"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 23:14:07 +00:00
parent 6419750129
commit 9ac8f361e7
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
62 changed files with 3859 additions and 3859 deletions

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.redhat.com/support/errata/archives/rh52-errata-general.html#squid",
"refsource" : "CONFIRM",
"url" : "http://www.redhat.com/support/errata/archives/rh52-errata-general.html#squid"
},
{
"name" : "DSA-576",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2004/dsa-576"
},
{ {
"name": "FEDORA-2005-373", "name": "FEDORA-2005-373",
"refsource": "FEDORA", "refsource": "FEDORA",
@ -72,11 +62,6 @@
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "http://fedoranews.org/updates/FEDORA--.shtml" "url": "http://fedoranews.org/updates/FEDORA--.shtml"
}, },
{
"name" : "RHSA-1999:025",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-1999-025.html"
},
{ {
"name": "RHSA-2005:489", "name": "RHSA-2005:489",
"refsource": "REDHAT", "refsource": "REDHAT",
@ -87,10 +72,25 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/2059" "url": "http://www.securityfocus.com/bid/2059"
}, },
{
"name": "DSA-576",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2004/dsa-576"
},
{
"name": "RHSA-1999:025",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-1999-025.html"
},
{ {
"name": "http-cgi-cachemgr(2385)", "name": "http-cgi-cachemgr(2385)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2385" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2385"
},
{
"name": "http://www.redhat.com/support/errata/archives/rh52-errata-general.html#squid",
"refsource": "CONFIRM",
"url": "http://www.redhat.com/support/errata/archives/rh52-errata-general.html#squid"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2007-0325", "ID": "CVE-2007-0325",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,30 +58,20 @@
"url": "http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034288" "url": "http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034288"
}, },
{ {
"name" : "http://www.trendmicro.com/ftp/documentation/readme/osce_70_win_en_securitypatch_1344_readme.txt", "name": "22585",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://www.trendmicro.com/ftp/documentation/readme/osce_70_win_en_securitypatch_1344_readme.txt" "url": "http://www.securityfocus.com/bid/22585"
}, },
{ {
"name": "VU#784369", "name": "VU#784369",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/784369" "url": "http://www.kb.cert.org/vuls/id/784369"
}, },
{
"name" : "22585",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22585"
},
{ {
"name": "ADV-2007-0638", "name": "ADV-2007-0638",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0638" "url": "http://www.vupen.com/english/advisories/2007/0638"
}, },
{
"name" : "33040",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33040"
},
{ {
"name": "1017664", "name": "1017664",
"refsource": "SECTRACK", "refsource": "SECTRACK",
@ -91,6 +81,16 @@
"name": "24193", "name": "24193",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24193" "url": "http://secunia.com/advisories/24193"
},
{
"name": "33040",
"refsource": "OSVDB",
"url": "http://osvdb.org/33040"
},
{
"name": "http://www.trendmicro.com/ftp/documentation/readme/osce_70_win_en_securitypatch_1344_readme.txt",
"refsource": "CONFIRM",
"url": "http://www.trendmicro.com/ftp/documentation/readme/osce_70_win_en_securitypatch_1344_readme.txt"
} }
] ]
} }

View File

@ -62,25 +62,25 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://sourceforge.net/forum/forum.php?forum_id=655260" "url": "http://sourceforge.net/forum/forum.php?forum_id=655260"
}, },
{
"name" : "22256",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22256"
},
{ {
"name": "ADV-2007-0347", "name": "ADV-2007-0347",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0347" "url": "http://www.vupen.com/english/advisories/2007/0347"
}, },
{ {
"name" : "36811", "name": "22256",
"refsource" : "OSVDB", "refsource": "BID",
"url" : "http://osvdb.org/36811" "url": "http://www.securityfocus.com/bid/22256"
}, },
{ {
"name": "onnac-error-xss(31795)", "name": "onnac-error-xss(31795)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31795" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31795"
},
{
"name": "36811",
"refsource": "OSVDB",
"url": "http://osvdb.org/36811"
} }
] ]
} }

View File

@ -52,11 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "2356",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2356"
},
{
"name": "tyger-login-register-xss(32792)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32792"
},
{ {
"name": "20070303 Tyger Bug Tracking System Multiple Vulnerability", "name": "20070303 Tyger Bug Tracking System Multiple Vulnerability",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/461801/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/461801/100/0/threaded"
}, },
{
"name": "24385",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24385"
},
{ {
"name": "22799", "name": "22799",
"refsource": "BID", "refsource": "BID",
@ -66,21 +81,6 @@
"name": "ADV-2007-0822", "name": "ADV-2007-0822",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0822" "url": "http://www.vupen.com/english/advisories/2007/0822"
},
{
"name" : "24385",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24385"
},
{
"name" : "2356",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2356"
},
{
"name" : "tyger-login-register-xss(32792)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32792"
} }
] ]
} }

View File

@ -53,15 +53,25 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070306 silc-server 1.0.2 denial-of-service vulnerability", "name": "24426",
"refsource" : "FULLDISC", "refsource": "SECUNIA",
"url" : "http://marc.info/?l=full-disclosure&m=117320823618036&w=2" "url": "http://secunia.com/advisories/24426"
}, },
{ {
"name": "GLSA-200703-12", "name": "GLSA-200703-12",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200703-12.xml" "url": "http://security.gentoo.org/glsa/glsa-200703-12.xml"
}, },
{
"name": "24431",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24431"
},
{
"name": "silc-command-dos(32846)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32846"
},
{ {
"name": "22846", "name": "22846",
"refsource": "BID", "refsource": "BID",
@ -73,19 +83,9 @@
"url": "http://osvdb.org/33887" "url": "http://osvdb.org/33887"
}, },
{ {
"name" : "24431", "name": "20070306 silc-server 1.0.2 denial-of-service vulnerability",
"refsource" : "SECUNIA", "refsource": "FULLDISC",
"url" : "http://secunia.com/advisories/24431" "url": "http://marc.info/?l=full-disclosure&m=117320823618036&w=2"
},
{
"name" : "24426",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24426"
},
{
"name" : "silc-command-dos(32846)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32846"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-1861", "ID": "CVE-2007-1861",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,90 +52,55 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070615 rPSA-2007-0124-1 kernel xen",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/471457"
},
{
"name" : "20070508 FLEA-2007-0016-1: kernel",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/467939/30/6690/threaded"
},
{
"name" : "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.8",
"refsource" : "CONFIRM",
"url" : "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.8"
},
{ {
"name": "https://issues.rpath.com/browse/RPL-1309", "name": "https://issues.rpath.com/browse/RPL-1309",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1309" "url": "https://issues.rpath.com/browse/RPL-1309"
}, },
{
"name" : "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=237913",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=237913"
},
{
"name" : "DSA-1289",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1289"
},
{
"name" : "MDKSA-2007:171",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:171"
},
{ {
"name": "RHSA-2007:0347", "name": "RHSA-2007:0347",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0347.html" "url": "http://www.redhat.com/support/errata/RHSA-2007-0347.html"
}, },
{
"name": "20070508 FLEA-2007-0016-1: kernel",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/467939/30/6690/threaded"
},
{ {
"name": "SUSE-SA:2007:043", "name": "SUSE-SA:2007:043",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_43_kernel.html" "url": "http://www.novell.com/linux/security/advisories/2007_43_kernel.html"
}, },
{
"name" : "USN-486-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-486-1"
},
{
"name" : "USN-489-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-489-1"
},
{
"name" : "23677",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23677"
},
{
"name" : "oval:org.mitre.oval:def:11616",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11616"
},
{
"name" : "ADV-2007-1595",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1595"
},
{ {
"name": "25030", "name": "25030",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25030" "url": "http://secunia.com/advisories/25030"
}, },
{ {
"name" : "25083", "name": "23677",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/25083" "url": "http://www.securityfocus.com/bid/23677"
}, },
{ {
"name" : "25228", "name": "MDKSA-2007:171",
"refsource" : "SECUNIA", "refsource": "MANDRIVA",
"url" : "http://secunia.com/advisories/25228" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:171"
},
{
"name": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.8",
"refsource": "CONFIRM",
"url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.8"
},
{
"name": "kernel-netlinkfiblookup-dos(34014)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34014"
},
{
"name": "DSA-1289",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1289"
}, },
{ {
"name": "25288", "name": "25288",
@ -143,24 +108,9 @@
"url": "http://secunia.com/advisories/25288" "url": "http://secunia.com/advisories/25288"
}, },
{ {
"name" : "25691", "name": "25083",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/25691" "url": "http://secunia.com/advisories/25083"
},
{
"name" : "25961",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25961"
},
{
"name" : "26133",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26133"
},
{
"name" : "26139",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26139"
}, },
{ {
"name": "26620", "name": "26620",
@ -168,9 +118,59 @@
"url": "http://secunia.com/advisories/26620" "url": "http://secunia.com/advisories/26620"
}, },
{ {
"name" : "kernel-netlinkfiblookup-dos(34014)", "name": "ADV-2007-1595",
"refsource" : "XF", "refsource": "VUPEN",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34014" "url": "http://www.vupen.com/english/advisories/2007/1595"
},
{
"name": "USN-489-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-489-1"
},
{
"name": "25228",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25228"
},
{
"name": "20070615 rPSA-2007-0124-1 kernel xen",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/471457"
},
{
"name": "25961",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25961"
},
{
"name": "oval:org.mitre.oval:def:11616",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11616"
},
{
"name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=237913",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=237913"
},
{
"name": "USN-486-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-486-1"
},
{
"name": "25691",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25691"
},
{
"name": "26139",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26139"
},
{
"name": "26133",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26133"
} }
] ]
} }

View File

@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "jspwiki-version-information-disclosure(36768)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36768"
},
{ {
"name": "20070925 JSPWiki Multiple Vulnerabilities", "name": "20070925 JSPWiki Multiple Vulnerabilities",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/480570/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/480570/100/0/threaded"
}, },
{
"name" : "20070924 JSPWiki Multiple Input Validation Vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/066096.html"
},
{ {
"name": "http://www.ecyrd.com/~jalkanen/JSPWiki/2.4.104/ChangeLog", "name": "http://www.ecyrd.com/~jalkanen/JSPWiki/2.4.104/ChangeLog",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.ecyrd.com/~jalkanen/JSPWiki/2.4.104/ChangeLog" "url": "http://www.ecyrd.com/~jalkanen/JSPWiki/2.4.104/ChangeLog"
}, },
{
"name" : "26961",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26961"
},
{ {
"name": "3167", "name": "3167",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3167" "url": "http://securityreason.com/securityalert/3167"
}, },
{ {
"name" : "jspwiki-version-information-disclosure(36768)", "name": "20070924 JSPWiki Multiple Input Validation Vulnerabilities",
"refsource" : "XF", "refsource": "FULLDISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36768" "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/066096.html"
},
{
"name": "26961",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26961"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "peakflowsp-unspecified-xss(36926)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36926"
},
{ {
"name": "25910", "name": "25910",
"refsource": "BID", "refsource": "BID",
@ -61,11 +66,6 @@
"name": "27003", "name": "27003",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27003" "url": "http://secunia.com/advisories/27003"
},
{
"name" : "peakflowsp-unspecified-xss(36926)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36926"
} }
] ]
} }

View File

@ -52,15 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "SSRT071298",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01205079"
},
{ {
"name": "20071031 ZDI-07-060: HP OpenView Radia Integration Server File System Exposure Vulnerability", "name": "20071031 ZDI-07-060: HP OpenView Radia Integration Server File System Exposure Vulnerability",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/483106/100/100/threaded" "url": "http://www.securityfocus.com/archive/1/483106/100/100/threaded"
}, },
{ {
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-07-060.html", "name": "39528",
"refsource" : "MISC", "refsource": "OSVDB",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-07-060.html" "url": "http://osvdb.org/39528"
},
{
"name": "hpopenview-cm-ccm-unauthorized-access(37400)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37400"
}, },
{ {
"name": "HPSBMA02279", "name": "HPSBMA02279",
@ -68,19 +78,9 @@
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01205079" "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01205079"
}, },
{ {
"name" : "SSRT071298", "name": "http://www.zerodayinitiative.com/advisories/ZDI-07-060.html",
"refsource" : "HP", "refsource": "MISC",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01205079" "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-060.html"
},
{
"name" : "ADV-2007-3620",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3620"
},
{
"name" : "39528",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/39528"
}, },
{ {
"name": "1018858", "name": "1018858",
@ -93,9 +93,9 @@
"url": "http://secunia.com/advisories/27341" "url": "http://secunia.com/advisories/27341"
}, },
{ {
"name" : "hpopenview-cm-ccm-unauthorized-access(37400)", "name": "ADV-2007-3620",
"refsource" : "XF", "refsource": "VUPEN",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/37400" "url": "http://www.vupen.com/english/advisories/2007/3620"
} }
] ]
} }

View File

@ -52,6 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "26180",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26180"
},
{
"name": "41870",
"refsource": "OSVDB",
"url": "http://osvdb.org/41870"
},
{
"name": "GLSA-200711-13",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200711-13.xml"
},
{ {
"name": "20071023 3proxy 0.5.3j released (bugfix)", "name": "20071023 3proxy 0.5.3j released (bugfix)",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -73,19 +88,9 @@
"url": "http://bugs.gentoo.org/show_bug.cgi?id=196772" "url": "http://bugs.gentoo.org/show_bug.cgi?id=196772"
}, },
{ {
"name" : "GLSA-200711-13", "name": "3proxy-ftpprchild-dos(37401)",
"refsource" : "GENTOO", "refsource": "XF",
"url" : "http://security.gentoo.org/glsa/glsa-200711-13.xml" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37401"
},
{
"name" : "26180",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26180"
},
{
"name" : "41870",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/41870"
}, },
{ {
"name": "27353", "name": "27353",
@ -96,11 +101,6 @@
"name": "27607", "name": "27607",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27607" "url": "http://secunia.com/advisories/27607"
},
{
"name" : "3proxy-ftpprchild-dos(37401)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/37401"
} }
] ]
} }

View File

@ -52,26 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20071112 AutoIndex <= 2.2.2 Cross Site Scripting and Denial of Service",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/483592/100/0/threaded"
},
{
"name" : "http://autoindex.sourceforge.net/change_log.html",
"refsource" : "CONFIRM",
"url" : "http://autoindex.sourceforge.net/change_log.html"
},
{ {
"name": "26410", "name": "26410",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/26410" "url": "http://www.securityfocus.com/bid/26410"
}, },
{
"name": "20071112 AutoIndex <= 2.2.2 Cross Site Scripting and Denial of Service",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/483592/100/0/threaded"
},
{ {
"name": "45282", "name": "45282",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/45282" "url": "http://osvdb.org/45282"
}, },
{
"name": "http://autoindex.sourceforge.net/change_log.html",
"refsource": "CONFIRM",
"url": "http://autoindex.sourceforge.net/change_log.html"
},
{ {
"name": "3360", "name": "3360",
"refsource": "SREASON", "refsource": "SREASON",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-3146", "ID": "CVE-2015-3146",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,39 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://git.libssh.org/projects/libssh.git/commit/?h=libssh-0.6.5&id=94f6955fbaee6fda9385a23e505497efe21f5b4f", "name": "USN-2912-1",
"refsource" : "CONFIRM", "refsource": "UBUNTU",
"url" : "https://git.libssh.org/projects/libssh.git/commit/?h=libssh-0.6.5&id=94f6955fbaee6fda9385a23e505497efe21f5b4f" "url": "http://www.ubuntu.com/usn/USN-2912-1"
},
{
"name" : "https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release/",
"refsource" : "CONFIRM",
"url" : "https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release/"
},
{
"name" : "https://www.libssh.org/security/advisories/CVE-2015-3146.txt",
"refsource" : "CONFIRM",
"url" : "https://www.libssh.org/security/advisories/CVE-2015-3146.txt"
},
{
"name" : "DSA-3488",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3488"
}, },
{ {
"name": "FEDORA-2015-10962", "name": "FEDORA-2015-10962",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161802.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161802.html"
}, },
{
"name": "https://www.libssh.org/security/advisories/CVE-2015-3146.txt",
"refsource": "CONFIRM",
"url": "https://www.libssh.org/security/advisories/CVE-2015-3146.txt"
},
{ {
"name": "FEDORA-2015-7590", "name": "FEDORA-2015-7590",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158013.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158013.html"
}, },
{ {
"name" : "USN-2912-1", "name": "https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release/",
"refsource" : "UBUNTU", "refsource": "CONFIRM",
"url" : "http://www.ubuntu.com/usn/USN-2912-1" "url": "https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release/"
},
{
"name": "DSA-3488",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3488"
},
{
"name": "https://git.libssh.org/projects/libssh.git/commit/?h=libssh-0.6.5&id=94f6955fbaee6fda9385a23e505497efe21f5b4f",
"refsource": "CONFIRM",
"url": "https://git.libssh.org/projects/libssh.git/commit/?h=libssh-0.6.5&id=94f6955fbaee6fda9385a23e505497efe21f5b4f"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-3703", "ID": "CVE-2015-3703",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "75491",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/75491"
},
{ {
"name": "http://support.apple.com/kb/HT204941", "name": "http://support.apple.com/kb/HT204941",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT204941" "url": "http://support.apple.com/kb/HT204941"
}, },
{
"name": "APPLE-SA-2015-06-30-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html"
},
{
"name": "1032760",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032760"
},
{ {
"name": "http://support.apple.com/kb/HT204942", "name": "http://support.apple.com/kb/HT204942",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,21 +81,6 @@
"name": "APPLE-SA-2015-06-30-1", "name": "APPLE-SA-2015-06-30-1",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html" "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html"
},
{
"name" : "APPLE-SA-2015-06-30-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html"
},
{
"name" : "75491",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/75491"
},
{
"name" : "1032760",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1032760"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-4230", "ID": "CVE-2015-4230",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1032747",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032747"
},
{ {
"name": "20150629 Cisco Headend System Releases Denial of Service Vulnerability", "name": "20150629 Cisco Headend System Releases Denial of Service Vulnerability",
"refsource": "CISCO", "refsource": "CISCO",
@ -61,11 +66,6 @@
"name": "75464", "name": "75464",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/75464" "url": "http://www.securityfocus.com/bid/75464"
},
{
"name" : "1032747",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1032747"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-7161", "ID": "CVE-2015-7161",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,34 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "38196", "name": "http://packetstormsecurity.com/files/133539/CMS-Bolt-2.2.4-File-Upload.html",
"refsource" : "EXPLOIT-DB", "refsource": "MISC",
"url" : "https://www.exploit-db.com/exploits/38196/" "url": "http://packetstormsecurity.com/files/133539/CMS-Bolt-2.2.4-File-Upload.html"
}, },
{ {
"name": "20150818 Bolt 2.2.4 - Code Execution", "name": "20150818 Bolt 2.2.4 - Code Execution",
"refsource": "FULLDISC", "refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Aug/66" "url": "http://seclists.org/fulldisclosure/2015/Aug/66"
}, },
{
"name": "38196",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/38196/"
},
{ {
"name": "http://blog.curesec.com/article/blog/Bolt-224-Code-Execution-44.html", "name": "http://blog.curesec.com/article/blog/Bolt-224-Code-Execution-44.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://blog.curesec.com/article/blog/Bolt-224-Code-Execution-44.html" "url": "http://blog.curesec.com/article/blog/Bolt-224-Code-Execution-44.html"
}, },
{ {
"name" : "http://packetstormsecurity.com/files/133539/CMS-Bolt-2.2.4-File-Upload.html", "name": "https://bolt.cm/newsitem/bolt-2-2-5-released",
"refsource" : "MISC", "refsource": "CONFIRM",
"url" : "http://packetstormsecurity.com/files/133539/CMS-Bolt-2.2.4-File-Upload.html" "url": "https://bolt.cm/newsitem/bolt-2-2-5-released"
}, },
{ {
"name": "http://www.rapid7.com/db/modules/exploit/multi/http/bolt_file_upload", "name": "http://www.rapid7.com/db/modules/exploit/multi/http/bolt_file_upload",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.rapid7.com/db/modules/exploit/multi/http/bolt_file_upload" "url": "http://www.rapid7.com/db/modules/exploit/multi/http/bolt_file_upload"
},
{
"name" : "https://bolt.cm/newsitem/bolt-2-2-5-released",
"refsource" : "CONFIRM",
"url" : "https://bolt.cm/newsitem/bolt-2-2-5-released"
} }
] ]
} }

View File

@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://support.apple.com/HT205267", "name": "1033703",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://support.apple.com/HT205267" "url": "http://www.securitytracker.com/id/1033703"
}, },
{ {
"name": "APPLE-SA-2015-09-30-3", "name": "APPLE-SA-2015-09-30-3",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html"
}, },
{
"name": "https://support.apple.com/HT205267",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205267"
},
{ {
"name": "76908", "name": "76908",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/76908" "url": "http://www.securityfocus.com/bid/76908"
},
{
"name" : "1033703",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1033703"
} }
] ]
} }

View File

@ -52,250 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20151112 CVE request: libpng buffer overflow in png_set_PLTE",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/11/12/2"
},
{
"name" : "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=560291",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=560291"
},
{
"name" : "https://support.apple.com/HT206167",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206167"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10148",
"refsource" : "CONFIRM",
"url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10148"
},
{ {
"name": "APPLE-SA-2016-03-21-5", "name": "APPLE-SA-2016-03-21-5",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html" "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html"
}, },
{
"name" : "DSA-3399",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3399"
},
{
"name" : "DSA-3507",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3507"
},
{
"name" : "FEDORA-2015-233750b6ab",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174936.html"
},
{
"name" : "FEDORA-2015-4ad4998d00",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175073.html"
},
{
"name" : "FEDORA-2015-c80ec85542",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174905.html"
},
{
"name" : "FEDORA-2016-43735c33a7",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177382.html"
},
{
"name" : "FEDORA-2016-9a1c707b10",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177344.html"
},
{
"name" : "FEDORA-2015-13668fff74",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172769.html"
},
{
"name" : "FEDORA-2015-1d87313b7c",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172620.html"
},
{
"name" : "FEDORA-2015-501493d853",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172663.html"
},
{
"name" : "FEDORA-2015-8a1243db75",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172823.html"
},
{
"name" : "FEDORA-2015-97fc1797fa",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172797.html"
},
{
"name" : "FEDORA-2015-ec2ddd15d7",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172647.html"
},
{
"name" : "FEDORA-2015-5e52306c9c",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172324.html"
},
{
"name" : "GLSA-201603-09",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201603-09"
},
{
"name" : "GLSA-201611-08",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201611-08"
},
{
"name" : "RHSA-2015:2594",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2594.html"
},
{
"name" : "RHSA-2015:2595",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2595.html"
},
{
"name" : "RHSA-2015:2596",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2596.html"
},
{
"name" : "RHSA-2016:1430",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1430"
},
{
"name" : "RHSA-2016:0055",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0055.html"
},
{
"name" : "RHSA-2016:0056",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0056.html"
},
{
"name" : "RHSA-2016:0057",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0057.html"
},
{
"name" : "SUSE-SU-2016:0665",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html"
},
{ {
"name": "openSUSE-SU-2016:0664", "name": "openSUSE-SU-2016:0664",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html"
}, },
{
"name" : "openSUSE-SU-2016:0684",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html"
},
{
"name" : "openSUSE-SU-2016:0729",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html"
},
{ {
"name": "openSUSE-SU-2016:0103", "name": "openSUSE-SU-2016:0103",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00028.html" "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00028.html"
}, },
{ {
"name" : "openSUSE-SU-2016:0104", "name": "openSUSE-SU-2016:0684",
"refsource": "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-01/msg00029.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html"
}, },
{ {
"name" : "openSUSE-SU-2016:0105", "name": "https://support.apple.com/HT206167",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-01/msg00030.html" "url": "https://support.apple.com/HT206167"
},
{
"name" : "SUSE-SU-2016:0256",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html"
},
{
"name" : "SUSE-SU-2016:0265",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"
},
{
"name" : "SUSE-SU-2016:0269",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"
},
{
"name" : "openSUSE-SU-2016:0263",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html"
},
{
"name" : "openSUSE-SU-2016:0268",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"
},
{
"name" : "openSUSE-SU-2016:0270",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
},
{
"name" : "openSUSE-SU-2016:0272",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html"
},
{
"name" : "openSUSE-SU-2016:0279",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"
},
{
"name" : "openSUSE-SU-2015:2099",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00033.html"
},
{
"name" : "openSUSE-SU-2015:2100",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00034.html"
}, },
{ {
"name": "openSUSE-SU-2015:2135", "name": "openSUSE-SU-2015:2135",
@ -307,30 +87,250 @@
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00160.html" "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00160.html"
}, },
{
"name": "77568",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/77568"
},
{
"name": "openSUSE-SU-2016:0272",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html"
},
{
"name": "FEDORA-2015-5e52306c9c",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172324.html"
},
{
"name": "FEDORA-2015-ec2ddd15d7",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172647.html"
},
{
"name": "GLSA-201611-08",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201611-08"
},
{
"name": "openSUSE-SU-2016:0279",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"
},
{
"name": "DSA-3507",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3507"
},
{
"name": "FEDORA-2015-501493d853",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172663.html"
},
{
"name": "1034142",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034142"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
},
{
"name": "RHSA-2016:1430",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1430"
},
{
"name": "FEDORA-2015-1d87313b7c",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172620.html"
},
{
"name": "DSA-3399",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3399"
},
{
"name": "RHSA-2015:2595",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2595.html"
},
{
"name": "RHSA-2015:2596",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2596.html"
},
{ {
"name": "openSUSE-SU-2015:2262", "name": "openSUSE-SU-2015:2262",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00062.html" "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00062.html"
}, },
{
"name": "FEDORA-2015-8a1243db75",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172823.html"
},
{
"name": "FEDORA-2015-13668fff74",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172769.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"name": "openSUSE-SU-2016:0270",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10148",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10148"
},
{
"name": "openSUSE-SU-2015:2100",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00034.html"
},
{
"name": "[oss-security] 20151112 CVE request: libpng buffer overflow in png_set_PLTE",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/11/12/2"
},
{
"name": "SUSE-SU-2016:0269",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"
},
{
"name": "openSUSE-SU-2016:0105",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00030.html"
},
{
"name": "FEDORA-2015-97fc1797fa",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172797.html"
},
{
"name": "openSUSE-SU-2016:0729",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html"
},
{
"name": "openSUSE-SU-2016:0263",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html"
},
{
"name": "SUSE-SU-2016:0256",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html"
},
{
"name": "FEDORA-2016-43735c33a7",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177382.html"
},
{
"name": "SUSE-SU-2016:0665",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html"
},
{
"name": "GLSA-201603-09",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201603-09"
},
{
"name": "FEDORA-2016-9a1c707b10",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177344.html"
},
{ {
"name": "openSUSE-SU-2015:2263", "name": "openSUSE-SU-2015:2263",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00063.html" "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00063.html"
}, },
{
"name": "RHSA-2016:0057",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html"
},
{
"name": "RHSA-2016:0055",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html"
},
{
"name": "FEDORA-2015-c80ec85542",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174905.html"
},
{
"name": "openSUSE-SU-2015:2099",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00033.html"
},
{ {
"name": "USN-2815-1", "name": "USN-2815-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2815-1" "url": "http://www.ubuntu.com/usn/USN-2815-1"
}, },
{ {
"name" : "77568", "name": "RHSA-2016:0056",
"refsource" : "BID", "refsource": "REDHAT",
"url" : "http://www.securityfocus.com/bid/77568" "url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html"
}, },
{ {
"name" : "1034142", "name": "openSUSE-SU-2016:0268",
"refsource" : "SECTRACK", "refsource": "SUSE",
"url" : "http://www.securitytracker.com/id/1034142" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"
},
{
"name": "FEDORA-2015-4ad4998d00",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175073.html"
},
{
"name": "RHSA-2015:2594",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2594.html"
},
{
"name": "FEDORA-2015-233750b6ab",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174936.html"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=560291",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=560291"
},
{
"name": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html"
},
{
"name": "SUSE-SU-2016:0265",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"
},
{
"name": "openSUSE-SU-2016:0104",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00029.html"
} }
] ]
} }

View File

@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20160113 Multiple SQL Injection Vulnerabilities in mcart.xls Bitrix Module",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/537288/100/0/threaded"
},
{
"name" : "39246",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/39246/"
},
{ {
"name": "http://packetstormsecurity.com/files/135258/Bitrix-mcart.xls-6.5.2-SQL-Injection.html", "name": "http://packetstormsecurity.com/files/135258/Bitrix-mcart.xls-6.5.2-SQL-Injection.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/135258/Bitrix-mcart.xls-6.5.2-SQL-Injection.html" "url": "http://packetstormsecurity.com/files/135258/Bitrix-mcart.xls-6.5.2-SQL-Injection.html"
}, },
{
"name": "97669",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97669"
},
{
"name": "20160113 Multiple SQL Injection Vulnerabilities in mcart.xls Bitrix Module",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/537288/100/0/threaded"
},
{ {
"name": "https://www.htbridge.com/advisory/HTB23279", "name": "https://www.htbridge.com/advisory/HTB23279",
"refsource": "MISC", "refsource": "MISC",
"url": "https://www.htbridge.com/advisory/HTB23279" "url": "https://www.htbridge.com/advisory/HTB23279"
}, },
{ {
"name" : "97669", "name": "39246",
"refsource" : "BID", "refsource": "EXPLOIT-DB",
"url" : "http://www.securityfocus.com/bid/97669" "url": "https://www.exploit-db.com/exploits/39246/"
} }
] ]
} }

View File

@ -52,25 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.wireshark.org/security/wnpa-sec-2015-45.html",
"refsource" : "CONFIRM",
"url" : "http://www.wireshark.org/security/wnpa-sec-2015-45.html"
},
{
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11793",
"refsource" : "CONFIRM",
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11793"
},
{ {
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=56baca60271379cb97f6a4a6bf72eb526e8b52d0", "name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=56baca60271379cb97f6a4a6bf72eb526e8b52d0",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=56baca60271379cb97f6a4a6bf72eb526e8b52d0" "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=56baca60271379cb97f6a4a6bf72eb526e8b52d0"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", "name": "79382",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" "url": "http://www.securityfocus.com/bid/79382"
}, },
{ {
"name": "DSA-3505", "name": "DSA-3505",
@ -83,9 +73,19 @@
"url": "https://security.gentoo.org/glsa/201604-05" "url": "https://security.gentoo.org/glsa/201604-05"
}, },
{ {
"name" : "79382", "name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/79382" "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
},
{
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11793",
"refsource": "CONFIRM",
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11793"
},
{
"name": "http://www.wireshark.org/security/wnpa-sec-2015-45.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2015-45.html"
}, },
{ {
"name": "1034551", "name": "1034551",

View File

@ -53,49 +53,49 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20150915 CVE Request : Use-after-free in openjpeg", "name": "GLSA-201612-26",
"refsource" : "MLIST", "refsource": "GENTOO",
"url" : "http://www.openwall.com/lists/oss-security/2015/09/15/4" "url": "https://security.gentoo.org/glsa/201612-26"
},
{
"name" : "[oss-security] 20160512 Re: CVE Request : Use-after-free in openjpeg",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/05/13/1"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1263359",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1263359"
},
{
"name" : "https://github.com/uclouvain/openjpeg/blob/master/CHANGELOG.md",
"refsource" : "CONFIRM",
"url" : "https://github.com/uclouvain/openjpeg/blob/master/CHANGELOG.md"
},
{
"name" : "https://github.com/uclouvain/openjpeg/commit/940100c28ae28931722290794889cf84a92c5f6f",
"refsource" : "CONFIRM",
"url" : "https://github.com/uclouvain/openjpeg/commit/940100c28ae28931722290794889cf84a92c5f6f"
}, },
{ {
"name": "https://github.com/uclouvain/openjpeg/issues/563", "name": "https://github.com/uclouvain/openjpeg/issues/563",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/uclouvain/openjpeg/issues/563" "url": "https://github.com/uclouvain/openjpeg/issues/563"
}, },
{
"name": "[oss-security] 20160512 Re: CVE Request : Use-after-free in openjpeg",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/05/13/1"
},
{
"name": "https://github.com/uclouvain/openjpeg/blob/master/CHANGELOG.md",
"refsource": "CONFIRM",
"url": "https://github.com/uclouvain/openjpeg/blob/master/CHANGELOG.md"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1263359",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1263359"
},
{ {
"name": "DSA-3665", "name": "DSA-3665",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3665" "url": "http://www.debian.org/security/2016/dsa-3665"
}, },
{ {
"name" : "GLSA-201612-26", "name": "https://github.com/uclouvain/openjpeg/commit/940100c28ae28931722290794889cf84a92c5f6f",
"refsource" : "GENTOO", "refsource": "CONFIRM",
"url" : "https://security.gentoo.org/glsa/201612-26" "url": "https://github.com/uclouvain/openjpeg/commit/940100c28ae28931722290794889cf84a92c5f6f"
}, },
{ {
"name": "1038623", "name": "1038623",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038623" "url": "http://www.securitytracker.com/id/1038623"
},
{
"name": "[oss-security] 20150915 CVE Request : Use-after-free in openjpeg",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/09/15/4"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-0940", "ID": "CVE-2016-0940",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-02.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-02.html"
},
{ {
"name": "1034646", "name": "1034646",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034646" "url": "http://www.securitytracker.com/id/1034646"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-02.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-02.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-1127", "ID": "CVE-2016-1127",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
},
{ {
"name": "1035828", "name": "1035828",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035828" "url": "http://www.securitytracker.com/id/1035828"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10753" "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10753"
}, },
{
"name" : "91757",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/91757"
},
{ {
"name": "1036307", "name": "1036307",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036307" "url": "http://www.securitytracker.com/id/1036307"
},
{
"name": "91757",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91757"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1364", "ID": "CVE-2016-1364",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2016-1861", "ID": "CVE-2016-1861",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "39930",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/39930/"
},
{
"name" : "https://bugs.chromium.org/p/project-zero/issues/detail?id=724",
"refsource" : "MISC",
"url" : "https://bugs.chromium.org/p/project-zero/issues/detail?id=724"
},
{ {
"name": "https://support.apple.com/HT206567", "name": "https://support.apple.com/HT206567",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -71,6 +61,16 @@
"name": "APPLE-SA-2016-05-16-4", "name": "APPLE-SA-2016-05-16-4",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html" "url": "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html"
},
{
"name": "39930",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/39930/"
},
{
"name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=724",
"refsource": "MISC",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=724"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2016-1938", "ID": "CVE-2016-1938",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,49 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://blog.fuzzing-project.org/37-Mozilla-NSS-Wrong-calculation-results-in-mp_div-and-mp_exptmod.html", "name": "81955",
"refsource" : "MISC", "refsource": "BID",
"url" : "https://blog.fuzzing-project.org/37-Mozilla-NSS-Wrong-calculation-results-in-mp_div-and-mp_exptmod.html" "url": "http://www.securityfocus.com/bid/81955"
},
{
"name" : "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes",
"refsource" : "MISC",
"url" : "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes"
},
{
"name" : "https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_div.c",
"refsource" : "MISC",
"url" : "https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_div.c"
},
{
"name" : "https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_exptmod.c",
"refsource" : "MISC",
"url" : "https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_exptmod.c"
},
{
"name" : "http://www.mozilla.org/security/announce/2016/mfsa2016-07.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2016/mfsa2016-07.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1190248",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1190248"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1194947",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1194947"
},
{
"name" : "https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c",
"refsource" : "CONFIRM",
"url" : "https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
}, },
{ {
"name": "DSA-3688", "name": "DSA-3688",
@ -103,9 +63,9 @@
"url": "http://www.debian.org/security/2016/dsa-3688" "url": "http://www.debian.org/security/2016/dsa-3688"
}, },
{ {
"name" : "GLSA-201605-06", "name": "1034825",
"refsource" : "GENTOO", "refsource": "SECTRACK",
"url" : "https://security.gentoo.org/glsa/201605-06" "url": "http://www.securitytracker.com/id/1034825"
}, },
{ {
"name": "GLSA-201701-46", "name": "GLSA-201701-46",
@ -113,59 +73,99 @@
"url": "https://security.gentoo.org/glsa/201701-46" "url": "https://security.gentoo.org/glsa/201701-46"
}, },
{ {
"name" : "openSUSE-SU-2016:0306", "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
},
{
"name" : "openSUSE-SU-2016:0309",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html"
},
{
"name" : "SUSE-SU-2016:0338",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html"
},
{
"name" : "USN-2973-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2973-1"
},
{
"name" : "USN-2880-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2880-1"
},
{
"name" : "USN-2880-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2880-2"
},
{
"name" : "USN-2903-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2903-1"
}, },
{ {
"name": "USN-2903-2", "name": "USN-2903-2",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2903-2" "url": "http://www.ubuntu.com/usn/USN-2903-2"
}, },
{
"name": "USN-2880-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2880-1"
},
{
"name": "USN-2903-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2903-1"
},
{
"name": "USN-2880-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2880-2"
},
{
"name": "https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_exptmod.c",
"refsource": "MISC",
"url": "https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_exptmod.c"
},
{
"name": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes",
"refsource": "MISC",
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes"
},
{
"name": "SUSE-SU-2016:0338",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html"
},
{
"name": "http://www.mozilla.org/security/announce/2016/mfsa2016-07.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2016/mfsa2016-07.html"
},
{
"name": "https://blog.fuzzing-project.org/37-Mozilla-NSS-Wrong-calculation-results-in-mp_div-and-mp_exptmod.html",
"refsource": "MISC",
"url": "https://blog.fuzzing-project.org/37-Mozilla-NSS-Wrong-calculation-results-in-mp_div-and-mp_exptmod.html"
},
{
"name": "USN-2973-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2973-1"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1194947",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1194947"
},
{
"name": "openSUSE-SU-2016:0309",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html"
},
{ {
"name": "91787", "name": "91787",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/91787" "url": "http://www.securityfocus.com/bid/91787"
}, },
{ {
"name" : "81955", "name": "https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_div.c",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/81955" "url": "https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_div.c"
}, },
{ {
"name" : "1034825", "name": "GLSA-201605-06",
"refsource" : "SECTRACK", "refsource": "GENTOO",
"url" : "http://www.securitytracker.com/id/1034825" "url": "https://security.gentoo.org/glsa/201605-06"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1190248",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1190248"
},
{
"name": "openSUSE-SU-2016:0306",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html"
},
{
"name": "https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c",
"refsource": "CONFIRM",
"url": "https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@symantec.com",
"ID": "CVE-2016-5312", "ID": "CVE-2016-5312",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "93148",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93148"
},
{
"name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160927_00",
"refsource": "CONFIRM",
"url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160927_00"
},
{
"name": "http://packetstormsecurity.com/files/138891/Symantec-Messaging-Gateway-10.6.1-Directory-Traversal.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/138891/Symantec-Messaging-Gateway-10.6.1-Directory-Traversal.html"
},
{
"name": "1036908",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036908"
},
{ {
"name": "40437", "name": "40437",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
@ -61,26 +81,6 @@
"name": "20160928 Symantec Messaging Gateway <= 10.6.1 Directory Traversal", "name": "20160928 Symantec Messaging Gateway <= 10.6.1 Directory Traversal",
"refsource": "FULLDISC", "refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2016/Sep/71" "url": "http://seclists.org/fulldisclosure/2016/Sep/71"
},
{
"name" : "http://packetstormsecurity.com/files/138891/Symantec-Messaging-Gateway-10.6.1-Directory-Traversal.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/138891/Symantec-Messaging-Gateway-10.6.1-Directory-Traversal.html"
},
{
"name" : "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160927_00",
"refsource" : "CONFIRM",
"url" : "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160927_00"
},
{
"name" : "93148",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/93148"
},
{
"name" : "1036908",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036908"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://support.f5.com/kb/en-us/solutions/public/k/64/sol64743453.html",
"refsource" : "CONFIRM",
"url" : "https://support.f5.com/kb/en-us/solutions/public/k/64/sol64743453.html"
},
{ {
"name": "94240", "name": "94240",
"refsource": "BID", "refsource": "BID",
@ -66,6 +61,11 @@
"name": "1036927", "name": "1036927",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036927" "url": "http://www.securitytracker.com/id/1036927"
},
{
"name": "https://support.f5.com/kb/en-us/solutions/public/k/64/sol64743453.html",
"refsource": "CONFIRM",
"url": "https://support.f5.com/kb/en-us/solutions/public/k/64/sol64743453.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@microfocus.com", "ASSIGNER": "security@suse.com",
"ID": "CVE-2016-5752", "ID": "CVE-2016-5752",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-2265", "ID": "CVE-2018-2265",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "chrome-cve-admin@google.com", "ASSIGNER": "security@google.com",
"ID": "CVE-2019-5762", "ID": "CVE-2019-5762",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,30 +53,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "106767",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106767"
},
{ {
"name": "https://crbug.com/900552", "name": "https://crbug.com/900552",
"refsource": "MISC", "refsource": "MISC",
"url": "https://crbug.com/900552" "url": "https://crbug.com/900552"
}, },
{
"name" : "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html",
"refsource" : "CONFIRM",
"url" : "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html"
},
{
"name" : "DSA-4395",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2019/dsa-4395"
},
{ {
"name": "RHSA-2019:0309", "name": "RHSA-2019:0309",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0309" "url": "https://access.redhat.com/errata/RHSA-2019:0309"
}, },
{ {
"name" : "106767", "name": "DSA-4395",
"refsource" : "BID", "refsource": "DEBIAN",
"url" : "http://www.securityfocus.com/bid/106767" "url": "https://www.debian.org/security/2019/dsa-4395"
},
{
"name": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html",
"refsource": "CONFIRM",
"url": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "46488",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/46488/"
},
{ {
"name": "https://github.com/xiayulei/open_source_bms/issues/33", "name": "https://github.com/xiayulei/open_source_bms/issues/33",
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/xiayulei/open_source_bms/issues/33" "url": "https://github.com/xiayulei/open_source_bms/issues/33"
},
{
"name": "46488",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/46488/"
} }
] ]
} }