"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 22:07:01 +00:00
parent 3b673b3dfd
commit 9a281a4522
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
66 changed files with 3900 additions and 3900 deletions

View File

@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "MS08-001",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-001"
},
{ {
"name": "20070108 Multiple (3) Microsoft Windows TCP/IP Remote Code Execution and DoS Vulnerabilities", "name": "20070108 Multiple (3) Microsoft Windows TCP/IP Remote Code Execution and DoS Vulnerabilities",
"refsource": "ISS", "refsource": "ISS",
"url": "http://www.iss.net/threats/282.html" "url": "http://www.iss.net/threats/282.html"
}, },
{
"name": "TA08-008A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-008A.html"
},
{
"name": "1019166",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1019166"
},
{ {
"name": "http://blogs.technet.com/swi/archive/2008/01/08/ms08-001-part-2-the-case-of-the-moderate-icmp-mitigations.aspx", "name": "http://blogs.technet.com/swi/archive/2008/01/08/ms08-001-part-2-the-case-of-the-moderate-icmp-mitigations.aspx",
"refsource": "MISC", "refsource": "MISC",
"url": "http://blogs.technet.com/swi/archive/2008/01/08/ms08-001-part-2-the-case-of-the-moderate-icmp-mitigations.aspx" "url": "http://blogs.technet.com/swi/archive/2008/01/08/ms08-001-part-2-the-case-of-the-moderate-icmp-mitigations.aspx"
}, },
{ {
"name" : "HPSBST02304", "name": "28297",
"refsource" : "HP", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/486317/100/0/threaded" "url": "http://secunia.com/advisories/28297"
},
{
"name" : "SSRT080003",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/486317/100/0/threaded"
},
{
"name" : "MS08-001",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-001"
},
{
"name" : "TA08-008A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-008A.html"
}, },
{ {
"name": "27139", "name": "27139",
@ -97,20 +97,20 @@
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5271" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5271"
}, },
{
"name" : "1019166",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1019166"
},
{
"name" : "28297",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28297"
},
{ {
"name": "win-tcpip-icmp-dos(39254)", "name": "win-tcpip-icmp-dos(39254)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39254" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39254"
},
{
"name": "SSRT080003",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/486317/100/0/threaded"
},
{
"name": "HPSBST02304",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/486317/100/0/threaded"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070112 Wordpress disclosure of Table Prefix Weakness",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/456731/100/0/threaded"
},
{ {
"name": "33458", "name": "33458",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/33458" "url": "http://osvdb.org/33458"
},
{
"name": "20070112 Wordpress disclosure of Table Prefix Weakness",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/456731/100/0/threaded"
} }
] ]
} }

View File

@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "3120", "name": "32820",
"refsource" : "EXPLOIT-DB", "refsource": "OSVDB",
"url" : "https://www.exploit-db.com/exploits/3120" "url": "http://osvdb.org/32820"
}, },
{ {
"name": "ADV-2007-0175", "name": "ADV-2007-0175",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0175" "url": "http://www.vupen.com/english/advisories/2007/0175"
}, },
{
"name" : "32820",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/32820"
},
{ {
"name": "23756", "name": "23756",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23756" "url": "http://secunia.com/advisories/23756"
},
{
"name": "3120",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3120"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-0456", "ID": "CVE-2007-0456",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,70 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.wireshark.org/security/wnpa-sec-2007-01.html",
"refsource" : "CONFIRM",
"url" : "http://www.wireshark.org/security/wnpa-sec-2007-01.html"
},
{
"name" : "https://issues.rpath.com/browse/RPL-985",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-985"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2007-166.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2007-166.htm"
},
{ {
"name": "FEDORA-2007-207", "name": "FEDORA-2007-207",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "http://fedoranews.org/cms/node/2565" "url": "http://fedoranews.org/cms/node/2565"
}, },
{
"name" : "MDKSA-2007:033",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:033"
},
{
"name" : "RHSA-2007:0066",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0066.html"
},
{
"name" : "20070301-01-P",
"refsource" : "SGI",
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc"
},
{
"name" : "22352",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22352"
},
{ {
"name": "oval:org.mitre.oval:def:11342", "name": "oval:org.mitre.oval:def:11342",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11342" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11342"
}, },
{ {
"name" : "oval:org.mitre.oval:def:14867", "name": "24970",
"refsource" : "OVAL", "refsource": "SECUNIA",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14867" "url": "http://secunia.com/advisories/24970"
},
{
"name" : "ADV-2007-0443",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0443"
},
{
"name" : "33073",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33073"
},
{
"name" : "1017581",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1017581"
}, },
{ {
"name": "24016", "name": "24016",
@ -123,14 +73,14 @@
"url": "http://secunia.com/advisories/24016" "url": "http://secunia.com/advisories/24016"
}, },
{ {
"name" : "24011", "name": "ADV-2007-0443",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/24011" "url": "http://www.vupen.com/english/advisories/2007/0443"
}, },
{ {
"name" : "24025", "name": "1017581",
"refsource" : "SECUNIA", "refsource": "SECTRACK",
"url" : "http://secunia.com/advisories/24025" "url": "http://securitytracker.com/id?1017581"
}, },
{ {
"name": "24084", "name": "24084",
@ -138,9 +88,29 @@
"url": "http://secunia.com/advisories/24084" "url": "http://secunia.com/advisories/24084"
}, },
{ {
"name" : "24515", "name": "wireshark-lltdissector-dos(32056)",
"refsource" : "SECUNIA", "refsource": "XF",
"url" : "http://secunia.com/advisories/24515" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32056"
},
{
"name": "MDKSA-2007:033",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:033"
},
{
"name": "oval:org.mitre.oval:def:14867",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14867"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-166.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-166.htm"
},
{
"name": "https://issues.rpath.com/browse/RPL-985",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-985"
}, },
{ {
"name": "24650", "name": "24650",
@ -148,14 +118,44 @@
"url": "http://secunia.com/advisories/24650" "url": "http://secunia.com/advisories/24650"
}, },
{ {
"name" : "24970", "name": "RHSA-2007:0066",
"refsource" : "SECUNIA", "refsource": "REDHAT",
"url" : "http://secunia.com/advisories/24970" "url": "http://www.redhat.com/support/errata/RHSA-2007-0066.html"
}, },
{ {
"name" : "wireshark-lltdissector-dos(32056)", "name": "24025",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32056" "url": "http://secunia.com/advisories/24025"
},
{
"name": "33073",
"refsource": "OSVDB",
"url": "http://osvdb.org/33073"
},
{
"name": "24515",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24515"
},
{
"name": "24011",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24011"
},
{
"name": "22352",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22352"
},
{
"name": "20070301-01-P",
"refsource": "SGI",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc"
},
{
"name": "http://www.wireshark.org/security/wnpa-sec-2007-01.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2007-01.html"
} }
] ]
} }

View File

@ -58,9 +58,9 @@
"url": "https://www.exploit-db.com/exploits/3392" "url": "https://www.exploit-db.com/exploits/3392"
}, },
{ {
"name" : "22776", "name": "divxwebplayer-npdivx32-dos(32759)",
"refsource" : "BID", "refsource": "XF",
"url" : "http://www.securityfocus.com/bid/22776" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32759"
}, },
{ {
"name": "35377", "name": "35377",
@ -68,9 +68,9 @@
"url": "http://osvdb.org/35377" "url": "http://osvdb.org/35377"
}, },
{ {
"name" : "divxwebplayer-npdivx32-dos(32759)", "name": "22776",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32759" "url": "http://www.securityfocus.com/bid/22776"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "24602",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24602"
},
{ {
"name": "23072", "name": "23072",
"refsource": "BID", "refsource": "BID",
@ -66,11 +71,6 @@
"name": "34342", "name": "34342",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/34342" "url": "http://www.osvdb.org/34342"
},
{
"name" : "24602",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24602"
} }
] ]
} }

View File

@ -57,6 +57,11 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3543" "url": "https://www.exploit-db.com/exploits/3543"
}, },
{
"name": "portailphp-idnews-sql-injection(33145)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33145"
},
{ {
"name": "23096", "name": "23096",
"refsource": "BID", "refsource": "BID",
@ -71,11 +76,6 @@
"name": "24620", "name": "24620",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24620" "url": "http://secunia.com/advisories/24620"
},
{
"name" : "portailphp-idnews-sql-injection(33145)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33145"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070801 PHP-Nuke (ALL versions) Multiple XSS and HTML injection", "name": "2974",
"refsource" : "BUGTRAQ", "refsource": "SREASON",
"url" : "http://www.securityfocus.com/archive/1/475249/100/0/threaded" "url": "http://securityreason.com/securityalert/2974"
},
{
"name" : "25171",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25171"
}, },
{ {
"name": "42538", "name": "42538",
@ -68,9 +63,14 @@
"url": "http://osvdb.org/42538" "url": "http://osvdb.org/42538"
}, },
{ {
"name" : "2974", "name": "25171",
"refsource" : "SREASON", "refsource": "BID",
"url" : "http://securityreason.com/securityalert/2974" "url": "http://www.securityfocus.com/bid/25171"
},
{
"name": "20070801 PHP-Nuke (ALL versions) Multiple XSS and HTML injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/475249/100/0/threaded"
} }
] ]
} }

View File

@ -52,30 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "4308",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4308"
},
{ {
"name": "6794", "name": "6794",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6794" "url": "https://www.exploit-db.com/exploits/6794"
}, },
{ {
"name" : "31818", "name": "4308",
"refsource" : "BID", "refsource": "EXPLOIT-DB",
"url" : "http://www.securityfocus.com/bid/31818" "url": "https://www.exploit-db.com/exploits/4308"
}, },
{ {
"name" : "ADV-2008-2858", "name": "nicetalk-tagid-sql-injection(36224)",
"refsource" : "VUPEN", "refsource": "XF",
"url" : "http://www.vupen.com/english/advisories/2008/2858" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36224"
},
{
"name" : "36587",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/36587"
}, },
{ {
"name": "26576", "name": "26576",
@ -83,9 +73,19 @@
"url": "http://secunia.com/advisories/26576" "url": "http://secunia.com/advisories/26576"
}, },
{ {
"name" : "nicetalk-tagid-sql-injection(36224)", "name": "31818",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36224" "url": "http://www.securityfocus.com/bid/31818"
},
{
"name": "36587",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/36587"
},
{
"name": "ADV-2008-2858",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2858"
} }
] ]
} }

View File

@ -58,24 +58,24 @@
"url": "https://www.exploit-db.com/exploits/4517" "url": "https://www.exploit-db.com/exploits/4517"
}, },
{ {
"name" : "26024", "name": "ioncube-readfile-security-bypass(37227)",
"refsource" : "BID", "refsource": "XF",
"url" : "http://www.securityfocus.com/bid/26024" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37227"
}, },
{ {
"name": "41708", "name": "41708",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/41708" "url": "http://osvdb.org/41708"
}, },
{
"name": "26024",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26024"
},
{ {
"name": "27178", "name": "27178",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27178" "url": "http://secunia.com/advisories/27178"
},
{
"name" : "ioncube-readfile-security-bypass(37227)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/37227"
} }
] ]
} }

View File

@ -57,16 +57,6 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/37395/" "url": "https://www.exploit-db.com/exploits/37395/"
}, },
{
"name" : "20150623 XSS vulnerability in manage engine.",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2015/Jun/74"
},
{
"name" : "http://techtootech.blogspot.in/2015/06/found-xss-vulnerability-in-manage.html",
"refsource" : "MISC",
"url" : "http://techtootech.blogspot.in/2015/06/found-xss-vulnerability-in-manage.html"
},
{ {
"name": "http://packetstormsecurity.com/files/132433/ManageEngine-Asset-Explorer-6.1-Cross-Site-Scripting.html", "name": "http://packetstormsecurity.com/files/132433/ManageEngine-Asset-Explorer-6.1-Cross-Site-Scripting.html",
"refsource": "MISC", "refsource": "MISC",
@ -76,6 +66,16 @@
"name": "75389", "name": "75389",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/75389" "url": "http://www.securityfocus.com/bid/75389"
},
{
"name": "20150623 XSS vulnerability in manage engine.",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Jun/74"
},
{
"name": "http://techtootech.blogspot.in/2015/06/found-xss-vulnerability-in-manage.html",
"refsource": "MISC",
"url": "http://techtootech.blogspot.in/2015/06/found-xss-vulnerability-in-manage.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@debian.org",
"ID": "CVE-2015-2312", "ID": "CVE-2015-2312",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://github.com/capnproto/capnproto/commit/104870608fde3c698483fdef6b97f093fc15685d",
"refsource": "CONFIRM",
"url": "https://github.com/capnproto/capnproto/commit/104870608fde3c698483fdef6b97f093fc15685d"
},
{ {
"name": "[oss-security] 20150317 Re: CVE Request: Cap'n Proto: Several issues", "name": "[oss-security] 20150317 Re: CVE Request: Cap'n Proto: Several issues",
"refsource": "MLIST", "refsource": "MLIST",
@ -66,11 +71,6 @@
"name": "https://github.com/capnproto/capnproto/blob/master/security-advisories/2015-03-02-2-all-cpu-amplification.md", "name": "https://github.com/capnproto/capnproto/blob/master/security-advisories/2015-03-02-2-all-cpu-amplification.md",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/capnproto/capnproto/blob/master/security-advisories/2015-03-02-2-all-cpu-amplification.md" "url": "https://github.com/capnproto/capnproto/blob/master/security-advisories/2015-03-02-2-all-cpu-amplification.md"
},
{
"name" : "https://github.com/capnproto/capnproto/commit/104870608fde3c698483fdef6b97f093fc15685d",
"refsource" : "CONFIRM",
"url" : "https://github.com/capnproto/capnproto/commit/104870608fde3c698483fdef6b97f093fc15685d"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.vmware.com/security/advisories/VMSA-2015-0004.html", "name": "1032529",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" "url": "http://www.securitytracker.com/id/1032529"
}, },
{ {
"name": "75092", "name": "75092",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/75092" "url": "http://www.securityfocus.com/bid/75092"
}, },
{ {
"name" : "1032529", "name": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1032529" "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html"
}, },
{ {
"name": "1032530", "name": "1032530",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2015-2855", "ID": "CVE-2015-2855",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://bto.bluecoat.com/security-advisory/sa96",
"refsource" : "CONFIRM",
"url" : "https://bto.bluecoat.com/security-advisory/sa96"
},
{ {
"name": "VU#498348", "name": "VU#498348",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/498348" "url": "http://www.kb.cert.org/vuls/id/498348"
}, },
{
"name": "https://bto.bluecoat.com/security-advisory/sa96",
"refsource": "CONFIRM",
"url": "https://bto.bluecoat.com/security-advisory/sa96"
},
{ {
"name": "74921", "name": "74921",
"refsource": "BID", "refsource": "BID",

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20150129 Re: CVEs for Drupal contributed modules - January 2015", "name": "72630",
"refsource" : "MLIST", "refsource": "BID",
"url" : "http://www.openwall.com/lists/oss-security/2015/01/29/6" "url": "http://www.securityfocus.com/bid/72630"
}, },
{ {
"name": "https://www.drupal.org/node/2403313", "name": "https://www.drupal.org/node/2403313",
@ -68,9 +68,9 @@
"url": "https://www.drupal.org/node/2402393" "url": "https://www.drupal.org/node/2402393"
}, },
{ {
"name" : "72630", "name": "[oss-security] 20150129 Re: CVEs for Drupal contributed modules - January 2015",
"refsource" : "BID", "refsource": "MLIST",
"url" : "http://www.securityfocus.com/bid/72630" "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-3734", "ID": "CVE-2015-3734",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,45 +52,45 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://support.apple.com/kb/HT205030",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/kb/HT205030"
},
{
"name" : "https://support.apple.com/kb/HT205033",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/kb/HT205033"
},
{ {
"name": "https://support.apple.com/HT205221", "name": "https://support.apple.com/HT205221",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://support.apple.com/HT205221" "url": "https://support.apple.com/HT205221"
}, },
{ {
"name" : "APPLE-SA-2015-08-13-1", "name": "1033274",
"refsource" : "APPLE", "refsource": "SECTRACK",
"url" : "http://lists.apple.com/archives/security-announce/2015/Aug/msg00000.html" "url": "http://www.securitytracker.com/id/1033274"
}, },
{ {
"name" : "APPLE-SA-2015-08-13-3", "name": "https://support.apple.com/kb/HT205030",
"refsource" : "APPLE", "refsource": "CONFIRM",
"url" : "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html" "url": "https://support.apple.com/kb/HT205030"
}, },
{ {
"name": "APPLE-SA-2015-09-16-3", "name": "APPLE-SA-2015-09-16-3",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html" "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html"
}, },
{
"name": "APPLE-SA-2015-08-13-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html"
},
{ {
"name": "76338", "name": "76338",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/76338" "url": "http://www.securityfocus.com/bid/76338"
}, },
{ {
"name" : "1033274", "name": "APPLE-SA-2015-08-13-1",
"refsource" : "SECTRACK", "refsource": "APPLE",
"url" : "http://www.securitytracker.com/id/1033274" "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00000.html"
},
{
"name": "https://support.apple.com/kb/HT205033",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT205033"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-6129", "ID": "CVE-2015-6129",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-6235", "ID": "CVE-2015-6235",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-6396", "ID": "CVE-2015-6396",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "45986",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/45986/"
},
{ {
"name": "20160803 Cisco RV110W, RV130W, and RV215W Routers Command Shell Injection Vulnerability", "name": "20160803 Cisco RV110W, RV130W, and RV215W Routers Command Shell Injection Vulnerability",
"refsource": "CISCO", "refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160803-rv110_130w1" "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160803-rv110_130w1"
}, },
{
"name": "45986",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/45986/"
},
{ {
"name": "92269", "name": "92269",
"refsource": "BID", "refsource": "BID",

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-6874", "ID": "CVE-2015-6874",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,6 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://www.synology.com/en-global/support/security/Video_Station_1_5_0757",
"refsource": "CONFIRM",
"url": "https://www.synology.com/en-global/support/security/Video_Station_1_5_0757"
},
{
"name": "https://www.securify.nl/advisory/SFY20150810/synology_video_station_command_injection_and_multiple_sql_injection_vulnerabilities.html",
"refsource": "MISC",
"url": "https://www.securify.nl/advisory/SFY20150810/synology_video_station_command_injection_and_multiple_sql_injection_vulnerabilities.html"
},
{
"name": "https://www.synology.com/en-global/releaseNote/VideoStation?model=DS715",
"refsource": "CONFIRM",
"url": "https://www.synology.com/en-global/releaseNote/VideoStation?model=DS715"
},
{ {
"name": "20150909 Synology Video Station command injection and multiple SQL injection vulnerabilities", "name": "20150909 Synology Video Station command injection and multiple SQL injection vulnerabilities",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -66,21 +81,6 @@
"name": "http://packetstormsecurity.com/files/133519/Synology-Video-Station-1.5-0757-Command-Injection-SQL-Injection.html", "name": "http://packetstormsecurity.com/files/133519/Synology-Video-Station-1.5-0757-Command-Injection-SQL-Injection.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/133519/Synology-Video-Station-1.5-0757-Command-Injection-SQL-Injection.html" "url": "http://packetstormsecurity.com/files/133519/Synology-Video-Station-1.5-0757-Command-Injection-SQL-Injection.html"
},
{
"name" : "https://www.securify.nl/advisory/SFY20150810/synology_video_station_command_injection_and_multiple_sql_injection_vulnerabilities.html",
"refsource" : "MISC",
"url" : "https://www.securify.nl/advisory/SFY20150810/synology_video_station_command_injection_and_multiple_sql_injection_vulnerabilities.html"
},
{
"name" : "https://www.synology.com/en-global/releaseNote/VideoStation?model=DS715",
"refsource" : "CONFIRM",
"url" : "https://www.synology.com/en-global/releaseNote/VideoStation?model=DS715"
},
{
"name" : "https://www.synology.com/en-global/support/security/Video_Station_1_5_0757",
"refsource" : "CONFIRM",
"url" : "https://www.synology.com/en-global/support/security/Video_Station_1_5_0757"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-7008", "ID": "CVE-2015-7008",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://support.apple.com/HT205370", "name": "APPLE-SA-2015-10-21-4",
"refsource" : "CONFIRM", "refsource": "APPLE",
"url" : "https://support.apple.com/HT205370" "url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html"
},
{
"name" : "https://support.apple.com/HT205375",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205375"
}, },
{ {
"name": "APPLE-SA-2015-10-21-1", "name": "APPLE-SA-2015-10-21-1",
@ -68,9 +63,14 @@
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html" "url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html"
}, },
{ {
"name" : "APPLE-SA-2015-10-21-4", "name": "https://support.apple.com/HT205375",
"refsource" : "APPLE", "refsource": "CONFIRM",
"url" : "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html" "url": "https://support.apple.com/HT205375"
},
{
"name": "https://support.apple.com/HT205370",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205370"
}, },
{ {
"name": "77263", "name": "77263",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-7023", "ID": "CVE-2015-7023",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://support.apple.com/HT205370", "name": "APPLE-SA-2015-10-21-4",
"refsource" : "CONFIRM", "refsource": "APPLE",
"url" : "https://support.apple.com/HT205370" "url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html"
},
{
"name" : "https://support.apple.com/HT205375",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205375"
}, },
{ {
"name": "APPLE-SA-2015-10-21-1", "name": "APPLE-SA-2015-10-21-1",
@ -68,9 +63,14 @@
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html" "url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html"
}, },
{ {
"name" : "APPLE-SA-2015-10-21-4", "name": "https://support.apple.com/HT205375",
"refsource" : "APPLE", "refsource": "CONFIRM",
"url" : "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html" "url": "https://support.apple.com/HT205375"
},
{
"name": "https://support.apple.com/HT205370",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205370"
}, },
{ {
"name": "77263", "name": "77263",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-7087", "ID": "CVE-2015-7087",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://support.apple.com/HT205638",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205638"
},
{ {
"name": "APPLE-SA-2016-01-07-1", "name": "APPLE-SA-2016-01-07-1",
"refsource": "APPLE", "refsource": "APPLE",
@ -66,6 +61,11 @@
"name": "1034610", "name": "1034610",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034610" "url": "http://www.securitytracker.com/id/1034610"
},
{
"name": "https://support.apple.com/HT205638",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205638"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-7162", "ID": "CVE-2015-7162",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-7513", "ID": "CVE-2015-7513",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,40 +57,20 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/01/07/2" "url": "http://www.openwall.com/lists/oss-security/2016/01/07/2"
}, },
{
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0185604c2d82c560dab2f2933a18f797e74ab5a8",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0185604c2d82c560dab2f2933a18f797e74ab5a8"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1284847",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1284847"
},
{
"name" : "https://github.com/torvalds/linux/commit/0185604c2d82c560dab2f2933a18f797e74ab5a8",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/0185604c2d82c560dab2f2933a18f797e74ab5a8"
},
{
"name" : "DSA-3434",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3434"
},
{ {
"name": "FEDORA-2016-26e19f042a", "name": "FEDORA-2016-26e19f042a",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175792.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175792.html"
}, },
{ {
"name" : "FEDORA-2016-5d43766e33", "name": "USN-2887-2",
"refsource" : "FEDORA", "refsource": "UBUNTU",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html" "url": "http://www.ubuntu.com/usn/USN-2887-2"
}, },
{ {
"name" : "FEDORA-2016-b59fd603be", "name": "https://github.com/torvalds/linux/commit/0185604c2d82c560dab2f2933a18f797e74ab5a8",
"refsource" : "FEDORA", "refsource": "CONFIRM",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176194.html" "url": "https://github.com/torvalds/linux/commit/0185604c2d82c560dab2f2933a18f797e74ab5a8"
}, },
{ {
"name": "USN-2886-1", "name": "USN-2886-1",
@ -103,49 +83,69 @@
"url": "http://www.ubuntu.com/usn/USN-2887-1" "url": "http://www.ubuntu.com/usn/USN-2887-1"
}, },
{ {
"name" : "USN-2887-2", "name": "USN-2890-3",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2887-2" "url": "http://www.ubuntu.com/usn/USN-2890-3"
}, },
{ {
"name" : "USN-2888-1", "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0185604c2d82c560dab2f2933a18f797e74ab5a8",
"refsource" : "UBUNTU", "refsource": "CONFIRM",
"url" : "http://www.ubuntu.com/usn/USN-2888-1" "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0185604c2d82c560dab2f2933a18f797e74ab5a8"
}, },
{ {
"name": "USN-2889-1", "name": "USN-2889-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2889-1" "url": "http://www.ubuntu.com/usn/USN-2889-1"
}, },
{
"name": "FEDORA-2016-b59fd603be",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176194.html"
},
{ {
"name": "USN-2889-2", "name": "USN-2889-2",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2889-2" "url": "http://www.ubuntu.com/usn/USN-2889-2"
}, },
{
"name" : "USN-2890-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2890-1"
},
{
"name" : "USN-2890-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2890-2"
},
{
"name" : "USN-2890-3",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2890-3"
},
{ {
"name": "79901", "name": "79901",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/79901" "url": "http://www.securityfocus.com/bid/79901"
}, },
{
"name": "FEDORA-2016-5d43766e33",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html"
},
{
"name": "USN-2890-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2890-2"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1284847",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1284847"
},
{
"name": "USN-2890-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2890-1"
},
{
"name": "DSA-3434",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3434"
},
{ {
"name": "1034602", "name": "1034602",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034602" "url": "http://www.securitytracker.com/id/1034602"
},
{
"name": "USN-2888-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2888-1"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-7829", "ID": "CVE-2015-7829",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-0034", "ID": "CVE-2016-0034",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS16-006",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-006"
},
{ {
"name": "1034655", "name": "1034655",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034655" "url": "http://www.securitytracker.com/id/1034655"
},
{
"name": "MS16-006",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-006"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-0092", "ID": "CVE-2016-0092",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -62,15 +62,15 @@
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-030" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-030"
}, },
{
"name" : "84125",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/84125"
},
{ {
"name": "1035208", "name": "1035208",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035208" "url": "http://www.securitytracker.com/id/1035208"
},
{
"name": "84125",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/84125"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0500", "ID": "CVE-2016-0500",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-0730", "ID": "CVE-2016-0730",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2016-0810", "ID": "CVE-2016-0810",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://source.android.com/security/bulletin/2016-02-01.html",
"refsource" : "CONFIRM",
"url" : "http://source.android.com/security/bulletin/2016-02-01.html"
},
{ {
"name": "https://android.googlesource.com/platform%2Fframeworks%2Fav/+/19c47afbc402542720ddd280e1bbde3b2277b586", "name": "https://android.googlesource.com/platform%2Fframeworks%2Fav/+/19c47afbc402542720ddd280e1bbde3b2277b586",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform%2Fframeworks%2Fav/+/19c47afbc402542720ddd280e1bbde3b2277b586" "url": "https://android.googlesource.com/platform%2Fframeworks%2Fav/+/19c47afbc402542720ddd280e1bbde3b2277b586"
},
{
"name": "http://source.android.com/security/bulletin/2016-02-01.html",
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-02-01.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@ubuntu.com",
"ID": "CVE-2016-1580", "ID": "CVE-2016-1580",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4217", "ID": "CVE-2016-4217",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,25 +53,15 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html", "name": "SUSE-SU-2016:1826",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html"
}, },
{ {
"name": "GLSA-201607-03", "name": "GLSA-201607-03",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201607-03" "url": "https://security.gentoo.org/glsa/201607-03"
}, },
{
"name" : "RHSA-2016:1423",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1423"
},
{
"name" : "SUSE-SU-2016:1826",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html"
},
{ {
"name": "openSUSE-SU-2016:1802", "name": "openSUSE-SU-2016:1802",
"refsource": "SUSE", "refsource": "SUSE",
@ -82,6 +72,16 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/91725" "url": "http://www.securityfocus.com/bid/91725"
}, },
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html"
},
{
"name": "RHSA-2016:1423",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1423"
},
{ {
"name": "1036280", "name": "1036280",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@debian.org",
"ID": "CVE-2016-4565", "ID": "CVE-2016-4565",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,29 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20160507 CVE Request: Linux: IB/security: Restrict use of the write() interface'", "name": "SUSE-SU-2016:1690",
"refsource" : "MLIST", "refsource": "SUSE",
"url" : "http://www.openwall.com/lists/oss-security/2016/05/07/1" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html"
}, },
{ {
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e6bd18f57aad1a2d1ef40e646d03ed0f2515c9e3", "name": "USN-3006-1",
"refsource" : "CONFIRM", "refsource": "UBUNTU",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e6bd18f57aad1a2d1ef40e646d03ed0f2515c9e3" "url": "http://www.ubuntu.com/usn/USN-3006-1"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.3",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.3"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1310570",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1310570"
},
{
"name" : "https://github.com/torvalds/linux/commit/e6bd18f57aad1a2d1ef40e646d03ed0f2515c9e3",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/e6bd18f57aad1a2d1ef40e646d03ed0f2515c9e3"
}, },
{ {
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
@ -83,124 +68,9 @@
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", "name": "USN-3004-1",
"refsource" : "CONFIRM", "refsource": "UBUNTU",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html" "url": "http://www.ubuntu.com/usn/USN-3004-1"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
},
{
"name" : "DSA-3607",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3607"
},
{
"name" : "RHSA-2016:1277",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1277"
},
{
"name" : "RHSA-2016:1301",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1301"
},
{
"name" : "RHSA-2016:1341",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1341"
},
{
"name" : "RHSA-2016:1814",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1814.html"
},
{
"name" : "RHSA-2016:1489",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1489.html"
},
{
"name" : "RHSA-2016:1581",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1581.html"
},
{
"name" : "RHSA-2016:1617",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1617.html"
},
{
"name" : "RHSA-2016:1640",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1640.html"
},
{
"name" : "RHSA-2016:1657",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1657.html"
},
{
"name" : "RHSA-2016:1406",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1406"
},
{
"name" : "SUSE-SU-2016:1672",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html"
},
{
"name" : "SUSE-SU-2016:1690",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html"
},
{
"name" : "SUSE-SU-2016:1937",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html"
},
{
"name" : "openSUSE-SU-2016:1641",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html"
},
{
"name" : "SUSE-SU-2016:1985",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html"
},
{
"name" : "SUSE-SU-2016:2000",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html"
},
{
"name" : "SUSE-SU-2016:2001",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html"
},
{
"name" : "SUSE-SU-2016:2002",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html"
},
{
"name" : "SUSE-SU-2016:2003",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.html"
},
{
"name" : "SUSE-SU-2016:2006",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html"
},
{
"name" : "SUSE-SU-2016:2007",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html"
}, },
{ {
"name": "SUSE-SU-2016:2010", "name": "SUSE-SU-2016:2010",
@ -213,9 +83,24 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.html"
}, },
{ {
"name" : "SUSE-SU-2016:1961", "name": "USN-3001-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3001-1"
},
{
"name": "SUSE-SU-2016:2003",
"refsource": "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.html"
},
{
"name": "RHSA-2016:1640",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1640.html"
},
{
"name": "RHSA-2016:1657",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1657.html"
}, },
{ {
"name": "SUSE-SU-2016:1994", "name": "SUSE-SU-2016:1994",
@ -223,69 +108,34 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html"
}, },
{ {
"name" : "SUSE-SU-2016:1995", "name": "90301",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/90301"
},
{
"name": "RHSA-2016:1406",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1406"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
},
{
"name": "RHSA-2016:1341",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1341"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
},
{
"name": "SUSE-SU-2016:1961",
"refsource": "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html"
},
{
"name" : "SUSE-SU-2016:2005",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html"
},
{
"name" : "SUSE-SU-2016:2009",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html"
},
{
"name" : "SUSE-SU-2016:2014",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html"
},
{
"name" : "SUSE-SU-2016:2105",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html"
},
{
"name" : "openSUSE-SU-2016:2184",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html"
},
{
"name" : "USN-3018-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3018-1"
},
{
"name" : "USN-3018-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3018-2"
},
{
"name" : "USN-3019-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3019-1"
},
{
"name" : "USN-3001-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3001-1"
},
{
"name" : "USN-3002-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3002-1"
},
{
"name" : "USN-3003-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3003-1"
},
{
"name" : "USN-3004-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3004-1"
}, },
{ {
"name": "USN-3005-1", "name": "USN-3005-1",
@ -293,19 +143,44 @@
"url": "http://www.ubuntu.com/usn/USN-3005-1" "url": "http://www.ubuntu.com/usn/USN-3005-1"
}, },
{ {
"name" : "USN-3006-1", "name": "SUSE-SU-2016:2001",
"refsource" : "UBUNTU", "refsource": "SUSE",
"url" : "http://www.ubuntu.com/usn/USN-3006-1" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html"
}, },
{ {
"name" : "USN-3007-1", "name": "SUSE-SU-2016:1985",
"refsource" : "UBUNTU", "refsource": "SUSE",
"url" : "http://www.ubuntu.com/usn/USN-3007-1" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html"
}, },
{ {
"name" : "USN-3021-1", "name": "RHSA-2016:1301",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1301"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e6bd18f57aad1a2d1ef40e646d03ed0f2515c9e3",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e6bd18f57aad1a2d1ef40e646d03ed0f2515c9e3"
},
{
"name": "RHSA-2016:1814",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1814.html"
},
{
"name": "openSUSE-SU-2016:2184",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html"
},
{
"name": "https://github.com/torvalds/linux/commit/e6bd18f57aad1a2d1ef40e646d03ed0f2515c9e3",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/e6bd18f57aad1a2d1ef40e646d03ed0f2515c9e3"
},
{
"name": "USN-3018-2",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3021-1" "url": "http://www.ubuntu.com/usn/USN-3018-2"
}, },
{ {
"name": "USN-3021-2", "name": "USN-3021-2",
@ -313,9 +188,134 @@
"url": "http://www.ubuntu.com/usn/USN-3021-2" "url": "http://www.ubuntu.com/usn/USN-3021-2"
}, },
{ {
"name" : "90301", "name": "SUSE-SU-2016:2006",
"refsource" : "BID", "refsource": "SUSE",
"url" : "http://www.securityfocus.com/bid/90301" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html"
},
{
"name": "SUSE-SU-2016:2014",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html"
},
{
"name": "RHSA-2016:1489",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1489.html"
},
{
"name": "USN-3019-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3019-1"
},
{
"name": "openSUSE-SU-2016:1641",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.3",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.3"
},
{
"name": "DSA-3607",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3607"
},
{
"name": "USN-3002-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3002-1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1310570",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310570"
},
{
"name": "SUSE-SU-2016:1672",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html"
},
{
"name": "SUSE-SU-2016:2009",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html"
},
{
"name": "USN-3021-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3021-1"
},
{
"name": "USN-3018-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3018-1"
},
{
"name": "RHSA-2016:1617",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1617.html"
},
{
"name": "SUSE-SU-2016:2005",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html"
},
{
"name": "SUSE-SU-2016:2007",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html"
},
{
"name": "USN-3007-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3007-1"
},
{
"name": "SUSE-SU-2016:2000",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html"
},
{
"name": "USN-3003-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3003-1"
},
{
"name": "SUSE-SU-2016:1995",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html"
},
{
"name": "SUSE-SU-2016:2105",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html"
},
{
"name": "SUSE-SU-2016:2002",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html"
},
{
"name": "RHSA-2016:1581",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1581.html"
},
{
"name": "RHSA-2016:1277",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1277"
},
{
"name": "[oss-security] 20160507 CVE Request: Linux: IB/security: Restrict use of the write() interface'",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/05/07/1"
},
{
"name": "SUSE-SU-2016:1937",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html"
} }
] ]
} }

View File

@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://zerodayinitiative.com/advisories/ZDI-16-439/", "name": "91824",
"refsource" : "MISC", "refsource": "BID",
"url" : "http://zerodayinitiative.com/advisories/ZDI-16-439/" "url": "http://www.securityfocus.com/bid/91824"
},
{
"name" : "https://support.apple.com/HT206903",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206903"
}, },
{ {
"name": "APPLE-SA-2016-07-18-1", "name": "APPLE-SA-2016-07-18-1",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html" "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html"
}, },
{
"name" : "91824",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/91824"
},
{ {
"name": "1036348", "name": "1036348",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036348" "url": "http://www.securitytracker.com/id/1036348"
},
{
"name": "https://support.apple.com/HT206903",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206903"
},
{
"name": "http://zerodayinitiative.com/advisories/ZDI-16-439/",
"refsource": "MISC",
"url": "http://zerodayinitiative.com/advisories/ZDI-16-439/"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://support.apple.com/HT207422" "url": "https://support.apple.com/HT207422"
}, },
{
"name" : "94850",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/94850"
},
{ {
"name": "1037429", "name": "1037429",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037429" "url": "http://www.securitytracker.com/id/1037429"
},
{
"name": "94850",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94850"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2016-5253", "ID": "CVE-2016-5253",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,14 +58,9 @@
"url": "http://www.mozilla.org/security/announce/2016/mfsa2016-69.html" "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-69.html"
}, },
{ {
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1246944", "name": "1036508",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1246944" "url": "http://www.securitytracker.com/id/1036508"
},
{
"name" : "GLSA-201701-15",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201701-15"
}, },
{ {
"name": "92260", "name": "92260",
@ -73,9 +68,14 @@
"url": "http://www.securityfocus.com/bid/92260" "url": "http://www.securityfocus.com/bid/92260"
}, },
{ {
"name" : "1036508", "name": "GLSA-201701-15",
"refsource" : "SECTRACK", "refsource": "GENTOO",
"url" : "http://www.securitytracker.com/id/1036508" "url": "https://security.gentoo.org/glsa/201701-15"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1246944",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1246944"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5566", "ID": "CVE-2016-5566",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1037048",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037048"
},
{ {
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "93749", "name": "93749",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/93749" "url": "http://www.securityfocus.com/bid/93749"
},
{
"name" : "1037048",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1037048"
} }
] ]
} }

View File

@ -58,9 +58,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://launchpad.support.sap.com/#/notes/2727564", "name": "106997",
"refsource" : "MISC", "refsource": "BID",
"url" : "https://launchpad.support.sap.com/#/notes/2727564" "url": "http://www.securityfocus.com/bid/106997"
}, },
{ {
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943", "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943",
@ -68,9 +68,9 @@
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943" "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943"
}, },
{ {
"name" : "106997", "name": "https://launchpad.support.sap.com/#/notes/2727564",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/106997" "url": "https://launchpad.support.sap.com/#/notes/2727564"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://github.com/TeamSeri0us/pocs/tree/master/matio",
"refsource" : "MISC",
"url" : "https://github.com/TeamSeri0us/pocs/tree/master/matio"
},
{ {
"name": "https://github.com/tbeu/matio/issues/103", "name": "https://github.com/tbeu/matio/issues/103",
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/tbeu/matio/issues/103" "url": "https://github.com/tbeu/matio/issues/103"
},
{
"name": "https://github.com/TeamSeri0us/pocs/tree/master/matio",
"refsource": "MISC",
"url": "https://github.com/TeamSeri0us/pocs/tree/master/matio"
} }
] ]
} }