"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 05:13:03 +00:00
parent 4f91917311
commit cfe1f7c408
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
66 changed files with 3528 additions and 3528 deletions

View File

@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "22298",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22298"
},
{
"name" : "32985",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/32985"
},
{ {
"name": "32986", "name": "32986",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/32986" "url": "http://osvdb.org/32986"
}, },
{
"name": "httpcommander-multiple-xss(31877)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31877"
},
{
"name": "22298",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22298"
},
{ {
"name": "23964", "name": "23964",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23964" "url": "http://secunia.com/advisories/23964"
}, },
{ {
"name" : "httpcommander-multiple-xss(31877)", "name": "32985",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31877" "url": "http://osvdb.org/32985"
} }
] ]
} }

View File

@ -52,30 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "24966",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24966"
},
{ {
"name": "http://docs.info.apple.com/article.html?artnum=305391", "name": "http://docs.info.apple.com/article.html?artnum=305391",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=305391" "url": "http://docs.info.apple.com/article.html?artnum=305391"
}, },
{
"name" : "APPLE-SA-2007-04-19",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html"
},
{
"name" : "TA07-109A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-109A.html"
},
{ {
"name": "23569", "name": "23569",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/23569" "url": "http://www.securityfocus.com/bid/23569"
}, },
{ {
"name" : "ADV-2007-1470", "name": "TA07-109A",
"refsource" : "VUPEN", "refsource": "CERT",
"url" : "http://www.vupen.com/english/advisories/2007/1470" "url": "http://www.us-cert.gov/cas/techalerts/TA07-109A.html"
}, },
{ {
"name": "34864", "name": "34864",
@ -88,9 +83,14 @@
"url": "http://www.securitytracker.com/id?1017939" "url": "http://www.securitytracker.com/id?1017939"
}, },
{ {
"name" : "24966", "name": "APPLE-SA-2007-04-19",
"refsource" : "SECUNIA", "refsource": "APPLE",
"url" : "http://secunia.com/advisories/24966" "url": "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html"
},
{
"name": "ADV-2007-1470",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1470"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070214 Multiple Vulnerabilities in Firewall Services Module", "name": "ADV-2007-0609",
"refsource" : "CISCO", "refsource": "VUPEN",
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2481.shtml" "url": "http://www.vupen.com/english/advisories/2007/0609"
}, },
{ {
"name": "22561", "name": "22561",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/22561" "url": "http://www.securityfocus.com/bid/22561"
}, },
{ {
"name" : "ADV-2007-0609", "name": "cisco-fwsm-acl-security-bypass(32521)",
"refsource" : "VUPEN", "refsource": "XF",
"url" : "http://www.vupen.com/english/advisories/2007/0609" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32521"
}, },
{ {
"name": "1017650", "name": "1017650",
@ -78,9 +78,9 @@
"url": "http://secunia.com/advisories/24172" "url": "http://secunia.com/advisories/24172"
}, },
{ {
"name" : "cisco-fwsm-acl-security-bypass(32521)", "name": "20070214 Multiple Vulnerabilities in Firewall Services Module",
"refsource" : "XF", "refsource": "CISCO",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32521" "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2481.shtml"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070608 EEYE: Yahoo Webcam ActiveX Controls Multiple Buffer Overflows",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/470861/100/0/threaded"
},
{ {
"name": "20070606 Yahoo 0day ActiveX Webcam Exploit", "name": "20070606 Yahoo 0day ActiveX Webcam Exploit",
"refsource": "FULLDISC", "refsource": "FULLDISC",
@ -68,64 +63,69 @@
"url": "https://www.exploit-db.com/exploits/4042" "url": "https://www.exploit-db.com/exploits/4042"
}, },
{ {
"name" : "http://research.eeye.com/html/advisories/published/AD20070608.html", "name": "24354",
"refsource" : "MISC", "refsource": "BID",
"url" : "http://research.eeye.com/html/advisories/published/AD20070608.html" "url": "http://www.securityfocus.com/bid/24354"
}, },
{ {
"name": "http://research.eeye.com/html/advisories/upcoming/20070605.html", "name": "http://research.eeye.com/html/advisories/upcoming/20070605.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://research.eeye.com/html/advisories/upcoming/20070605.html" "url": "http://research.eeye.com/html/advisories/upcoming/20070605.html"
}, },
{
"name" : "http://messenger.yahoo.com/security_update.php?id=060707",
"refsource" : "CONFIRM",
"url" : "http://messenger.yahoo.com/security_update.php?id=060707"
},
{ {
"name": "VU#949817", "name": "VU#949817",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/949817" "url": "http://www.kb.cert.org/vuls/id/949817"
}, },
{ {
"name" : "24354", "name": "http://messenger.yahoo.com/security_update.php?id=060707",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/24354" "url": "http://messenger.yahoo.com/security_update.php?id=060707"
},
{
"name" : "24341",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24341"
}, },
{ {
"name": "ADV-2007-2094", "name": "ADV-2007-2094",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2094" "url": "http://www.vupen.com/english/advisories/2007/2094"
}, },
{
"name": "25547",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25547"
},
{
"name": "20070608 EEYE: Yahoo Webcam ActiveX Controls Multiple Buffer Overflows",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/470861/100/0/threaded"
},
{ {
"name": "1018204", "name": "1018204",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1018204" "url": "http://securitytracker.com/id?1018204"
}, },
{
"name": "yahoo-webcam-upload-bo(34758)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34758"
},
{
"name": "24341",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24341"
},
{ {
"name": "1018203", "name": "1018203",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018203" "url": "http://www.securitytracker.com/id?1018203"
}, },
{
"name" : "25547",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25547"
},
{ {
"name": "2809", "name": "2809",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2809" "url": "http://securityreason.com/securityalert/2809"
}, },
{ {
"name" : "yahoo-webcam-upload-bo(34758)", "name": "http://research.eeye.com/html/advisories/published/AD20070608.html",
"refsource" : "XF", "refsource": "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34758" "url": "http://research.eeye.com/html/advisories/published/AD20070608.html"
} }
] ]
} }

View File

@ -62,25 +62,25 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-263.htm" "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-263.htm"
}, },
{
"name" : "24539",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24539"
},
{ {
"name": "38115", "name": "38115",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/38115" "url": "http://osvdb.org/38115"
}, },
{
"name": "avaya-cnonce-call-hijacking(34972)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34972"
},
{ {
"name": "25747", "name": "25747",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25747" "url": "http://secunia.com/advisories/25747"
}, },
{ {
"name" : "avaya-cnonce-call-hijacking(34972)", "name": "24539",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34972" "url": "http://www.securityfocus.com/bid/24539"
} }
] ]
} }

View File

@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070730 RFI ====> vBulletin v3.6.5", "name": "25141",
"refsource" : "BUGTRAQ", "refsource": "BID",
"url" : "http://www.securityfocus.com/archive/1/475105/100/0/threaded" "url": "http://www.securityfocus.com/bid/25141"
}, },
{ {
"name": "20070731 Re: RFI ====> vBulletin v3.6.5", "name": "20070731 Re: RFI ====> vBulletin v3.6.5",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/475151/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/475151/100/0/threaded"
}, },
{
"name" : "25141",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25141"
},
{ {
"name": "2941", "name": "2941",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2941" "url": "http://securityreason.com/securityalert/2941"
},
{
"name": "20070730 RFI ====> vBulletin v3.6.5",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/475105/100/0/threaded"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-4133", "ID": "CVE-2007-4133",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,65 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://tree.celinuxforum.org/gitstat/commit-detail.php?commit=856fc29505556cf263f3dcda2533cf3766c14ab6",
"refsource" : "CONFIRM",
"url" : "http://tree.celinuxforum.org/gitstat/commit-detail.php?commit=856fc29505556cf263f3dcda2533cf3766c14ab6"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.19-rc4",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.19-rc4"
},
{
"name" : "DSA-1381",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1381"
},
{
"name" : "DSA-1504",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1504"
},
{
"name" : "MDKSA-2007:216",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:216"
},
{
"name" : "MDVSA-2008:008",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:008"
},
{
"name" : "MDVSA-2008:105",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:105"
},
{ {
"name": "RHSA-2007:0940", "name": "RHSA-2007:0940",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0940.html" "url": "http://www.redhat.com/support/errata/RHSA-2007-0940.html"
}, },
{ {
"name" : "USN-558-1", "name": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.19-rc4",
"refsource" : "UBUNTU", "refsource": "CONFIRM",
"url" : "http://www.ubuntu.com/usn/usn-558-1" "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.19-rc4"
},
{
"name" : "USN-578-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-578-1"
},
{
"name" : "25904",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25904"
},
{
"name" : "oval:org.mitre.oval:def:10451",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10451"
}, },
{ {
"name": "27322", "name": "27322",
@ -123,24 +73,74 @@
"url": "http://secunia.com/advisories/26994" "url": "http://secunia.com/advisories/26994"
}, },
{ {
"name" : "28170", "name": "DSA-1504",
"refsource" : "SECUNIA", "refsource": "DEBIAN",
"url" : "http://secunia.com/advisories/28170" "url": "http://www.debian.org/security/2008/dsa-1504"
}, },
{ {
"name" : "28971", "name": "MDVSA-2008:008",
"refsource" : "SECUNIA", "refsource": "MANDRIVA",
"url" : "http://secunia.com/advisories/28971" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:008"
},
{
"name": "MDKSA-2007:216",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:216"
},
{
"name": "USN-558-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-558-1"
},
{
"name": "DSA-1381",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1381"
},
{
"name": "MDVSA-2008:105",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:105"
},
{
"name": "http://tree.celinuxforum.org/gitstat/commit-detail.php?commit=856fc29505556cf263f3dcda2533cf3766c14ab6",
"refsource": "CONFIRM",
"url": "http://tree.celinuxforum.org/gitstat/commit-detail.php?commit=856fc29505556cf263f3dcda2533cf3766c14ab6"
},
{
"name": "25904",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25904"
}, },
{ {
"name": "29058", "name": "29058",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29058" "url": "http://secunia.com/advisories/29058"
}, },
{
"name": "28971",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28971"
},
{
"name": "28170",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28170"
},
{ {
"name": "kernel-hugetlbfs-dos(36925)", "name": "kernel-hugetlbfs-dos(36925)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36925" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36925"
},
{
"name": "USN-578-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-578-1"
},
{
"name": "oval:org.mitre.oval:def:10451",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10451"
} }
] ]
} }

View File

@ -53,40 +53,40 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://pridels-team.blogspot.com/2007/08/storesprite-xss-vuln.html", "name": "storesprite-next-xss(35933)",
"refsource" : "MISC", "refsource": "XF",
"url" : "http://pridels-team.blogspot.com/2007/08/storesprite-xss-vuln.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35933"
},
{
"name" : "http://www.storesprite.com/forum/comments.php?DiscussionID=272&page=1#Item_0",
"refsource" : "CONFIRM",
"url" : "http://www.storesprite.com/forum/comments.php?DiscussionID=272&page=1#Item_0"
}, },
{ {
"name": "25266", "name": "25266",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/25266" "url": "http://www.securityfocus.com/bid/25266"
}, },
{
"name": "36460",
"refsource": "OSVDB",
"url": "http://osvdb.org/36460"
},
{
"name": "http://www.storesprite.com/forum/comments.php?DiscussionID=272&page=1#Item_0",
"refsource": "CONFIRM",
"url": "http://www.storesprite.com/forum/comments.php?DiscussionID=272&page=1#Item_0"
},
{ {
"name": "ADV-2007-2853", "name": "ADV-2007-2853",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2853" "url": "http://www.vupen.com/english/advisories/2007/2853"
}, },
{ {
"name" : "36458", "name": "http://pridels-team.blogspot.com/2007/08/storesprite-xss-vuln.html",
"refsource" : "OSVDB", "refsource": "MISC",
"url" : "http://osvdb.org/36458" "url": "http://pridels-team.blogspot.com/2007/08/storesprite-xss-vuln.html"
}, },
{ {
"name": "36459", "name": "36459",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/36459" "url": "http://osvdb.org/36459"
}, },
{
"name" : "36460",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/36460"
},
{ {
"name": "36461", "name": "36461",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -98,9 +98,9 @@
"url": "http://secunia.com/advisories/26408" "url": "http://secunia.com/advisories/26408"
}, },
{ {
"name" : "storesprite-next-xss(35933)", "name": "36458",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35933" "url": "http://osvdb.org/36458"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.ossec.net/en/attacking-loganalysis.html",
"refsource" : "MISC",
"url" : "http://www.ossec.net/en/attacking-loganalysis.html"
},
{ {
"name": "http://www.aczoom.com/tools/blockhosts/CHANGES", "name": "http://www.aczoom.com/tools/blockhosts/CHANGES",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.aczoom.com/tools/blockhosts/CHANGES" "url": "http://www.aczoom.com/tools/blockhosts/CHANGES"
}, },
{
"name": "http://www.ossec.net/en/attacking-loganalysis.html",
"refsource": "MISC",
"url": "http://www.ossec.net/en/attacking-loganalysis.html"
},
{ {
"name": "36515", "name": "36515",
"refsource": "OSVDB", "refsource": "OSVDB",

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.hitachi-support.com/security_e/vuls_e/HS07-027_e/index-e.html",
"refsource" : "CONFIRM",
"url" : "http://www.hitachi-support.com/security_e/vuls_e/HS07-027_e/index-e.html"
},
{
"name" : "25518",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25518"
},
{ {
"name": "ADV-2007-3033", "name": "ADV-2007-3033",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -76,6 +66,16 @@
"name": "hitachi-javadoc-xss(36393)", "name": "hitachi-javadoc-xss(36393)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36393" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36393"
},
{
"name": "25518",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25518"
},
{
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS07-027_e/index-e.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-027_e/index-e.html"
} }
] ]
} }

View File

@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-07-053.html",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-07-053.html"
},
{ {
"name": "25753", "name": "25753",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/25753" "url": "http://www.securityfocus.com/bid/25753"
}, },
{
"name" : "45906",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/45906"
},
{ {
"name": "1018727", "name": "1018727",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018727" "url": "http://www.securitytracker.com/id?1018727"
}, },
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-07-053.html",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-07-053.html"
},
{ {
"name": "isa-socks-information-disclosure(36715)", "name": "isa-socks-information-disclosure(36715)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36715" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36715"
},
{
"name": "45906",
"refsource": "OSVDB",
"url": "http://osvdb.org/45906"
} }
] ]
} }

View File

@ -52,40 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.fenrir.co.jp/grani/note.html",
"refsource" : "CONFIRM",
"url" : "http://www.fenrir.co.jp/grani/note.html"
},
{
"name" : "http://www.fenrir.co.jp/sleipnir/note.html",
"refsource" : "CONFIRM",
"url" : "http://www.fenrir.co.jp/sleipnir/note.html"
},
{ {
"name": "JVN#65427327", "name": "JVN#65427327",
"refsource": "JVN", "refsource": "JVN",
"url": "http://jvn.jp/jp/JVN%2365427327/index.html" "url": "http://jvn.jp/jp/JVN%2365427327/index.html"
}, },
{ {
"name" : "26418", "name": "sleipnir-search-xss(38441)",
"refsource" : "BID", "refsource": "XF",
"url" : "http://www.securityfocus.com/bid/26418" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38441"
}, },
{ {
"name": "38875", "name": "38875",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/38875" "url": "http://osvdb.org/38875"
}, },
{
"name": "26418",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26418"
},
{ {
"name": "38876", "name": "38876",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/38876" "url": "http://osvdb.org/38876"
}, },
{ {
"name" : "27655", "name": "http://www.fenrir.co.jp/grani/note.html",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/27655" "url": "http://www.fenrir.co.jp/grani/note.html"
}, },
{ {
"name": "27675", "name": "27675",
@ -93,9 +88,14 @@
"url": "http://secunia.com/advisories/27675" "url": "http://secunia.com/advisories/27675"
}, },
{ {
"name" : "sleipnir-search-xss(38441)", "name": "http://www.fenrir.co.jp/sleipnir/note.html",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38441" "url": "http://www.fenrir.co.jp/sleipnir/note.html"
},
{
"name": "27655",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27655"
} }
] ]
} }

View File

@ -53,25 +53,25 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20140818 Enigmail warning", "name": "openSUSE-SU-2014:1096",
"refsource" : "MLIST", "refsource": "SUSE",
"url" : "http://www.openwall.com/lists/oss-security/2014/08/18/2" "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00008.html"
}, },
{ {
"name" : "[oss-security] 20140821 Re: Enigmail warning", "name": "60779",
"refsource" : "MLIST", "refsource": "SECUNIA",
"url" : "http://www.openwall.com/lists/oss-security/2014/08/22/1" "url": "http://secunia.com/advisories/60779"
},
{
"name" : "http://sourceforge.net/p/enigmail/bugs/294/",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/p/enigmail/bugs/294/"
}, },
{ {
"name": "http://sourceforge.net/p/enigmail/forum/support/thread/3e7268a4/", "name": "http://sourceforge.net/p/enigmail/forum/support/thread/3e7268a4/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://sourceforge.net/p/enigmail/forum/support/thread/3e7268a4/" "url": "http://sourceforge.net/p/enigmail/forum/support/thread/3e7268a4/"
}, },
{
"name": "60887",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60887"
},
{ {
"name": "https://advisories.mageia.org/MGASA-2014-0421.html", "name": "https://advisories.mageia.org/MGASA-2014-0421.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -82,25 +82,25 @@
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201504-01" "url": "https://security.gentoo.org/glsa/201504-01"
}, },
{
"name": "http://sourceforge.net/p/enigmail/bugs/294/",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/p/enigmail/bugs/294/"
},
{ {
"name": "openSUSE-SU-2014:1086", "name": "openSUSE-SU-2014:1086",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00004.html" "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00004.html"
}, },
{ {
"name" : "openSUSE-SU-2014:1096", "name": "[oss-security] 20140821 Re: Enigmail warning",
"refsource" : "SUSE", "refsource": "MLIST",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-09/msg00008.html" "url": "http://www.openwall.com/lists/oss-security/2014/08/22/1"
}, },
{ {
"name" : "60779", "name": "[oss-security] 20140818 Enigmail warning",
"refsource" : "SECUNIA", "refsource": "MLIST",
"url" : "http://secunia.com/advisories/60779" "url": "http://www.openwall.com/lists/oss-security/2014/08/18/2"
},
{
"name" : "60887",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/60887"
}, },
{ {
"name": "61854", "name": "61854",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5587", "ID": "CVE-2014-5587",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "name": "VU#835585",
"refsource" : "MISC", "refsource": "CERT-VN",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" "url": "http://www.kb.cert.org/vuls/id/835585"
}, },
{ {
"name": "VU#582497", "name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
}, },
{ {
"name" : "VU#835585", "name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "CERT-VN", "refsource": "MISC",
"url" : "http://www.kb.cert.org/vuls/id/835585" "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5887", "ID": "CVE-2014-5887",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#490713", "name": "VU#490713",
"refsource": "CERT-VN", "refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497", "name": "VU#582497",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-2368", "ID": "CVE-2015-2368",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS15-069",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-069"
},
{ {
"name": "1032898", "name": "1032898",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032898" "url": "http://www.securitytracker.com/id/1032898"
},
{
"name": "MS15-069",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-069"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-2511", "ID": "CVE-2015-2511",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "38276", "name": "1033485",
"refsource" : "EXPLOIT-DB", "refsource": "SECTRACK",
"url" : "https://www.exploit-db.com/exploits/38276/" "url": "http://www.securitytracker.com/id/1033485"
}, },
{ {
"name": "MS15-097", "name": "MS15-097",
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-097" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-097"
}, },
{
"name": "38276",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/38276/"
},
{ {
"name": "76597", "name": "76597",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/76597" "url": "http://www.securityfocus.com/bid/76597"
},
{
"name" : "1033485",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1033485"
} }
] ]
} }

View File

@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20150327 CVE request: Erlang POODLE TLS vulnerability", "name": "USN-3571-1",
"refsource" : "MLIST", "refsource": "UBUNTU",
"url" : "http://openwall.com/lists/oss-security/2015/03/27/6" "url": "https://usn.ubuntu.com/3571-1/"
},
{
"name" : "[oss-security] 20150327 Re: CVE request: Erlang POODLE TLS vulnerability",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2015/03/27/9"
},
{
"name" : "https://www.imperialviolet.org/2014/12/08/poodleagain.html",
"refsource" : "MISC",
"url" : "https://www.imperialviolet.org/2014/12/08/poodleagain.html"
}, },
{ {
"name": "https://web.archive.org/web/20150905124006/http://www.erlang.org/news/85", "name": "https://web.archive.org/web/20150905124006/http://www.erlang.org/news/85",
@ -73,9 +63,14 @@
"url": "https://web.archive.org/web/20150905124006/http://www.erlang.org/news/85" "url": "https://web.archive.org/web/20150905124006/http://www.erlang.org/news/85"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "name": "https://www.imperialviolet.org/2014/12/08/poodleagain.html",
"refsource" : "CONFIRM", "refsource": "MISC",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" "url": "https://www.imperialviolet.org/2014/12/08/poodleagain.html"
},
{
"name": "73398",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/73398"
}, },
{ {
"name": "openSUSE-SU-2016:0523", "name": "openSUSE-SU-2016:0523",
@ -83,14 +78,19 @@
"url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00124.html" "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00124.html"
}, },
{ {
"name" : "USN-3571-1", "name": "[oss-security] 20150327 Re: CVE request: Erlang POODLE TLS vulnerability",
"refsource" : "UBUNTU", "refsource": "MLIST",
"url" : "https://usn.ubuntu.com/3571-1/" "url": "http://openwall.com/lists/oss-security/2015/03/27/9"
}, },
{ {
"name" : "73398", "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/73398" "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
},
{
"name": "[oss-security] 20150327 CVE request: Erlang POODLE TLS vulnerability",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2015/03/27/6"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2015-2863", "ID": "CVE-2015-2863",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-6310", "ID": "CVE-2015-6310",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20151002 Cisco Unified Communications Manager IM and Presence Service REST API Denial of Service Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=41242"
},
{ {
"name": "1033732", "name": "1033732",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033732" "url": "http://www.securitytracker.com/id/1033732"
},
{
"name": "20151002 Cisco Unified Communications Manager IM and Presence Service REST API Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=41242"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-6397", "ID": "CVE-2015-6397",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20160803 Cisco RV110W, RV130W, and RV215W Routers Static Credential Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160803-rv110_130w2"
},
{ {
"name": "92273", "name": "92273",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/92273" "url": "http://www.securityfocus.com/bid/92273"
}, },
{
"name": "20160803 Cisco RV110W, RV130W, and RV215W Routers Static Credential Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160803-rv110_130w2"
},
{ {
"name": "1036524", "name": "1036524",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20151005 Komento Joomla! component Persistent XSS", "name": "https://stackideas.com/changelog/komento?version=2.0.5",
"refsource" : "FULLDISC", "refsource": "CONFIRM",
"url" : "http://seclists.org/fulldisclosure/2015/Oct/11" "url": "https://stackideas.com/changelog/komento?version=2.0.5"
}, },
{ {
"name": "https://www.davidsopas.com/komento-joomla-component-persistent-xss/", "name": "https://www.davidsopas.com/komento-joomla-component-persistent-xss/",
@ -63,9 +63,9 @@
"url": "https://www.davidsopas.com/komento-joomla-component-persistent-xss/" "url": "https://www.davidsopas.com/komento-joomla-component-persistent-xss/"
}, },
{ {
"name" : "https://stackideas.com/changelog/komento?version=2.0.5", "name": "20151005 Komento Joomla! component Persistent XSS",
"refsource" : "CONFIRM", "refsource": "FULLDISC",
"url" : "https://stackideas.com/changelog/komento?version=2.0.5" "url": "http://seclists.org/fulldisclosure/2015/Oct/11"
} }
] ]
} }

View File

@ -61,15 +61,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21993206",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21993206"
},
{ {
"name": "94155", "name": "94155",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/94155" "url": "http://www.securityfocus.com/bid/94155"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg21993206",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21993206"
} }
] ]
} }

View File

@ -53,29 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://intothesymmetry.blogspot.com/2016/01/openssl-key-recovery-attack-on-dh-small.html", "name": "FEDORA-2016-527018d2ff",
"refsource" : "MISC", "refsource": "FEDORA",
"url" : "http://intothesymmetry.blogspot.com/2016/01/openssl-key-recovery-attack-on-dh-small.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176373.html"
},
{
"name" : "http://www.openssl.org/news/secadv/20160128.txt",
"refsource" : "CONFIRM",
"url" : "http://www.openssl.org/news/secadv/20160128.txt"
},
{
"name" : "https://git.openssl.org/?p=openssl.git;a=commit;h=878e2c5b13010329c203f309ed0c8f2113f85648",
"refsource" : "CONFIRM",
"url" : "https://git.openssl.org/?p=openssl.git;a=commit;h=878e2c5b13010329c203f309ed0c8f2113f85648"
},
{
"name" : "https://git.openssl.org/?p=openssl.git;a=commit;h=c5b831f21d0d29d1e517d139d9d101763f60c9a2",
"refsource" : "CONFIRM",
"url" : "https://git.openssl.org/?p=openssl.git;a=commit;h=c5b831f21d0d29d1e517d139d9d101763f60c9a2"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164821",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164821"
}, },
{ {
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
@ -83,19 +63,29 @@
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
}, },
{ {
"name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", "name": "1034849",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759" "url": "http://www.securitytracker.com/id/1034849"
}, },
{ {
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390893", "name": "https://git.openssl.org/?p=openssl.git;a=commit;h=c5b831f21d0d29d1e517d139d9d101763f60c9a2",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390893" "url": "https://git.openssl.org/?p=openssl.git;a=commit;h=c5b831f21d0d29d1e517d139d9d101763f60c9a2"
}, },
{ {
"name" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03724en_us", "name": "https://git.openssl.org/?p=openssl.git;a=commit;h=878e2c5b13010329c203f309ed0c8f2113f85648",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03724en_us" "url": "https://git.openssl.org/?p=openssl.git;a=commit;h=878e2c5b13010329c203f309ed0c8f2113f85648"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164821",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164821"
},
{
"name": "http://www.openssl.org/news/secadv/20160128.txt",
"refsource": "CONFIRM",
"url": "http://www.openssl.org/news/secadv/20160128.txt"
}, },
{ {
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
@ -103,15 +93,40 @@
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
}, },
{ {
"name" : "FEDORA-2016-527018d2ff", "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390893",
"refsource" : "FEDORA", "refsource": "CONFIRM",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176373.html" "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390893"
}, },
{ {
"name": "GLSA-201601-05", "name": "GLSA-201601-05",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201601-05" "url": "https://security.gentoo.org/glsa/201601-05"
}, },
{
"name": "http://intothesymmetry.blogspot.com/2016/01/openssl-key-recovery-attack-on-dh-small.html",
"refsource": "MISC",
"url": "http://intothesymmetry.blogspot.com/2016/01/openssl-key-recovery-attack-on-dh-small.html"
},
{
"name": "82233",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/82233"
},
{
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03724en_us",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03724en_us"
},
{
"name": "91787",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91787"
},
{
"name": "VU#257823",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/257823"
},
{ {
"name": "openSUSE-SU-2016:0637", "name": "openSUSE-SU-2016:0637",
"refsource": "SUSE", "refsource": "SUSE",
@ -123,24 +138,9 @@
"url": "http://www.ubuntu.com/usn/USN-2883-1" "url": "http://www.ubuntu.com/usn/USN-2883-1"
}, },
{ {
"name" : "VU#257823", "name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
"refsource" : "CERT-VN", "refsource": "CONFIRM",
"url" : "https://www.kb.cert.org/vuls/id/257823" "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"
},
{
"name" : "91787",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/91787"
},
{
"name" : "82233",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/82233"
},
{
"name" : "1034849",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034849"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20161226 Re: CVE requests for various ImageMagick issues", "name": "https://github.com/ImageMagick/ImageMagick/commit/10b3823a7619ed22d42764733eb052c4159bc8c1",
"refsource" : "MLIST", "refsource": "CONFIRM",
"url" : "http://www.openwall.com/lists/oss-security/2016/12/26/9" "url": "https://github.com/ImageMagick/ImageMagick/commit/10b3823a7619ed22d42764733eb052c4159bc8c1"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1410465", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1410465",
@ -63,9 +63,9 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1410465" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1410465"
}, },
{ {
"name" : "https://github.com/ImageMagick/ImageMagick/commit/10b3823a7619ed22d42764733eb052c4159bc8c1", "name": "[oss-security] 20161226 Re: CVE requests for various ImageMagick issues",
"refsource" : "CONFIRM", "refsource": "MLIST",
"url" : "https://github.com/ImageMagick/ImageMagick/commit/10b3823a7619ed22d42764733eb052c4159bc8c1" "url": "http://www.openwall.com/lists/oss-security/2016/12/26/9"
}, },
{ {
"name": "95190", "name": "95190",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4172", "ID": "CVE-2016-4172",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html"
},
{
"name" : "RHSA-2016:1423",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1423"
},
{ {
"name": "SUSE-SU-2016:1826", "name": "SUSE-SU-2016:1826",
"refsource": "SUSE", "refsource": "SUSE",
@ -77,6 +67,16 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/91725" "url": "http://www.securityfocus.com/bid/91725"
}, },
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html"
},
{
"name": "RHSA-2016:1423",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1423"
},
{ {
"name": "1036280", "name": "1036280",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://support.cybozu.com/ja-jp/article/9441" "url": "https://support.cybozu.com/ja-jp/article/9441"
}, },
{
"name" : "JVN#13218253",
"refsource" : "JVN",
"url" : "https://jvn.jp/en/jp/JVN13218253/index.html"
},
{ {
"name": "94965", "name": "94965",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/94965" "url": "http://www.securityfocus.com/bid/94965"
},
{
"name": "JVN#13218253",
"refsource": "JVN",
"url": "https://jvn.jp/en/jp/JVN13218253/index.html"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-9503", "ID": "CVE-2016-9503",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {