"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 00:50:56 +00:00
parent 84d6d4bb00
commit a58a43035f
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
58 changed files with 3334 additions and 3334 deletions

View File

@ -58,14 +58,9 @@
"url": "https://www.exploit-db.com/exploits/3259" "url": "https://www.exploit-db.com/exploits/3259"
}, },
{ {
"name" : "20070202 phpBB++ Build 100 (phpbb_root_path) Remote File Include Exploit", "name": "33092",
"refsource" : "VIM", "refsource": "OSVDB",
"url" : "http://www.attrition.org/pipermail/vim/2007-February/001279.html" "url": "http://osvdb.org/33092"
},
{
"name" : "22376",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22376"
}, },
{ {
"name": "ADV-2007-0472", "name": "ADV-2007-0472",
@ -73,9 +68,14 @@
"url": "http://www.vupen.com/english/advisories/2007/0472" "url": "http://www.vupen.com/english/advisories/2007/0472"
}, },
{ {
"name" : "33092", "name": "20070202 phpBB++ Build 100 (phpbb_root_path) Remote File Include Exploit",
"refsource" : "OSVDB", "refsource": "VIM",
"url" : "http://osvdb.org/33092" "url": "http://www.attrition.org/pipermail/vim/2007-February/001279.html"
},
{
"name": "phpbbplusplus-functions-file-include(32159)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32159"
}, },
{ {
"name": "24034", "name": "24034",
@ -83,9 +83,9 @@
"url": "http://secunia.com/advisories/24034" "url": "http://secunia.com/advisories/24034"
}, },
{ {
"name" : "phpbbplusplus-functions-file-include(32159)", "name": "22376",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32159" "url": "http://www.securityfocus.com/bid/22376"
} }
] ]
} }

View File

@ -57,36 +57,36 @@
"refsource": "FULLDISC", "refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2007/Feb/0196.html" "url": "http://seclists.org/fulldisclosure/2007/Feb/0196.html"
}, },
{
"name" : "20070209 Re: [WEB SECURITY] Plain Old Webserver - The coolest firefox extension",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2007/Feb/0210.html"
},
{
"name" : "https://addons.mozilla.org/firefox/3002/",
"refsource" : "CONFIRM",
"url" : "https://addons.mozilla.org/firefox/3002/"
},
{ {
"name": "22502", "name": "22502",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/22502" "url": "http://www.securityfocus.com/bid/22502"
}, },
{
"name" : "ADV-2007-0558",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0558"
},
{ {
"name": "33174", "name": "33174",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/33174" "url": "http://osvdb.org/33174"
}, },
{
"name": "https://addons.mozilla.org/firefox/3002/",
"refsource": "CONFIRM",
"url": "https://addons.mozilla.org/firefox/3002/"
},
{
"name": "20070209 Re: [WEB SECURITY] Plain Old Webserver - The coolest firefox extension",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2007/Feb/0210.html"
},
{ {
"name": "24127", "name": "24127",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24127" "url": "http://secunia.com/advisories/24127"
}, },
{
"name": "ADV-2007-0558",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0558"
},
{ {
"name": "pow-httprequest-directory-traversal(32467)", "name": "pow-httprequest-directory-traversal(32467)",
"refsource": "XF", "refsource": "XF",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-3383", "ID": "CVE-2007-3383",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070721 CVE-2007-3383: XSS in Tomcat send mail example", "name": "39000",
"refsource" : "BUGTRAQ", "refsource": "OSVDB",
"url" : "http://www.securityfocus.com/archive/1/474413/100/0/threaded" "url": "http://osvdb.org/39000"
},
{
"name" : "20070721 CVE-2007-3383: XSS in Tomcat send mail example",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2007/Jul/0448.html"
}, },
{ {
"name": "http://tomcat.apache.org/security-4.html", "name": "http://tomcat.apache.org/security-4.html",
@ -72,16 +67,36 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT2163" "url": "http://support.apple.com/kb/HT2163"
}, },
{
"name": "ADV-2008-1981",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1981/references"
},
{
"name": "20070721 CVE-2007-3383: XSS in Tomcat send mail example",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/474413/100/0/threaded"
},
{ {
"name": "APPLE-SA-2008-06-30", "name": "APPLE-SA-2008-06-30",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"
}, },
{
"name": "30802",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30802"
},
{ {
"name": "VU#862600", "name": "VU#862600",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/862600" "url": "http://www.kb.cert.org/vuls/id/862600"
}, },
{
"name": "2918",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2918"
},
{ {
"name": "24999", "name": "24999",
"refsource": "BID", "refsource": "BID",
@ -93,24 +108,9 @@
"url": "http://www.vupen.com/english/advisories/2007/2618" "url": "http://www.vupen.com/english/advisories/2007/2618"
}, },
{ {
"name" : "ADV-2008-1981", "name": "20070721 CVE-2007-3383: XSS in Tomcat send mail example",
"refsource" : "VUPEN", "refsource": "FULLDISC",
"url" : "http://www.vupen.com/english/advisories/2008/1981/references" "url": "http://seclists.org/fulldisclosure/2007/Jul/0448.html"
},
{
"name" : "39000",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/39000"
},
{
"name" : "30802",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30802"
},
{
"name" : "2918",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2918"
}, },
{ {
"name": "tomcat-sendmail-example-xss(35536)", "name": "tomcat-sendmail-example-xss(35536)",

View File

@ -52,55 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://lostmon.blogspot.com/2007/07/netflow-analizer-5-opmanager-7-multiple.html",
"refsource" : "MISC",
"url" : "http://lostmon.blogspot.com/2007/07/netflow-analizer-5-opmanager-7-multiple.html"
},
{ {
"name": "24767", "name": "24767",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/24767" "url": "http://www.securityfocus.com/bid/24767"
}, },
{
"name" : "38945",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/38945"
},
{
"name" : "38946",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/38946"
},
{
"name" : "38947",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/38947"
},
{
"name" : "38948",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/38948"
},
{ {
"name": "38949", "name": "38949",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/38949" "url": "http://osvdb.org/38949"
}, },
{
"name": "37825",
"refsource": "OSVDB",
"url": "http://osvdb.org/37825"
},
{
"name": "http://lostmon.blogspot.com/2007/07/netflow-analizer-5-opmanager-7-multiple.html",
"refsource": "MISC",
"url": "http://lostmon.blogspot.com/2007/07/netflow-analizer-5-opmanager-7-multiple.html"
},
{
"name": "38947",
"refsource": "OSVDB",
"url": "http://osvdb.org/38947"
},
{ {
"name": "37821", "name": "37821",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/37821" "url": "http://osvdb.org/37821"
}, },
{ {
"name" : "37822", "name": "38946",
"refsource": "OSVDB", "refsource": "OSVDB",
"url" : "http://osvdb.org/37822" "url": "http://osvdb.org/38946"
},
{
"name" : "37823",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/37823"
}, },
{ {
"name": "37824", "name": "37824",
@ -108,14 +93,29 @@
"url": "http://osvdb.org/37824" "url": "http://osvdb.org/37824"
}, },
{ {
"name" : "37825", "name": "37822",
"refsource": "OSVDB", "refsource": "OSVDB",
"url" : "http://osvdb.org/37825" "url": "http://osvdb.org/37822"
},
{
"name": "38945",
"refsource": "OSVDB",
"url": "http://osvdb.org/38945"
},
{
"name": "38948",
"refsource": "OSVDB",
"url": "http://osvdb.org/38948"
}, },
{ {
"name": "netflowanalyzer-opmanager-multiple-xss(35263)", "name": "netflowanalyzer-opmanager-multiple-xss(35263)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35263" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35263"
},
{
"name": "37823",
"refsource": "OSVDB",
"url": "http://osvdb.org/37823"
} }
] ]
} }

View File

@ -53,59 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070921 Re: [Full-disclosure] [USN-515-1] t1lib vulnerability", "name": "GLSA-200710-12",
"refsource" : "BUGTRAQ", "refsource": "GENTOO",
"url" : "http://www.securityfocus.com/archive/1/480239/100/100/threaded" "url": "http://security.gentoo.org/glsa/glsa-200710-12.xml"
}, },
{ {
"name" : "20070921 Re: [USN-515-1] t1lib vulnerability", "name": "27743",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/480244/100/100/threaded" "url": "http://secunia.com/advisories/27743"
}, },
{ {
"name" : "20080105 rPSA-2008-0007-1 tetex tetex-afm tetex-dvips tetex-fonts tetex-latex tetex-xdvi", "name": "26901",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/485823/100/0/threaded" "url": "http://secunia.com/advisories/26901"
}, },
{ {
"name" : "20080212 FLEA-2008-0006-1 tetex tetex-dvips tetex-fonts", "name": "oval:org.mitre.oval:def:10557",
"refsource" : "BUGTRAQ", "refsource": "OVAL",
"url" : "http://www.securityfocus.com/archive/1/487984/100/0/threaded" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10557"
}, },
{ {
"name" : "http://www.bugtraq.ir/adv/t1lib.txt", "name": "php-imagepsloadfont-bo(35620)",
"refsource" : "MISC", "refsource": "XF",
"url" : "http://www.bugtraq.ir/adv/t1lib.txt" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35620"
},
{
"name" : "4227",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4227"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=303021",
"refsource" : "MISC",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=303021"
},
{
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=193437",
"refsource" : "CONFIRM",
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=193437"
},
{
"name" : "https://issues.rpath.com/browse/RPL-1972",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-1972"
},
{
"name" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0007",
"refsource" : "CONFIRM",
"url" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0007"
},
{
"name" : "DSA-1390",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1390"
}, },
{ {
"name": "FEDORA-2007-2343", "name": "FEDORA-2007-2343",
@ -113,39 +83,139 @@
"url": "http://fedoranews.org/updates/FEDORA-2007-234.shtml" "url": "http://fedoranews.org/updates/FEDORA-2007-234.shtml"
}, },
{ {
"name" : "FEDORA-2007-3390", "name": "20070921 Re: [Full-disclosure] [USN-515-1] t1lib vulnerability",
"refsource" : "FEDORA", "refsource": "BUGTRAQ",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00663.html" "url": "http://www.securityfocus.com/archive/1/480239/100/100/threaded"
}, },
{ {
"name" : "FEDORA-2007-750", "name": "DSA-1390",
"refsource" : "FEDORA", "refsource": "DEBIAN",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00724.html" "url": "http://www.debian.org/security/2007/dsa-1390"
}, },
{ {
"name" : "GLSA-200710-12", "name": "27297",
"refsource" : "GENTOO", "refsource": "SECUNIA",
"url" : "http://security.gentoo.org/glsa/glsa-200710-12.xml" "url": "http://secunia.com/advisories/27297"
},
{
"name" : "GLSA-200711-34",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200711-34.xml"
}, },
{ {
"name": "GLSA-200805-13", "name": "GLSA-200805-13",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200805-13.xml" "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
}, },
{
"name": "20080105 rPSA-2008-0007-1 tetex tetex-afm tetex-dvips tetex-fonts tetex-latex tetex-xdvi",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/485823/100/0/threaded"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0007",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0007"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=303021",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=303021"
},
{
"name": "FEDORA-2007-750",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00724.html"
},
{
"name": "RHSA-2007:1031",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1031.html"
},
{ {
"name": "MDKSA-2007:189", "name": "MDKSA-2007:189",
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:189" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:189"
}, },
{ {
"name" : "MDKSA-2007:230", "name": "4227",
"refsource" : "MANDRIVA", "refsource": "EXPLOIT-DB",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:230" "url": "https://www.exploit-db.com/exploits/4227"
},
{
"name": "30168",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30168"
},
{
"name": "https://issues.rpath.com/browse/RPL-1972",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1972"
},
{
"name": "27239",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27239"
},
{
"name": "26241",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26241"
},
{
"name": "20070921 Re: [USN-515-1] t1lib vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/480244/100/100/threaded"
},
{
"name": "25079",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25079"
},
{
"name": "27718",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27718"
},
{
"name": "http://www.bugtraq.ir/adv/t1lib.txt",
"refsource": "MISC",
"url": "http://www.bugtraq.ir/adv/t1lib.txt"
},
{
"name": "GLSA-200711-34",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
},
{
"name": "28345",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28345"
},
{
"name": "27599",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27599"
},
{
"name": "USN-515-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-515-1"
},
{
"name": "27439",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27439"
},
{
"name": "1018905",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018905"
},
{
"name": "FEDORA-2007-3390",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00663.html"
},
{
"name": "26981",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26981"
}, },
{ {
"name": "RHSA-2007:1027", "name": "RHSA-2007:1027",
@ -158,39 +228,9 @@
"url": "http://www.redhat.com/support/errata/RHSA-2007-1030.html" "url": "http://www.redhat.com/support/errata/RHSA-2007-1030.html"
}, },
{ {
"name" : "RHSA-2007:1031", "name": "MDKSA-2007:230",
"refsource" : "REDHAT", "refsource": "MANDRIVA",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-1031.html" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:230"
},
{
"name" : "SUSE-SR:2007:023",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_23_sr.html"
},
{
"name" : "USN-515-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-515-1"
},
{
"name" : "25079",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25079"
},
{
"name" : "oval:org.mitre.oval:def:10557",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10557"
},
{
"name" : "1018905",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018905"
},
{
"name" : "26241",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26241"
}, },
{ {
"name": "26992", "name": "26992",
@ -198,59 +238,19 @@
"url": "http://secunia.com/advisories/26992" "url": "http://secunia.com/advisories/26992"
}, },
{ {
"name" : "26981", "name": "http://bugs.gentoo.org/show_bug.cgi?id=193437",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/26981" "url": "http://bugs.gentoo.org/show_bug.cgi?id=193437"
}, },
{ {
"name" : "26901", "name": "SUSE-SR:2007:023",
"refsource" : "SECUNIA", "refsource": "SUSE",
"url" : "http://secunia.com/advisories/26901" "url": "http://www.novell.com/linux/security/advisories/2007_23_sr.html"
}, },
{ {
"name" : "27239", "name": "20080212 FLEA-2008-0006-1 tetex tetex-dvips tetex-fonts",
"refsource" : "SECUNIA", "refsource": "BUGTRAQ",
"url" : "http://secunia.com/advisories/27239" "url": "http://www.securityfocus.com/archive/1/487984/100/0/threaded"
},
{
"name" : "27599",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27599"
},
{
"name" : "27297",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27297"
},
{
"name" : "27743",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27743"
},
{
"name" : "27439",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27439"
},
{
"name" : "28345",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28345"
},
{
"name" : "27718",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27718"
},
{
"name" : "30168",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30168"
},
{
"name" : "php-imagepsloadfont-bo(35620)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35620"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070728 phpCoupon Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/474936/100/0/threaded"
},
{
"name" : "25116",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25116"
},
{ {
"name": "2958", "name": "2958",
"refsource": "SREASON", "refsource": "SREASON",
@ -71,6 +61,16 @@
"name": "phpcoupon-payment-security-bypass(35664)", "name": "phpcoupon-payment-security-bypass(35664)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35664" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35664"
},
{
"name": "20070728 phpCoupon Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/474936/100/0/threaded"
},
{
"name": "25116",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25116"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070801 [BuHa-Security] DoS Vulnerability in Konqueror 3.5.7",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/475266/100/0/threaded"
},
{ {
"name": "http://downloads.securityfocus.com/vulnerabilities/exploits/25170.html", "name": "http://downloads.securityfocus.com/vulnerabilities/exploits/25170.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://downloads.securityfocus.com/vulnerabilities/exploits/25170.html" "url": "http://downloads.securityfocus.com/vulnerabilities/exploits/25170.html"
}, },
{
"name": "20070801 [BuHa-Security] DoS Vulnerability in Konqueror 3.5.7",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/475266/100/0/threaded"
},
{ {
"name": "25170", "name": "25170",
"refsource": "BID", "refsource": "BID",

View File

@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070912 CS Guestbook Admin Name & Md5 Security Vuln", "name": "csguestbook-zero-information-disclosure(36587)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/479194/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36587"
},
{
"name" : "25652",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25652"
},
{
"name" : "26805",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26805"
}, },
{ {
"name": "3147", "name": "3147",
@ -73,9 +63,19 @@
"url": "http://securityreason.com/securityalert/3147" "url": "http://securityreason.com/securityalert/3147"
}, },
{ {
"name" : "csguestbook-zero-information-disclosure(36587)", "name": "25652",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36587" "url": "http://www.securityfocus.com/bid/25652"
},
{
"name": "20070912 CS Guestbook Admin Name & Md5 Security Vuln",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/479194/100/0/threaded"
},
{
"name": "26805",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26805"
} }
] ]
} }

View File

@ -52,45 +52,45 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "4420",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4420"
},
{
"name" : "http://www.shinnai.altervista.org/exploits/OREurGhGgAtlCT8J2jSY.html",
"refsource" : "MISC",
"url" : "http://www.shinnai.altervista.org/exploits/OREurGhGgAtlCT8J2jSY.html"
},
{ {
"name": "25702", "name": "25702",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/25702" "url": "http://www.securityfocus.com/bid/25702"
}, },
{
"name" : "ADV-2007-3195",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3195"
},
{
"name" : "37914",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/37914"
},
{ {
"name": "37915", "name": "37915",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/37915" "url": "http://osvdb.org/37915"
}, },
{
"name": "37914",
"refsource": "OSVDB",
"url": "http://osvdb.org/37914"
},
{ {
"name": "26836", "name": "26836",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26836" "url": "http://secunia.com/advisories/26836"
}, },
{
"name": "4420",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4420"
},
{
"name": "ADV-2007-3195",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3195"
},
{ {
"name": "mw6technologies-qrcode-file-overwrite(36666)", "name": "mw6technologies-qrcode-file-overwrite(36666)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36666" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36666"
},
{
"name": "http://www.shinnai.altervista.org/exploits/OREurGhGgAtlCT8J2jSY.html",
"refsource": "MISC",
"url": "http://www.shinnai.altervista.org/exploits/OREurGhGgAtlCT8J2jSY.html"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2007-6678", "ID": "CVE-2007-6678",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20071225 Ho Ho H0-Day - ZyXEL P-330W multiple XSS and XSRF vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2007/Dec/0559.html"
},
{ {
"name": "27024", "name": "27024",
"refsource": "BID", "refsource": "BID",
@ -66,6 +61,11 @@
"name": "28172", "name": "28172",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28172" "url": "http://secunia.com/advisories/28172"
},
{
"name": "20071225 Ho Ho H0-Day - ZyXEL P-330W multiple XSS and XSRF vulnerabilities",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2007/Dec/0559.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2014-1379", "ID": "CVE-2014-1379",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://code.google.com/p/google-security-research/issues/detail?id=20",
"refsource" : "MISC",
"url" : "https://code.google.com/p/google-security-research/issues/detail?id=20"
},
{ {
"name": "http://support.apple.com/kb/HT6296", "name": "http://support.apple.com/kb/HT6296",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6296" "url": "http://support.apple.com/kb/HT6296"
}, },
{
"name": "1030505",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030505"
},
{ {
"name": "APPLE-SA-2014-06-30-2", "name": "APPLE-SA-2014-06-30-2",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0172.html" "url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0172.html"
}, },
{ {
"name" : "1030505", "name": "https://code.google.com/p/google-security-research/issues/detail?id=20",
"refsource" : "SECTRACK", "refsource": "MISC",
"url" : "http://www.securitytracker.com/id/1030505" "url": "https://code.google.com/p/google-security-research/issues/detail?id=20"
}, },
{ {
"name": "59475", "name": "59475",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5601", "ID": "CVE-2014-5601",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#503385", "name": "VU#503385",
"refsource": "CERT-VN", "refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497", "name": "VU#582497",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2015-2008", "ID": "CVE-2015-2008",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.vmware.com/security/advisories/VMSA-2015-0004.html", "name": "1032529",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" "url": "http://www.securitytracker.com/id/1032529"
}, },
{ {
"name": "75092", "name": "75092",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/75092" "url": "http://www.securityfocus.com/bid/75092"
}, },
{ {
"name" : "1032529", "name": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1032529" "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html"
}, },
{ {
"name": "1032530", "name": "1032530",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-2598", "ID": "CVE-2015-2598",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2015-6009", "ID": "CVE-2015-6009",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2015-6598", "ID": "CVE-2015-6598",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2015-6774", "ID": "CVE-2015-6774",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -62,6 +62,21 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=549251" "url": "https://code.google.com/p/chromium/issues/detail?id=549251"
}, },
{
"name": "openSUSE-SU-2015:2290",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html"
},
{
"name": "GLSA-201603-09",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201603-09"
},
{
"name": "78416",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/78416"
},
{ {
"name": "https://codereview.chromium.org/1422753007", "name": "https://codereview.chromium.org/1422753007",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -72,26 +87,11 @@
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3415" "url": "http://www.debian.org/security/2015/dsa-3415"
}, },
{
"name" : "GLSA-201603-09",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201603-09"
},
{
"name" : "openSUSE-SU-2015:2290",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html"
},
{ {
"name": "openSUSE-SU-2015:2291", "name": "openSUSE-SU-2015:2291",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html"
}, },
{
"name" : "78416",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/78416"
},
{ {
"name": "1034298", "name": "1034298",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-6981", "ID": "CVE-2015-6981",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://support.apple.com/HT205370",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205370"
},
{ {
"name": "APPLE-SA-2015-10-21-1", "name": "APPLE-SA-2015-10-21-1",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html" "url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html"
}, },
{
"name": "https://support.apple.com/HT205370",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205370"
},
{ {
"name": "1033929", "name": "1033929",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0573", "ID": "CVE-2016-0573",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0577", "ID": "CVE-2016-0577",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2016-0813", "ID": "CVE-2016-0813",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://source.android.com/security/bulletin/2016-02-01.html",
"refsource" : "CONFIRM",
"url" : "http://source.android.com/security/bulletin/2016-02-01.html"
},
{ {
"name": "https://android.googlesource.com/platform%2Fframeworks%2Fbase/+/16a76dadcc23a13223e9c2216dad1fe5cad7d6e1", "name": "https://android.googlesource.com/platform%2Fframeworks%2Fbase/+/16a76dadcc23a13223e9c2216dad1fe5cad7d6e1",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform%2Fframeworks%2Fbase/+/16a76dadcc23a13223e9c2216dad1fe5cad7d6e1" "url": "https://android.googlesource.com/platform%2Fframeworks%2Fbase/+/16a76dadcc23a13223e9c2216dad1fe5cad7d6e1"
},
{
"name": "http://source.android.com/security/bulletin/2016-02-01.html",
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-02-01.html"
} }
] ]
} }

View File

@ -53,15 +53,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://github.com/sequelize/sequelize/pull/5167/commits/f282d85e60e3df5e57ecdb82adccb4eaef404f03",
"refsource" : "MISC",
"url" : "https://github.com/sequelize/sequelize/pull/5167/commits/f282d85e60e3df5e57ecdb82adccb4eaef404f03"
},
{ {
"name": "https://nodesecurity.io/advisories/112", "name": "https://nodesecurity.io/advisories/112",
"refsource": "MISC", "refsource": "MISC",
"url": "https://nodesecurity.io/advisories/112" "url": "https://nodesecurity.io/advisories/112"
},
{
"name": "https://github.com/sequelize/sequelize/pull/5167/commits/f282d85e60e3df5e57ecdb82adccb4eaef404f03",
"refsource": "MISC",
"url": "https://github.com/sequelize/sequelize/pull/5167/commits/f282d85e60e3df5e57ecdb82adccb4eaef404f03"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4119", "ID": "CVE-2016-4119",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4173", "ID": "CVE-2016-4173",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html"
},
{
"name" : "MS16-093",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-093"
},
{
"name" : "RHSA-2016:1423",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1423"
},
{ {
"name": "SUSE-SU-2016:1826", "name": "SUSE-SU-2016:1826",
"refsource": "SUSE", "refsource": "SUSE",
@ -82,6 +67,21 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/91719" "url": "http://www.securityfocus.com/bid/91719"
}, },
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html"
},
{
"name": "RHSA-2016:1423",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1423"
},
{
"name": "MS16-093",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-093"
},
{ {
"name": "1036280", "name": "1036280",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2016-4301", "ID": "CVE-2016-4301",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,44 +53,44 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://blog.talosintel.com/2016/06/the-poisoned-archives.html", "name": "91328",
"refsource" : "MISC", "refsource": "BID",
"url" : "http://blog.talosintel.com/2016/06/the-poisoned-archives.html" "url": "http://www.securityfocus.com/bid/91328"
},
{
"name" : "http://www.talosintel.com/reports/TALOS-2016-0153/",
"refsource" : "MISC",
"url" : "http://www.talosintel.com/reports/TALOS-2016-0153/"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1348441",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1348441"
},
{
"name" : "https://github.com/libarchive/libarchive/commit/a550daeecf6bc689ade371349892ea17b5b97c77",
"refsource" : "CONFIRM",
"url" : "https://github.com/libarchive/libarchive/commit/a550daeecf6bc689ade371349892ea17b5b97c77"
}, },
{ {
"name": "https://github.com/libarchive/libarchive/issues/715", "name": "https://github.com/libarchive/libarchive/issues/715",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/libarchive/libarchive/issues/715" "url": "https://github.com/libarchive/libarchive/issues/715"
}, },
{
"name": "http://blog.talosintel.com/2016/06/the-poisoned-archives.html",
"refsource": "MISC",
"url": "http://blog.talosintel.com/2016/06/the-poisoned-archives.html"
},
{
"name": "https://github.com/libarchive/libarchive/commit/a550daeecf6bc689ade371349892ea17b5b97c77",
"refsource": "CONFIRM",
"url": "https://github.com/libarchive/libarchive/commit/a550daeecf6bc689ade371349892ea17b5b97c77"
},
{
"name": "http://www.talosintel.com/reports/TALOS-2016-0153/",
"refsource": "MISC",
"url": "http://www.talosintel.com/reports/TALOS-2016-0153/"
},
{ {
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", "name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
}, },
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1348441",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348441"
},
{ {
"name": "GLSA-201701-03", "name": "GLSA-201701-03",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-03" "url": "https://security.gentoo.org/glsa/201701-03"
},
{
"name" : "91328",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/91328"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-4354", "ID": "CVE-2016-4354",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "USN-2982-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2982-1"
},
{ {
"name": "[oss-security] 20160429 CVE request: three issues in libksba", "name": "[oss-security] 20160429 CVE request: three issues in libksba",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/04/29/5" "url": "http://www.openwall.com/lists/oss-security/2016/04/29/5"
}, },
{
"name" : "[oss-security] 20160429 Re: CVE request: three issues in libksba",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/04/29/8"
},
{ {
"name": "http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=commit;h=aea7b6032865740478ca4b706850a5217f1c3887", "name": "http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=commit;h=aea7b6032865740478ca4b706850a5217f1c3887",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=commit;h=aea7b6032865740478ca4b706850a5217f1c3887" "url": "http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=commit;h=aea7b6032865740478ca4b706850a5217f1c3887"
}, },
{
"name": "[oss-security] 20160429 Re: CVE request: three issues in libksba",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/04/29/8"
},
{ {
"name": "GLSA-201604-04", "name": "GLSA-201604-04",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201604-04" "url": "https://security.gentoo.org/glsa/201604-04"
},
{
"name" : "USN-2982-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2982-1"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://xenbits.xen.org/xsa/advisory-192.html", "name": "94470",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://xenbits.xen.org/xsa/advisory-192.html" "url": "http://www.securityfocus.com/bid/94470"
},
{
"name" : "https://support.citrix.com/article/CTX218775",
"refsource" : "CONFIRM",
"url" : "https://support.citrix.com/article/CTX218775"
}, },
{ {
"name": "GLSA-201612-56", "name": "GLSA-201612-56",
@ -68,14 +63,19 @@
"url": "https://security.gentoo.org/glsa/201612-56" "url": "https://security.gentoo.org/glsa/201612-56"
}, },
{ {
"name" : "94470", "name": "http://xenbits.xen.org/xsa/advisory-192.html",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/94470" "url": "http://xenbits.xen.org/xsa/advisory-192.html"
}, },
{ {
"name": "1037341", "name": "1037341",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037341" "url": "http://www.securitytracker.com/id/1037341"
},
{
"name": "https://support.citrix.com/article/CTX218775",
"refsource": "CONFIRM",
"url": "https://support.citrix.com/article/CTX218775"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://marlam.de/msmtp/news/",
"refsource" : "CONFIRM",
"url" : "https://marlam.de/msmtp/news/"
},
{ {
"name": "https://marlam.de/mpop/news/mpop-1-4-3/", "name": "https://marlam.de/mpop/news/mpop-1-4-3/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://marlam.de/mpop/news/mpop-1-4-3/" "url": "https://marlam.de/mpop/news/mpop-1-4-3/"
}, },
{
"name": "https://marlam.de/msmtp/news/",
"refsource": "CONFIRM",
"url": "https://marlam.de/msmtp/news/"
},
{ {
"name": "https://gitlab.marlam.de/marlam/mpop/commit/b51a6c6b8b83bf0913cc52fa2ff64307e987a5b8", "name": "https://gitlab.marlam.de/marlam/mpop/commit/b51a6c6b8b83bf0913cc52fa2ff64307e987a5b8",
"refsource": "MISC", "refsource": "MISC",