"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 23:51:25 +00:00
parent 93b7c36228
commit ce337eb65a
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
60 changed files with 3985 additions and 3985 deletions

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS00-005",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-005"
},
{ {
"name": "Q249973", "name": "Q249973",
"refsource": "MSKB", "refsource": "MSKB",
"url": "http://support.microsoft.com/default.aspx?scid=kb;[LN];Q249973" "url": "http://support.microsoft.com/default.aspx?scid=kb;[LN];Q249973"
}, },
{
"name": "MS00-005",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-005"
},
{ {
"name": "win-malformed-rtf-control-word", "name": "win-malformed-rtf-control-word",
"refsource": "XF", "refsource": "XF",

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20000331 Alert: MS Index Server (CISADV000330)",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=95453598317340&w=2"
},
{ {
"name": "MS00-006", "name": "MS00-006",
"refsource": "MS", "refsource": "MS",
@ -67,6 +62,11 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/1084" "url": "http://www.securityfocus.com/bid/1084"
}, },
{
"name": "20000331 Alert: MS Index Server (CISADV000330)",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=95453598317340&w=2"
},
{ {
"name": "271", "name": "271",
"refsource": "OSVDB", "refsource": "OSVDB",

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20001114 Vulnerabilites in SmallHTTP Server",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=97421834001092&w=2"
},
{ {
"name": "1942", "name": "1942",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/1942" "url": "http://www.securityfocus.com/bid/1942"
},
{
"name": "20001114 Vulnerabilites in SmallHTTP Server",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=97421834001092&w=2"
} }
] ]
} }

View File

@ -53,34 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://projects.info-pull.com/moab/MOAB-01-01-2007.html", "name": "VU#442497",
"refsource" : "MISC", "refsource": "CERT-VN",
"url" : "http://projects.info-pull.com/moab/MOAB-01-01-2007.html" "url": "http://www.kb.cert.org/vuls/id/442497"
},
{
"name" : "3064",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3064"
},
{
"name" : "http://landonf.bikemonkey.org/code/macosx/MOAB_Day_1.20070102060815.15950.zadder.local.html",
"refsource" : "MISC",
"url" : "http://landonf.bikemonkey.org/code/macosx/MOAB_Day_1.20070102060815.15950.zadder.local.html"
},
{
"name" : "http://isc.sans.org/diary.html?storyid=2094",
"refsource" : "MISC",
"url" : "http://isc.sans.org/diary.html?storyid=2094"
},
{
"name" : "http://secunia.com/blog/7/",
"refsource" : "MISC",
"url" : "http://secunia.com/blog/7/"
},
{
"name" : "http://docs.info.apple.com/article.html?artnum=304989",
"refsource" : "CONFIRM",
"url" : "http://docs.info.apple.com/article.html?artnum=304989"
}, },
{ {
"name": "APPLE-SA-2007-01-23", "name": "APPLE-SA-2007-01-23",
@ -88,24 +63,9 @@
"url": "http://lists.apple.com/archives/Security-announce/2007/Jan/msg00000.html" "url": "http://lists.apple.com/archives/Security-announce/2007/Jan/msg00000.html"
}, },
{ {
"name" : "TA07-005A", "name": "http://isc.sans.org/diary.html?storyid=2094",
"refsource" : "CERT", "refsource": "MISC",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-005A.html" "url": "http://isc.sans.org/diary.html?storyid=2094"
},
{
"name" : "VU#442497",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/442497"
},
{
"name" : "21829",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21829"
},
{
"name" : "ADV-2007-0001",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0001"
}, },
{ {
"name": "31023", "name": "31023",
@ -113,9 +73,19 @@
"url": "http://www.osvdb.org/31023" "url": "http://www.osvdb.org/31023"
}, },
{ {
"name" : "1017461", "name": "TA07-005A",
"refsource" : "SECTRACK", "refsource": "CERT",
"url" : "http://securitytracker.com/id?1017461" "url": "http://www.us-cert.gov/cas/techalerts/TA07-005A.html"
},
{
"name": "http://secunia.com/blog/7/",
"refsource": "MISC",
"url": "http://secunia.com/blog/7/"
},
{
"name": "quicktime-rtsp-url-bo(31203)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31203"
}, },
{ {
"name": "23540", "name": "23540",
@ -123,9 +93,39 @@
"url": "http://secunia.com/advisories/23540" "url": "http://secunia.com/advisories/23540"
}, },
{ {
"name" : "quicktime-rtsp-url-bo(31203)", "name": "21829",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31203" "url": "http://www.securityfocus.com/bid/21829"
},
{
"name": "3064",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3064"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=304989",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=304989"
},
{
"name": "http://projects.info-pull.com/moab/MOAB-01-01-2007.html",
"refsource": "MISC",
"url": "http://projects.info-pull.com/moab/MOAB-01-01-2007.html"
},
{
"name": "ADV-2007-0001",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0001"
},
{
"name": "http://landonf.bikemonkey.org/code/macosx/MOAB_Day_1.20070102060815.15950.zadder.local.html",
"refsource": "MISC",
"url": "http://landonf.bikemonkey.org/code/macosx/MOAB_Day_1.20070102060815.15950.zadder.local.html"
},
{
"name": "1017461",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017461"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/456982/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/456982/100/0/threaded"
}, },
{
"name" : "33539",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33539"
},
{ {
"name": "2157", "name": "2157",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2157" "url": "http://securityreason.com/securityalert/2157"
},
{
"name": "33539",
"refsource": "OSVDB",
"url": "http://osvdb.org/33539"
} }
] ]
} }

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "22701",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22701"
},
{
"name": "24314",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24314"
},
{ {
"name": "20070223 Advisory 03/2007: Multiple Browsers Cross Domain Charset Inheritance Vulnerability", "name": "20070223 Advisory 03/2007: Multiple Browsers Cross Domain Charset Inheritance Vulnerability",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -62,11 +72,6 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.hardened-php.net/advisory_032007.142.html" "url": "http://www.hardened-php.net/advisory_032007.142.html"
}, },
{
"name" : "22701",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22701"
},
{ {
"name": "ADV-2007-0744", "name": "ADV-2007-0744",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -76,11 +81,6 @@
"name": "32119", "name": "32119",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/32119" "url": "http://www.osvdb.org/32119"
},
{
"name" : "24314",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24314"
} }
] ]
} }

View File

@ -53,9 +53,19 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.php-security.org/MOPB/MOPB-21-2007.html", "name": "ADV-2007-2732",
"refsource" : "MISC", "refsource": "VUPEN",
"url" : "http://www.php-security.org/MOPB/MOPB-21-2007.html" "url": "http://www.vupen.com/english/advisories/2007/2732"
},
{
"name": "25056",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25056"
},
{
"name": "APPLE-SA-2007-07-31",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html"
}, },
{ {
"name": "http://us2.php.net/releases/4_4_7.php", "name": "http://us2.php.net/releases/4_4_7.php",
@ -73,9 +83,9 @@
"url": "http://docs.info.apple.com/article.html?artnum=306172" "url": "http://docs.info.apple.com/article.html?artnum=306172"
}, },
{ {
"name" : "APPLE-SA-2007-07-31", "name": "25159",
"refsource" : "APPLE", "refsource": "BID",
"url" : "http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html" "url": "http://www.securityfocus.com/bid/25159"
}, },
{ {
"name": "SUSE-SA:2007:032", "name": "SUSE-SA:2007:032",
@ -83,29 +93,19 @@
"url": "http://www.novell.com/linux/security/advisories/2007_32_php.html" "url": "http://www.novell.com/linux/security/advisories/2007_32_php.html"
}, },
{ {
"name" : "22954", "name": "http://www.php-security.org/MOPB/MOPB-21-2007.html",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/22954" "url": "http://www.php-security.org/MOPB/MOPB-21-2007.html"
},
{
"name" : "25159",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25159"
},
{
"name" : "ADV-2007-2732",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2732"
},
{
"name" : "25056",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25056"
}, },
{ {
"name": "26235", "name": "26235",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26235" "url": "http://secunia.com/advisories/26235"
},
{
"name": "22954",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22954"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-1667", "ID": "CVE-2007-1667",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,204 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070404 rPSA-2007-0065-1 freetype xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs", "name": "102888",
"refsource" : "BUGTRAQ", "refsource": "SUNALERT",
"url" : "http://www.securityfocus.com/archive/1/464686/100/0/threaded" "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102888-1"
},
{
"name" : "20070405 FLEA-2007-0009-1: xorg-x11 freetype",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/464816/100/0/threaded"
},
{
"name" : "[xorg-announce] 20070403 various integer overflow vulnerabilites in xserver, libX11 and libXfont",
"refsource" : "MLIST",
"url" : "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html"
},
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045",
"refsource" : "CONFIRM",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045"
},
{
"name" : "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=231684",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=231684"
},
{
"name" : "http://issues.foresightlinux.org/browse/FL-223",
"refsource" : "CONFIRM",
"url" : "http://issues.foresightlinux.org/browse/FL-223"
},
{
"name" : "https://issues.rpath.com/browse/RPL-1213",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-1213"
},
{
"name" : "https://issues.rpath.com/browse/RPL-1211",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-1211"
}, },
{ {
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-176.htm", "name": "http://support.avaya.com/elmodocs2/security/ASA-2007-176.htm",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-176.htm" "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-176.htm"
}, },
{
"name" : "http://support.apple.com/kb/HT3438",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT3438"
},
{
"name" : "APPLE-SA-2009-02-12",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"name" : "DSA-1294",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1294"
},
{
"name" : "DSA-1858",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2009/dsa-1858"
},
{
"name" : "GLSA-200705-06",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200705-06.xml"
},
{
"name" : "GLSA-200805-07",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml"
},
{
"name" : "MDKSA-2007:079",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079"
},
{
"name" : "MDKSA-2007:147",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:147"
},
{
"name" : "[3.9] 021: SECURITY FIX: April 4, 2007",
"refsource" : "OPENBSD",
"url" : "http://www.openbsd.org/errata39.html#021_xorg"
},
{
"name" : "[4.0] 011: SECURITY FIX: April 4, 2007",
"refsource" : "OPENBSD",
"url" : "http://www.openbsd.org/errata40.html#011_xorg"
},
{
"name" : "RHSA-2007:0126",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0126.html"
},
{
"name" : "RHSA-2007:0125",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2007-0125.html"
},
{
"name" : "RHSA-2007:0157",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0157.html"
},
{
"name" : "102888",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102888-1"
},
{
"name" : "SUSE-SA:2007:027",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_27_x.html"
},
{
"name" : "SUSE-SR:2007:008",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_8_sr.html"
},
{
"name" : "USN-453-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-453-1"
},
{
"name" : "USN-453-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-453-2"
},
{
"name" : "USN-481-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-481-1"
},
{
"name" : "23300",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23300"
},
{
"name" : "oval:org.mitre.oval:def:9776",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9776"
},
{
"name" : "36260",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/36260"
},
{
"name" : "ADV-2007-1217",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1217"
},
{
"name" : "ADV-2007-1531",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1531"
},
{
"name" : "oval:org.mitre.oval:def:1693",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1693"
},
{
"name" : "1017864",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017864"
},
{
"name" : "24741",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24741"
},
{
"name" : "24756",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24756"
},
{ {
"name": "24745", "name": "24745",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24745" "url": "http://secunia.com/advisories/24745"
}, },
{ {
"name" : "24758", "name": "33937",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/24758" "url": "http://secunia.com/advisories/33937"
},
{
"name" : "24765",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24765"
}, },
{ {
"name": "24771", "name": "24771",
@ -258,9 +78,24 @@
"url": "http://secunia.com/advisories/24771" "url": "http://secunia.com/advisories/24771"
}, },
{ {
"name" : "24791", "name": "24756",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/24791" "url": "http://secunia.com/advisories/24756"
},
{
"name": "RHSA-2007:0126",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0126.html"
},
{
"name": "23300",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23300"
},
{
"name": "http://support.apple.com/kb/HT3438",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3438"
}, },
{ {
"name": "24739", "name": "24739",
@ -268,39 +103,49 @@
"url": "http://secunia.com/advisories/24739" "url": "http://secunia.com/advisories/24739"
}, },
{ {
"name" : "24953", "name": "APPLE-SA-2009-02-12",
"refsource" : "SECUNIA", "refsource": "APPLE",
"url" : "http://secunia.com/advisories/24953" "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
}, },
{ {
"name" : "25004", "name": "GLSA-200705-06",
"refsource" : "SECUNIA", "refsource": "GENTOO",
"url" : "http://secunia.com/advisories/25004" "url": "http://security.gentoo.org/glsa/glsa-200705-06.xml"
}, },
{ {
"name" : "24975", "name": "24758",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/24975" "url": "http://secunia.com/advisories/24758"
}, },
{ {
"name" : "25112", "name": "USN-453-1",
"refsource" : "SECUNIA", "refsource": "UBUNTU",
"url" : "http://secunia.com/advisories/25112" "url": "http://www.ubuntu.com/usn/usn-453-1"
}, },
{ {
"name" : "25072", "name": "USN-481-1",
"refsource" : "SECUNIA", "refsource": "UBUNTU",
"url" : "http://secunia.com/advisories/25072" "url": "http://www.ubuntu.com/usn/usn-481-1"
}, },
{ {
"name" : "25131", "name": "https://issues.rpath.com/browse/RPL-1211",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/25131" "url": "https://issues.rpath.com/browse/RPL-1211"
}, },
{ {
"name" : "25305", "name": "RHSA-2007:0125",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0125.html"
},
{
"name": "24741",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/25305" "url": "http://secunia.com/advisories/24741"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045"
}, },
{ {
"name": "25992", "name": "25992",
@ -312,15 +157,170 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26177" "url": "http://secunia.com/advisories/26177"
}, },
{
"name": "USN-453-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-453-2"
},
{
"name": "ADV-2007-1531",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1531"
},
{
"name": "[xorg-announce] 20070403 various integer overflow vulnerabilites in xserver, libX11 and libXfont",
"refsource": "MLIST",
"url": "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html"
},
{
"name": "24791",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24791"
},
{
"name": "24975",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24975"
},
{
"name": "SUSE-SA:2007:027",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_27_x.html"
},
{ {
"name": "30161", "name": "30161",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30161" "url": "http://secunia.com/advisories/30161"
}, },
{ {
"name" : "33937", "name": "GLSA-200805-07",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml"
},
{
"name": "DSA-1294",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1294"
},
{
"name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=231684",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=231684"
},
{
"name": "1017864",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017864"
},
{
"name": "24765",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/33937" "url": "http://secunia.com/advisories/24765"
},
{
"name": "SUSE-SR:2007:008",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_8_sr.html"
},
{
"name": "20070404 rPSA-2007-0065-1 freetype xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/464686/100/0/threaded"
},
{
"name": "20070405 FLEA-2007-0009-1: xorg-x11 freetype",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/464816/100/0/threaded"
},
{
"name": "25131",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25131"
},
{
"name": "DSA-1858",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2009/dsa-1858"
},
{
"name": "oval:org.mitre.oval:def:9776",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9776"
},
{
"name": "24953",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24953"
},
{
"name": "ADV-2007-1217",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1217"
},
{
"name": "[4.0] 011: SECURITY FIX: April 4, 2007",
"refsource": "OPENBSD",
"url": "http://www.openbsd.org/errata40.html#011_xorg"
},
{
"name": "https://issues.rpath.com/browse/RPL-1213",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1213"
},
{
"name": "25004",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25004"
},
{
"name": "MDKSA-2007:147",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:147"
},
{
"name": "25305",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25305"
},
{
"name": "oval:org.mitre.oval:def:1693",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1693"
},
{
"name": "25072",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25072"
},
{
"name": "[3.9] 021: SECURITY FIX: April 4, 2007",
"refsource": "OPENBSD",
"url": "http://www.openbsd.org/errata39.html#021_xorg"
},
{
"name": "25112",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25112"
},
{
"name": "http://issues.foresightlinux.org/browse/FL-223",
"refsource": "CONFIRM",
"url": "http://issues.foresightlinux.org/browse/FL-223"
},
{
"name": "36260",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36260"
},
{
"name": "RHSA-2007:0157",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0157.html"
},
{
"name": "MDKSA-2007:079",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079"
} }
] ]
} }

View File

@ -53,94 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070331 Multiple Vendor ImageMagick DCM and XWD Buffer Overflow Vulnerabilities", "name": "23347",
"refsource" : "IDEFENSE", "refsource": "BID",
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=496" "url": "http://www.securityfocus.com/bid/23347"
}, },
{ {
"name" : "http://www.imagemagick.org/script/changelog.php", "name": "29857",
"refsource" : "MISC", "refsource": "SECUNIA",
"url" : "http://www.imagemagick.org/script/changelog.php" "url": "http://secunia.com/advisories/29857"
},
{
"name" : "https://issues.foresightlinux.org/browse/FL-222",
"refsource" : "CONFIRM",
"url" : "https://issues.foresightlinux.org/browse/FL-222"
},
{
"name" : "https://issues.rpath.com/browse/RPL-1205",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-1205"
},
{
"name" : "DSA-1858",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2009/dsa-1858"
}, },
{ {
"name": "GLSA-200705-13", "name": "GLSA-200705-13",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200705-13.xml" "url": "http://security.gentoo.org/glsa/glsa-200705-13.xml"
}, },
{
"name" : "MDKSA-2007:147",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:147"
},
{ {
"name": "RHSA-2008:0145", "name": "RHSA-2008:0145",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0145.html" "url": "http://www.redhat.com/support/errata/RHSA-2008-0145.html"
}, },
{
"name" : "RHSA-2008:0165",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0165.html"
},
{
"name" : "SUSE-SR:2007:008",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_8_sr.html"
},
{
"name" : "USN-481-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-481-1"
},
{
"name" : "23347",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23347"
},
{
"name" : "23252",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23252"
},
{ {
"name": "oval:org.mitre.oval:def:9254", "name": "oval:org.mitre.oval:def:9254",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9254" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9254"
}, },
{ {
"name" : "36260", "name": "20070331 Multiple Vendor ImageMagick DCM and XWD Buffer Overflow Vulnerabilities",
"refsource" : "SECUNIA", "refsource": "IDEFENSE",
"url" : "http://secunia.com/advisories/36260" "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=496"
}, },
{ {
"name" : "ADV-2007-1200", "name": "https://issues.foresightlinux.org/browse/FL-222",
"refsource" : "VUPEN", "refsource": "CONFIRM",
"url" : "http://www.vupen.com/english/advisories/2007/1200" "url": "https://issues.foresightlinux.org/browse/FL-222"
},
{
"name" : "1017839",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017839"
},
{
"name" : "24721",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24721"
}, },
{ {
"name": "24739", "name": "24739",
@ -148,14 +93,29 @@
"url": "http://secunia.com/advisories/24739" "url": "http://secunia.com/advisories/24739"
}, },
{ {
"name" : "25072", "name": "29786",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/25072" "url": "http://secunia.com/advisories/29786"
}, },
{ {
"name" : "25206", "name": "1017839",
"refsource" : "SECUNIA", "refsource": "SECTRACK",
"url" : "http://secunia.com/advisories/25206" "url": "http://www.securitytracker.com/id?1017839"
},
{
"name": "https://issues.rpath.com/browse/RPL-1205",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1205"
},
{
"name": "USN-481-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-481-1"
},
{
"name": "23252",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23252"
}, },
{ {
"name": "25992", "name": "25992",
@ -168,14 +128,39 @@
"url": "http://secunia.com/advisories/26177" "url": "http://secunia.com/advisories/26177"
}, },
{ {
"name" : "29786", "name": "RHSA-2008:0165",
"refsource" : "SECUNIA", "refsource": "REDHAT",
"url" : "http://secunia.com/advisories/29786" "url": "http://www.redhat.com/support/errata/RHSA-2008-0165.html"
}, },
{ {
"name" : "29857", "name": "imagemagick-readxwdimage-bo(33377)",
"refsource" : "SECUNIA", "refsource": "XF",
"url" : "http://secunia.com/advisories/29857" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33377"
},
{
"name": "ADV-2007-1200",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1200"
},
{
"name": "SUSE-SR:2007:008",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_8_sr.html"
},
{
"name": "DSA-1858",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2009/dsa-1858"
},
{
"name": "http://www.imagemagick.org/script/changelog.php",
"refsource": "MISC",
"url": "http://www.imagemagick.org/script/changelog.php"
},
{
"name": "MDKSA-2007:147",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:147"
}, },
{ {
"name": "imagemagick-readdcmimage-bo(33376)", "name": "imagemagick-readdcmimage-bo(33376)",
@ -183,9 +168,24 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33376" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33376"
}, },
{ {
"name" : "imagemagick-readxwdimage-bo(33377)", "name": "24721",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33377" "url": "http://secunia.com/advisories/24721"
},
{
"name": "25072",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25072"
},
{
"name": "25206",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25206"
},
{
"name": "36260",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36260"
} }
] ]
} }

View File

@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070918 Plague in (security) software drivers & BSDOhook utility", "name": "3161",
"refsource" : "BUGTRAQ", "refsource": "SREASON",
"url" : "http://www.securityfocus.com/archive/1/479830/100/0/threaded" "url": "http://securityreason.com/securityalert/3161"
},
{
"name": "45896",
"refsource": "OSVDB",
"url": "http://osvdb.org/45896"
}, },
{ {
"name": "http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php", "name": "http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php",
@ -68,14 +73,9 @@
"url": "http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php" "url": "http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php"
}, },
{ {
"name" : "45896", "name": "20070918 Plague in (security) software drivers & BSDOhook utility",
"refsource" : "OSVDB", "refsource": "BUGTRAQ",
"url" : "http://osvdb.org/45896" "url": "http://www.securityfocus.com/archive/1/479830/100/0/threaded"
},
{
"name" : "3161",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/3161"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://arfis.wordpress.com/2007/09/14/rfi-02-universibo/",
"refsource" : "MISC",
"url" : "http://arfis.wordpress.com/2007/09/14/rfi-02-universibo/"
},
{ {
"name": "39639", "name": "39639",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/39639" "url": "http://osvdb.org/39639"
},
{
"name": "http://arfis.wordpress.com/2007/09/14/rfi-02-universibo/",
"refsource": "MISC",
"url": "http://arfis.wordpress.com/2007/09/14/rfi-02-universibo/"
} }
] ]
} }

View File

@ -52,16 +52,31 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1018876",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018876"
},
{ {
"name": "http://www.irmplc.com/index.php/111-Vendor-Alerts", "name": "http://www.irmplc.com/index.php/111-Vendor-Alerts",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.irmplc.com/index.php/111-Vendor-Alerts" "url": "http://www.irmplc.com/index.php/111-Vendor-Alerts"
}, },
{
"name": "ADV-2007-3673",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3673"
},
{ {
"name": "http://www.irmplc.com/index.php/152-Advisory-022", "name": "http://www.irmplc.com/index.php/152-Advisory-022",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.irmplc.com/index.php/152-Advisory-022" "url": "http://www.irmplc.com/index.php/152-Advisory-022"
}, },
{
"name": "27412",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27412"
},
{ {
"name": "http://www.symantec.com/avcenter/security/Content/2007.10.31a.html", "name": "http://www.symantec.com/avcenter/security/Content/2007.10.31a.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -72,21 +87,6 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/26265" "url": "http://www.securityfocus.com/bid/26265"
}, },
{
"name" : "ADV-2007-3673",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3673"
},
{
"name" : "1018876",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018876"
},
{
"name" : "27412",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27412"
},
{ {
"name": "symantec-altiris-browser-priv-escalation(38180)", "name": "symantec-altiris-browser-priv-escalation(38180)",
"refsource": "XF", "refsource": "XF",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-3165", "ID": "CVE-2015-3165",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "74787",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/74787"
},
{ {
"name": "http://www.postgresql.org/about/news/1587/", "name": "http://www.postgresql.org/about/news/1587/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -63,19 +68,9 @@
"url": "http://www.postgresql.org/docs/9.0/static/release-9-0-20.html" "url": "http://www.postgresql.org/docs/9.0/static/release-9-0-20.html"
}, },
{ {
"name" : "http://www.postgresql.org/docs/9.1/static/release-9-1-16.html", "name": "USN-2621-1",
"refsource" : "CONFIRM", "refsource": "UBUNTU",
"url" : "http://www.postgresql.org/docs/9.1/static/release-9-1-16.html" "url": "http://www.ubuntu.com/usn/USN-2621-1"
},
{
"name" : "http://www.postgresql.org/docs/9.2/static/release-9-2-11.html",
"refsource" : "CONFIRM",
"url" : "http://www.postgresql.org/docs/9.2/static/release-9-2-11.html"
},
{
"name" : "http://www.postgresql.org/docs/9.3/static/release-9-3-7.html",
"refsource" : "CONFIRM",
"url" : "http://www.postgresql.org/docs/9.3/static/release-9-3-7.html"
}, },
{ {
"name": "http://www.postgresql.org/docs/9.4/static/release-9-4-2.html", "name": "http://www.postgresql.org/docs/9.4/static/release-9-4-2.html",
@ -83,14 +78,9 @@
"url": "http://www.postgresql.org/docs/9.4/static/release-9-4-2.html" "url": "http://www.postgresql.org/docs/9.4/static/release-9-4-2.html"
}, },
{ {
"name" : "https://support.apple.com/HT205219", "name": "RHSA-2015:1195",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "https://support.apple.com/HT205219" "url": "http://rhn.redhat.com/errata/RHSA-2015-1195.html"
},
{
"name" : "APPLE-SA-2015-09-16-4",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html"
}, },
{ {
"name": "DSA-3269", "name": "DSA-3269",
@ -98,9 +88,9 @@
"url": "http://www.debian.org/security/2015/dsa-3269" "url": "http://www.debian.org/security/2015/dsa-3269"
}, },
{ {
"name" : "DSA-3270", "name": "http://www.postgresql.org/docs/9.2/static/release-9-2-11.html",
"refsource" : "DEBIAN", "refsource": "CONFIRM",
"url" : "http://www.debian.org/security/2015/dsa-3270" "url": "http://www.postgresql.org/docs/9.2/static/release-9-2-11.html"
}, },
{ {
"name": "GLSA-201507-20", "name": "GLSA-201507-20",
@ -113,24 +103,34 @@
"url": "http://rhn.redhat.com/errata/RHSA-2015-1194.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-1194.html"
}, },
{ {
"name" : "RHSA-2015:1195", "name": "DSA-3270",
"refsource" : "REDHAT", "refsource": "DEBIAN",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1195.html" "url": "http://www.debian.org/security/2015/dsa-3270"
},
{
"name": "http://www.postgresql.org/docs/9.1/static/release-9-1-16.html",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/9.1/static/release-9-1-16.html"
},
{
"name": "APPLE-SA-2015-09-16-4",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html"
},
{
"name": "http://www.postgresql.org/docs/9.3/static/release-9-3-7.html",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/9.3/static/release-9-3-7.html"
},
{
"name": "https://support.apple.com/HT205219",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205219"
}, },
{ {
"name": "RHSA-2015:1196", "name": "RHSA-2015:1196",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1196.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-1196.html"
},
{
"name" : "USN-2621-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2621-1"
},
{
"name" : "74787",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/74787"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2015-3957", "ID": "CVE-2015-3957",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm446809.htm" "url": "http://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm446809.htm"
}, },
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-15-125-01B",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-15-125-01B"
},
{ {
"name": "75136", "name": "75136",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/75136" "url": "http://www.securityfocus.com/bid/75136"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-15-125-01B",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-125-01B"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://bugs.oxid-esales.com/view.php?id=6224",
"refsource" : "CONFIRM",
"url" : "https://bugs.oxid-esales.com/view.php?id=6224"
},
{ {
"name": "https://oxidforge.org/en/oxid-security-bulletin-2015-001.html", "name": "https://oxidforge.org/en/oxid-security-bulletin-2015-001.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://oxidforge.org/en/oxid-security-bulletin-2015-001.html" "url": "https://oxidforge.org/en/oxid-security-bulletin-2015-001.html"
},
{
"name": "https://bugs.oxid-esales.com/view.php?id=6224",
"refsource": "CONFIRM",
"url": "https://bugs.oxid-esales.com/view.php?id=6224"
} }
] ]
} }

View File

@ -52,130 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20150914 CVE-2015-6937 - Linux kernel - NULL pointer dereference in net/rds/connection.c",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/09/14/3"
},
{
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=74e98eb085889b0d2d4908f59f6e00026063014f",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=74e98eb085889b0d2d4908f59f6e00026063014f"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1263139",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1263139"
},
{
"name" : "https://github.com/torvalds/linux/commit/74e98eb085889b0d2d4908f59f6e00026063014f",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/74e98eb085889b0d2d4908f59f6e00026063014f"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name" : "DSA-3364",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3364"
},
{
"name" : "FEDORA-2015-16417",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167358.html"
},
{
"name" : "FEDORA-2015-16440",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168447.html"
},
{
"name" : "FEDORA-2015-16441",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168539.html"
},
{
"name" : "SUSE-SU-2016:2074",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html"
},
{
"name" : "SUSE-SU-2016:0335",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html"
},
{ {
"name": "SUSE-SU-2016:0337", "name": "SUSE-SU-2016:0337",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html"
}, },
{
"name" : "SUSE-SU-2016:0354",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html"
},
{
"name" : "SUSE-SU-2016:0380",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html"
},
{
"name" : "SUSE-SU-2016:0381",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html"
},
{
"name" : "SUSE-SU-2016:0383",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html"
},
{
"name" : "SUSE-SU-2016:0384",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html"
},
{
"name" : "SUSE-SU-2016:0386",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html"
},
{
"name" : "SUSE-SU-2016:0387",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html"
},
{
"name" : "SUSE-SU-2016:0434",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html"
},
{
"name" : "SUSE-SU-2015:2108",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html"
},
{
"name" : "SUSE-SU-2015:2339",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html"
},
{ {
"name": "SUSE-SU-2015:2350", "name": "SUSE-SU-2015:2350",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html"
}, },
{ {
"name" : "openSUSE-SU-2015:2232", "name": "SUSE-SU-2016:0434",
"refsource": "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html"
},
{
"name": "DSA-3364",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3364"
},
{
"name": "FEDORA-2015-16440",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168447.html"
}, },
{ {
"name": "SUSE-SU-2015:1727", "name": "SUSE-SU-2015:1727",
@ -183,29 +83,129 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html"
}, },
{ {
"name" : "USN-2777-1", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1263139",
"refsource" : "UBUNTU", "refsource": "CONFIRM",
"url" : "http://www.ubuntu.com/usn/USN-2777-1" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1263139"
}, },
{ {
"name" : "USN-2773-1", "name": "1034453",
"refsource" : "UBUNTU", "refsource": "SECTRACK",
"url" : "http://www.ubuntu.com/usn/USN-2773-1" "url": "http://www.securitytracker.com/id/1034453"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=74e98eb085889b0d2d4908f59f6e00026063014f",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=74e98eb085889b0d2d4908f59f6e00026063014f"
},
{
"name": "openSUSE-SU-2015:2232",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html"
},
{
"name": "SUSE-SU-2016:0380",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html"
},
{
"name": "SUSE-SU-2016:0354",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html"
},
{
"name": "SUSE-SU-2016:0335",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html"
},
{
"name": "SUSE-SU-2015:2339",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html"
},
{
"name": "SUSE-SU-2015:2108",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"name": "[oss-security] 20150914 CVE-2015-6937 - Linux kernel - NULL pointer dereference in net/rds/connection.c",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/09/14/3"
}, },
{ {
"name": "USN-2774-1", "name": "USN-2774-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2774-1" "url": "http://www.ubuntu.com/usn/USN-2774-1"
}, },
{
"name": "SUSE-SU-2016:0383",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html"
},
{
"name": "https://github.com/torvalds/linux/commit/74e98eb085889b0d2d4908f59f6e00026063014f",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/74e98eb085889b0d2d4908f59f6e00026063014f"
},
{
"name": "FEDORA-2015-16417",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167358.html"
},
{ {
"name": "76767", "name": "76767",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/76767" "url": "http://www.securityfocus.com/bid/76767"
}, },
{ {
"name" : "1034453", "name": "USN-2773-1",
"refsource" : "SECTRACK", "refsource": "UBUNTU",
"url" : "http://www.securitytracker.com/id/1034453" "url": "http://www.ubuntu.com/usn/USN-2773-1"
},
{
"name": "SUSE-SU-2016:0386",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html"
},
{
"name": "FEDORA-2015-16441",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168539.html"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name": "SUSE-SU-2016:2074",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html"
},
{
"name": "SUSE-SU-2016:0384",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html"
},
{
"name": "SUSE-SU-2016:0387",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html"
},
{
"name": "USN-2777-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2777-1"
},
{
"name": "SUSE-SU-2016:0381",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-7105", "ID": "CVE-2015-7105",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -63,44 +63,44 @@
"url": "https://support.apple.com/HT205637" "url": "https://support.apple.com/HT205637"
}, },
{ {
"name" : "https://support.apple.com/HT205640", "name": "1034344",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://support.apple.com/HT205640" "url": "http://www.securitytracker.com/id/1034344"
},
{
"name" : "https://support.apple.com/HT205641",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205641"
},
{
"name" : "APPLE-SA-2015-12-08-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Dec/msg00000.html"
},
{
"name" : "APPLE-SA-2015-12-08-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Dec/msg00001.html"
},
{
"name" : "APPLE-SA-2015-12-08-3",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
}, },
{ {
"name": "APPLE-SA-2015-12-08-4", "name": "APPLE-SA-2015-12-08-4",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00002.html" "url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00002.html"
}, },
{
"name": "APPLE-SA-2015-12-08-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
},
{ {
"name": "78719", "name": "78719",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/78719" "url": "http://www.securityfocus.com/bid/78719"
}, },
{ {
"name" : "1034344", "name": "APPLE-SA-2015-12-08-1",
"refsource" : "SECTRACK", "refsource": "APPLE",
"url" : "http://www.securitytracker.com/id/1034344" "url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00000.html"
},
{
"name": "https://support.apple.com/HT205641",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205641"
},
{
"name": "https://support.apple.com/HT205640",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205640"
},
{
"name": "APPLE-SA-2015-12-08-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00001.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2015-7435", "ID": "CVE-2015-7435",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-7951", "ID": "CVE-2015-7951",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2015-8963", "ID": "CVE-2015-8963",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -62,15 +62,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-11-01.html" "url": "http://source.android.com/security/bulletin/2016-11-01.html"
}, },
{
"name" : "https://github.com/torvalds/linux/commit/12ca6ad2e3a896256f086497a7c7406a547ee373",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/12ca6ad2e3a896256f086497a7c7406a547ee373"
},
{ {
"name": "94207", "name": "94207",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/94207" "url": "http://www.securityfocus.com/bid/94207"
},
{
"name": "https://github.com/torvalds/linux/commit/12ca6ad2e3a896256f086497a7c7406a547ee373",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/12ca6ad2e3a896256f086497a7c7406a547ee373"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-0014", "ID": "CVE-2016-0014",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21980233",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21980233"
},
{ {
"name": "ibm-tririga-cve20160345-info-disc(111786)", "name": "ibm-tririga-cve20160345-info-disc(111786)",
"refsource": "XF", "refsource": "XF",
"url": "http://exchange.xforce.ibmcloud.com/vulnerabilities/111786" "url": "http://exchange.xforce.ibmcloud.com/vulnerabilities/111786"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21980233",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21980233"
} }
] ]
} }

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "RHSA-2016:1424",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1424"
},
{
"name": "1035327",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035327"
},
{ {
"name": "[oss-security] 20160310 [ANNOUNCE] CVE-2016-0734: ActiveMQ Web Console - Clickjacking", "name": "[oss-security] 20160310 [ANNOUNCE] CVE-2016-0734: ActiveMQ Web Console - Clickjacking",
"refsource": "MLIST", "refsource": "MLIST",
@ -62,20 +72,10 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://activemq.apache.org/security-advisories.data/CVE-2016-0734-announcement.txt" "url": "http://activemq.apache.org/security-advisories.data/CVE-2016-0734-announcement.txt"
}, },
{
"name" : "RHSA-2016:1424",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1424"
},
{ {
"name": "84321", "name": "84321",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/84321" "url": "http://www.securityfocus.com/bid/84321"
},
{
"name" : "1035327",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035327"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-1129", "ID": "CVE-2016-1129",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
},
{ {
"name": "1035828", "name": "1035828",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035828" "url": "http://www.securitytracker.com/id/1035828"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2016-1174", "ID": "CVE-2016-1174",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://hiniarata.jp/news/archives/55",
"refsource" : "CONFIRM",
"url" : "https://hiniarata.jp/news/archives/55"
},
{ {
"name": "JVN#26627848", "name": "JVN#26627848",
"refsource": "JVN", "refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN26627848/index.html" "url": "http://jvn.jp/en/jp/JVN26627848/index.html"
}, },
{
"name": "https://hiniarata.jp/news/archives/55",
"refsource": "CONFIRM",
"url": "https://hiniarata.jp/news/archives/55"
},
{ {
"name": "JVNDB-2016-000043", "name": "JVNDB-2016-000043",
"refsource": "JVNDB", "refsource": "JVNDB",

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10725",
"refsource" : "CONFIRM",
"url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10725"
},
{ {
"name": "1035669", "name": "1035669",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035669" "url": "http://www.securitytracker.com/id/1035669"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10725",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10725"
} }
] ]
} }

View File

@ -53,34 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.videolan.org/security/sa1601.html", "name": "openSUSE-SU-2016:1651",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "http://www.videolan.org/security/sa1601.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00045.html"
},
{
"name": "1036009",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036009"
}, },
{ {
"name": "DSA-3598", "name": "DSA-3598",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3598" "url": "http://www.debian.org/security/2016/dsa-3598"
}, },
{
"name" : "GLSA-201701-39",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201701-39"
},
{
"name" : "openSUSE-SU-2016:1651",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00045.html"
},
{ {
"name": "90924", "name": "90924",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/90924" "url": "http://www.securityfocus.com/bid/90924"
}, },
{ {
"name" : "1036009", "name": "GLSA-201701-39",
"refsource" : "SECTRACK", "refsource": "GENTOO",
"url" : "http://www.securitytracker.com/id/1036009" "url": "https://security.gentoo.org/glsa/201701-39"
},
{
"name": "http://www.videolan.org/security/sa1601.html",
"refsource": "CONFIRM",
"url": "http://www.videolan.org/security/sa1601.html"
} }
] ]
} }

View File

@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://chromereleases.googleblog.com/2016/12/stable-channel-update-for-desktop.html",
"refsource" : "CONFIRM",
"url" : "https://chromereleases.googleblog.com/2016/12/stable-channel-update-for-desktop.html"
},
{
"name" : "https://crbug.com/654183",
"refsource" : "CONFIRM",
"url" : "https://crbug.com/654183"
},
{
"name" : "GLSA-201612-11",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201612-11"
},
{ {
"name": "RHSA-2016:2919", "name": "RHSA-2016:2919",
"refsource": "REDHAT", "refsource": "REDHAT",
@ -76,6 +61,21 @@
"name": "94633", "name": "94633",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/94633" "url": "http://www.securityfocus.com/bid/94633"
},
{
"name": "https://crbug.com/654183",
"refsource": "CONFIRM",
"url": "https://crbug.com/654183"
},
{
"name": "https://chromereleases.googleblog.com/2016/12/stable-channel-update-for-desktop.html",
"refsource": "CONFIRM",
"url": "https://chromereleases.googleblog.com/2016/12/stable-channel-update-for-desktop.html"
},
{
"name": "GLSA-201612-11",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201612-11"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-5337", "ID": "CVE-2016-5337",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,49 +53,49 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20160608 CVE Request Qemu: scsi: megasas: information leakage in megasas_ctrl_get_info", "name": "USN-3047-1",
"refsource" : "MLIST", "refsource": "UBUNTU",
"url" : "http://www.openwall.com/lists/oss-security/2016/06/08/3" "url": "http://www.ubuntu.com/usn/USN-3047-1"
},
{
"name" : "[oss-security] 20160608 Re: CVE Request Qemu: scsi: megasas: information leakage in megasas_ctrl_get_info",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/06/08/13"
},
{
"name" : "[qemu-devel] 20160607 [PULL 06/13] scsi: megasas: null terminate bios version buffer",
"refsource" : "MLIST",
"url" : "https://lists.gnu.org/archive/html/qemu-devel/2016-06/msg01969.html"
},
{
"name" : "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
}, },
{ {
"name": "http://git.qemu.org/?p=qemu.git;a=commit;h=844864fbae66935951529408831c2f22367a57b6", "name": "http://git.qemu.org/?p=qemu.git;a=commit;h=844864fbae66935951529408831c2f22367a57b6",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://git.qemu.org/?p=qemu.git;a=commit;h=844864fbae66935951529408831c2f22367a57b6" "url": "http://git.qemu.org/?p=qemu.git;a=commit;h=844864fbae66935951529408831c2f22367a57b6"
}, },
{
"name": "91097",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91097"
},
{ {
"name": "GLSA-201609-01", "name": "GLSA-201609-01",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201609-01" "url": "https://security.gentoo.org/glsa/201609-01"
}, },
{
"name" : "USN-3047-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3047-1"
},
{ {
"name": "USN-3047-2", "name": "USN-3047-2",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3047-2" "url": "http://www.ubuntu.com/usn/USN-3047-2"
}, },
{ {
"name" : "91097", "name": "[oss-security] 20160608 Re: CVE Request Qemu: scsi: megasas: information leakage in megasas_ctrl_get_info",
"refsource" : "BID", "refsource": "MLIST",
"url" : "http://www.securityfocus.com/bid/91097" "url": "http://www.openwall.com/lists/oss-security/2016/06/08/13"
},
{
"name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
},
{
"name": "[qemu-devel] 20160607 [PULL 06/13] scsi: megasas: null terminate bios version buffer",
"refsource": "MLIST",
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-06/msg01969.html"
},
{
"name": "[oss-security] 20160608 CVE Request Qemu: scsi: megasas: information leakage in megasas_ctrl_get_info",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/06/08/3"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5615", "ID": "CVE-2016-5615",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{ {
"name": "93763", "name": "93763",
"refsource": "BID", "refsource": "BID",
@ -66,6 +61,11 @@
"name": "1037048", "name": "1037048",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037048" "url": "http://www.securitytracker.com/id/1037048"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20160810 [CORE-2016-0006] - SAP CAR Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/539180/100/0/threaded"
},
{ {
"name": "40230", "name": "40230",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
@ -67,6 +62,21 @@
"refsource": "FULLDISC", "refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2016/Aug/46" "url": "http://seclists.org/fulldisclosure/2016/Aug/46"
}, },
{
"name": "92406",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92406"
},
{
"name": "https://www.onapsis.com/blog/denial-service-attacks-sap-security-notes-august-2016",
"refsource": "MISC",
"url": "https://www.onapsis.com/blog/denial-service-attacks-sap-security-notes-august-2016"
},
{
"name": "20160810 [CORE-2016-0006] - SAP CAR Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/539180/100/0/threaded"
},
{ {
"name": "http://packetstormsecurity.com/files/138284/SAP-CAR-Archive-Tool-Denial-Of-Service-Security-Bypass.html", "name": "http://packetstormsecurity.com/files/138284/SAP-CAR-Archive-Tool-Denial-Of-Service-Security-Bypass.html",
"refsource": "MISC", "refsource": "MISC",
@ -76,16 +86,6 @@
"name": "https://www.coresecurity.com/advisories/sap-car-multiple-vulnerabilities", "name": "https://www.coresecurity.com/advisories/sap-car-multiple-vulnerabilities",
"refsource": "MISC", "refsource": "MISC",
"url": "https://www.coresecurity.com/advisories/sap-car-multiple-vulnerabilities" "url": "https://www.coresecurity.com/advisories/sap-car-multiple-vulnerabilities"
},
{
"name" : "https://www.onapsis.com/blog/denial-service-attacks-sap-security-notes-august-2016",
"refsource" : "MISC",
"url" : "https://www.onapsis.com/blog/denial-service-attacks-sap-security-notes-august-2016"
},
{
"name" : "92406",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/92406"
} }
] ]
} }

View File

@ -138,15 +138,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20190306 Cisco NX-OS Software 802.1X Extensible Authentication Protocol over LAN Denial of Service Vulnerability",
"refsource" : "CISCO",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nx-os-lan-auth"
},
{ {
"name": "107325", "name": "107325",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/107325" "url": "http://www.securityfocus.com/bid/107325"
},
{
"name": "20190306 Cisco NX-OS Software 802.1X Extensible Authentication Protocol over LAN Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nx-os-lan-auth"
} }
] ]
}, },