
"name": "https://github.com/tbeu/matio/issues/103",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/tbeu/matio/issues/103"
|
"url": "https://github.com/tbeu/matio/issues/103"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/TeamSeri0us/pocs/tree/master/matio",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://github.com/TeamSeri0us/pocs/tree/master/matio"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user