"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 21:37:05 +00:00
parent 972b850b38
commit d5892e804a
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
62 changed files with 3782 additions and 3782 deletions

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS99-057",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-057"
},
{ {
"name": "Q248185", "name": "Q248185",
"refsource": "MSKB", "refsource": "MSKB",
"url": "http://support.microsoft.com/default.aspx?scid=kb;[LN];Q248185" "url": "http://support.microsoft.com/default.aspx?scid=kb;[LN];Q248185"
}, },
{
"name": "MS99-057",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-057"
},
{ {
"name": "875", "name": "875",
"refsource": "BID", "refsource": "BID",

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.securiteam.com/exploits/Netscape_4_7_and_earlier_vulnerable_to__Huge_Key__DoS.html",
"refsource" : "MISC",
"url" : "http://www.securiteam.com/exploits/Netscape_4_7_and_earlier_vulnerable_to__Huge_Key__DoS.html"
},
{ {
"name": "netscape-huge-key-dos(3436)", "name": "netscape-huge-key-dos(3436)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/3436" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/3436"
},
{
"name": "http://www.securiteam.com/exploits/Netscape_4_7_and_earlier_vulnerable_to__Huge_Key__DoS.html",
"refsource": "MISC",
"url": "http://www.securiteam.com/exploits/Netscape_4_7_and_earlier_vulnerable_to__Huge_Key__DoS.html"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "MS99-039", "name": "iis-unresolved-domain-access(3306)",
"refsource" : "MS", "refsource": "XF",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-039" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/3306"
}, },
{ {
"name": "241562", "name": "241562",
@ -68,9 +68,9 @@
"url": "http://www.securityfocus.com/bid/657" "url": "http://www.securityfocus.com/bid/657"
}, },
{ {
"name" : "iis-unresolved-domain-access(3306)", "name": "MS99-039",
"refsource" : "XF", "refsource": "MS",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/3306" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-039"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "773",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/773"
},
{ {
"name": "19991104 Eserv 2.50 Web interface Server Directory Traversal Vulnerability", "name": "19991104 Eserv 2.50 Web interface Server Directory Traversal Vulnerability",
"refsource": "NTBUGTRAQ", "refsource": "NTBUGTRAQ",
@ -61,11 +66,6 @@
"name": "19991104 Eserv 2.50 Web interface Server Directory Traversal Vulnerability", "name": "19991104 Eserv 2.50 Web interface Server Directory Traversal Vulnerability",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=94183041514522&w=2" "url": "http://marc.info/?l=bugtraq&m=94183041514522&w=2"
},
{
"name" : "773",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/773"
} }
] ]
} }

View File

@ -52,15 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "RHSA-2000:045",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2000-045.html"
},
{ {
"name": "20000322 gpm-root", "name": "20000322 gpm-root",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-03/0242.html" "url": "http://archives.neohapsis.com/archives/bugtraq/2000-03/0242.html"
}, },
{ {
"name" : "20000405 Security hole in gpm < 1.18.1", "name": "1069",
"refsource" : "SUSE", "refsource": "BID",
"url" : "http://www.novell.com/linux/security/advisories/suse_security_announce_45.html" "url": "http://www.securityfocus.com/bid/1069"
}, },
{ {
"name": "RHSA-2000:009", "name": "RHSA-2000:009",
@ -68,14 +73,9 @@
"url": "http://www.redhat.com/support/errata/RHSA-2000-009.html" "url": "http://www.redhat.com/support/errata/RHSA-2000-009.html"
}, },
{ {
"name" : "RHSA-2000:045", "name": "20000405 Security hole in gpm < 1.18.1",
"refsource" : "REDHAT", "refsource": "SUSE",
"url" : "http://www.redhat.com/support/errata/RHSA-2000-045.html" "url": "http://www.novell.com/linux/security/advisories/suse_security_announce_45.html"
},
{
"name" : "1069",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/1069"
} }
] ]
} }

View File

@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20000324 AnalogX SimpleServer 1.03 Remote Crash\" at:",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/templates/archive.pike?list=1&msg=web-5645555@post2.rnci.com"
},
{ {
"name": "http://www.analogx.com/contents/download/network/sswww.htm", "name": "http://www.analogx.com/contents/download/network/sswww.htm",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.analogx.com/contents/download/network/sswww.htm" "url": "http://www.analogx.com/contents/download/network/sswww.htm"
}, },
{
"name": "1265",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/1265"
},
{ {
"name": "simpleserver-exception-dos(4189)", "name": "simpleserver-exception-dos(4189)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4189" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4189"
}, },
{
"name": "20000324 AnalogX SimpleServer 1.03 Remote Crash\" at:",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/templates/archive.pike?list=1&msg=web-5645555@post2.rnci.com"
},
{ {
"name": "1076", "name": "1076",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/1076" "url": "http://www.securityfocus.com/bid/1076"
},
{
"name" : "1265",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/1265"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20000703 Remote DoS Attack in LocalWEB HTTP Server 1.2.0 Vulnerability", "name": "localweb-get-bo(4896)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-07-8&msg=NCBBKFKDOLAGKIAPMILPCEIHCFAA.labs@ussrback.com" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4896"
}, },
{ {
"name": "1423", "name": "1423",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/1423" "url": "http://www.securityfocus.com/bid/1423"
}, },
{ {
"name" : "localweb-get-bo(4896)", "name": "20000703 Remote DoS Attack in LocalWEB HTTP Server 1.2.0 Vulnerability",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/4896" "url": "http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-07-8&msg=NCBBKFKDOLAGKIAPMILPCEIHCFAA.labs@ussrback.com"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20000829 News Publisher CGI Vulnerability", "name": "news-publisher-add-author(5169)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/templates/archive.pike?list=1&msg=003301c0123b$18f8c1a0$953b29d4@e8s9s4" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5169"
}, },
{ {
"name": "1621", "name": "1621",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/1621" "url": "http://www.securityfocus.com/bid/1621"
}, },
{ {
"name" : "news-publisher-add-author(5169)", "name": "20000829 News Publisher CGI Vulnerability",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5169" "url": "http://www.securityfocus.com/templates/archive.pike?list=1&msg=003301c0123b$18f8c1a0$953b29d4@e8s9s4"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20000922 [ no subject ]",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/84901"
},
{
"name" : "20001031 FW: Pine 4.30 now available",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-10/0441.html"
},
{ {
"name": "FreeBSD-SA-00:59", "name": "FreeBSD-SA-00:59",
"refsource": "FREEBSD", "refsource": "FREEBSD",
@ -73,15 +63,25 @@
"url": "http://www.redhat.com/support/errata/RHSA-2000-102.html" "url": "http://www.redhat.com/support/errata/RHSA-2000-102.html"
}, },
{ {
"name" : "MDKSA-2000:073", "name": "20001031 FW: Pine 4.30 now available",
"refsource" : "MANDRAKE", "refsource": "BUGTRAQ",
"url" : "http://www.linux-mandrake.com/en/security/MDKSA-2000-073.php3" "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0441.html"
}, },
{ {
"name": "1709", "name": "1709",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/1709" "url": "http://www.securityfocus.com/bid/1709"
}, },
{
"name": "20000922 [ no subject ]",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/84901"
},
{
"name": "MDKSA-2000:073",
"refsource": "MANDRAKE",
"url": "http://www.linux-mandrake.com/en/security/MDKSA-2000-073.php3"
},
{ {
"name": "pine-check-mail-bo(5283)", "name": "pine-check-mail-bo(5283)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20001008 Security Advisory: Bytes Interactive's Web Shopper (shopper.cgi) Directory Traversal Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-10/0120.html"
},
{ {
"name": "1776", "name": "1776",
"refsource": "BID", "refsource": "BID",
@ -66,6 +61,11 @@
"name": "web-shopper-directory-traversal(5351)", "name": "web-shopper-directory-traversal(5351)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5351" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5351"
},
{
"name": "20001008 Security Advisory: Bytes Interactive's Web Shopper (shopper.cgi) Directory Traversal Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0120.html"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "shambala-password-plaintext(5346)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5346"
},
{ {
"name": "20001009 Shambala 4.5 vulnerability", "name": "20001009 Shambala 4.5 vulnerability",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -61,11 +66,6 @@
"name": "1771", "name": "1771",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/1771" "url": "http://www.securityfocus.com/bid/1771"
},
{
"name" : "shambala-password-plaintext(5346)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5346"
} }
] ]
} }

View File

@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20001102 Mantrap By Recourse Technologies - Fate Advisory (11-01-00)",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-11/0041.html"
},
{
"name" : "20001107 Vendor Response Re: Mantrap Advisory Vendor Followup - Fate Research Labs",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-11/0100.html"
},
{
"name" : "1913",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/1913"
},
{ {
"name": "20001105 Mantrap Advisory Vendor Followup - Fate Research Labs", "name": "20001105 Mantrap Advisory Vendor Followup - Fate Research Labs",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -76,6 +61,21 @@
"name": "mantrap-dir-dos(5528)", "name": "mantrap-dir-dos(5528)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5528" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5528"
},
{
"name": "1913",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/1913"
},
{
"name": "20001102 Mantrap By Recourse Technologies - Fate Advisory (11-01-00)",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-11/0041.html"
},
{
"name": "20001107 Vendor Response Re: Mantrap Advisory Vendor Followup - Fate Research Labs",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-11/0100.html"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "http://www.symantec.com/avcenter/reference/Vista_Network_Attack_Surface_RTM.pdf",
"refsource": "MISC",
"url": "http://www.symantec.com/avcenter/reference/Vista_Network_Attack_Surface_RTM.pdf"
},
{ {
"name": "20070313 New report on Windows Vista network attack surface", "name": "20070313 New report on Windows Vista network attack surface",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -63,9 +68,9 @@
"url": "http://www.securityfocus.com/archive/1/464617/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/464617/100/0/threaded"
}, },
{ {
"name" : "http://www.symantec.com/avcenter/reference/Vista_Network_Attack_Surface_RTM.pdf", "name": "33663",
"refsource" : "MISC", "refsource": "OSVDB",
"url" : "http://www.symantec.com/avcenter/reference/Vista_Network_Attack_Surface_RTM.pdf" "url": "http://osvdb.org/33663"
}, },
{ {
"name": "http://www.symantec.com/enterprise/security_response/weblog/2007/04/microsofts_inaccurate_teredo_d.html", "name": "http://www.symantec.com/enterprise/security_response/weblog/2007/04/microsofts_inaccurate_teredo_d.html",
@ -76,11 +81,6 @@
"name": "23279", "name": "23279",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/23279" "url": "http://www.securityfocus.com/bid/23279"
},
{
"name" : "33663",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33663"
} }
] ]
} }

View File

@ -52,20 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "3515",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3515"
},
{ {
"name": "23019", "name": "23019",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/23019" "url": "http://www.securityfocus.com/bid/23019"
}, },
{ {
"name" : "ADV-2007-1016", "name": "24563",
"refsource" : "VUPEN", "refsource": "SECUNIA",
"url" : "http://www.vupen.com/english/advisories/2007/1016" "url": "http://secunia.com/advisories/24563"
}, },
{ {
"name": "34283", "name": "34283",
@ -73,9 +68,14 @@
"url": "http://osvdb.org/34283" "url": "http://osvdb.org/34283"
}, },
{ {
"name" : "24563", "name": "3515",
"refsource" : "SECUNIA", "refsource": "EXPLOIT-DB",
"url" : "http://secunia.com/advisories/24563" "url": "https://www.exploit-db.com/exploits/3515"
},
{
"name": "ADV-2007-1016",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1016"
}, },
{ {
"name": "scriptmagixlyrics-index-sql-injection(33056)", "name": "scriptmagixlyrics-index-sql-injection(33056)",

View File

@ -52,6 +52,76 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "23145",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23145"
},
{
"name": "25056",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25056"
},
{
"name": "DSA-1283",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1283"
},
{
"name": "oval:org.mitre.oval:def:10951",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10951"
},
{
"name": "GLSA-200705-19",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200705-19.xml"
},
{
"name": "1017946",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017946"
},
{
"name": "RHSA-2007:0162",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0162.html"
},
{
"name": "25062",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25062"
},
{
"name": "php-mailfunction-header-injection(33516)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33516"
},
{
"name": "MDKSA-2007:090",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:090"
},
{
"name": "USN-455-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-455-1"
},
{
"name": "24909",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24909"
},
{
"name": "MDKSA-2007:087",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:087"
},
{
"name": "DSA-1282",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1282"
},
{ {
"name": "http://www.php-security.org/MOPB/MOPB-34-2007.html", "name": "http://www.php-security.org/MOPB/MOPB-34-2007.html",
"refsource": "MISC", "refsource": "MISC",
@ -63,114 +133,24 @@
"url": "http://us2.php.net/releases/5_2_2.php" "url": "http://us2.php.net/releases/5_2_2.php"
}, },
{ {
"name" : "DSA-1282", "name": "24924",
"refsource" : "DEBIAN", "refsource": "SECUNIA",
"url" : "http://www.debian.org/security/2007/dsa-1282" "url": "http://secunia.com/advisories/24924"
},
{
"name" : "DSA-1283",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1283"
},
{
"name" : "GLSA-200705-19",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200705-19.xml"
},
{
"name" : "MDKSA-2007:087",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:087"
},
{
"name" : "MDKSA-2007:088",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:088"
},
{
"name" : "MDKSA-2007:089",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:089"
},
{
"name" : "MDKSA-2007:090",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:090"
}, },
{ {
"name": "RHSA-2007:0155", "name": "RHSA-2007:0155",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0155.html" "url": "http://rhn.redhat.com/errata/RHSA-2007-0155.html"
}, },
{
"name" : "RHSA-2007:0153",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0153.html"
},
{
"name" : "RHSA-2007:0162",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0162.html"
},
{
"name" : "SUSE-SA:2007:032",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_32_php.html"
},
{
"name" : "USN-455-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-455-1"
},
{
"name" : "23145",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23145"
},
{
"name" : "oval:org.mitre.oval:def:10951",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10951"
},
{
"name" : "1017946",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017946"
},
{
"name" : "24924",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24924"
},
{ {
"name": "24965", "name": "24965",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24965" "url": "http://secunia.com/advisories/24965"
}, },
{ {
"name" : "25025", "name": "MDKSA-2007:089",
"refsource" : "SECUNIA", "refsource": "MANDRIVA",
"url" : "http://secunia.com/advisories/25025" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:089"
},
{
"name" : "25062",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25062"
},
{
"name" : "25057",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25057"
},
{
"name" : "24909",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24909"
},
{
"name" : "25056",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25056"
}, },
{ {
"name": "25445", "name": "25445",
@ -178,9 +158,29 @@
"url": "http://secunia.com/advisories/25445" "url": "http://secunia.com/advisories/25445"
}, },
{ {
"name" : "php-mailfunction-header-injection(33516)", "name": "25057",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33516" "url": "http://secunia.com/advisories/25057"
},
{
"name": "SUSE-SA:2007:032",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_32_php.html"
},
{
"name": "25025",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25025"
},
{
"name": "MDKSA-2007:088",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:088"
},
{
"name": "RHSA-2007:0153",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0153.html"
} }
] ]
} }

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "2538",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2538"
},
{
"name": "23313",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23313"
},
{ {
"name": "20070404 CYBSEC Security Pre-Advisory: SAP RFC_START_PROGRAM RFC Function Multiple Vulnerabilities", "name": "20070404 CYBSEC Security Pre-Advisory: SAP RFC_START_PROGRAM RFC Function Multiple Vulnerabilities",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -62,25 +72,15 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_RFC_START_PROGRAM_RFC_Function_Multiple_Vulnerabilities.pdf" "url": "http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_RFC_START_PROGRAM_RFC_Function_Multiple_Vulnerabilities.pdf"
}, },
{
"name" : "23313",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23313"
},
{
"name" : "ADV-2007-1270",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1270"
},
{ {
"name": "24722", "name": "24722",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24722" "url": "http://secunia.com/advisories/24722"
}, },
{ {
"name" : "2538", "name": "ADV-2007-1270",
"refsource" : "SREASON", "refsource": "VUPEN",
"url" : "http://securityreason.com/securityalert/2538" "url": "http://www.vupen.com/english/advisories/2007/1270"
}, },
{ {
"name": "sap-rfc-startprogram-information-disclosure(33422)", "name": "sap-rfc-startprogram-information-disclosure(33422)",

View File

@ -52,20 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20071006 idmos-phoenix cms Remote File inclusion",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/481682/100/0/threaded"
},
{ {
"name": "4495", "name": "4495",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4495" "url": "https://www.exploit-db.com/exploits/4495"
}, },
{ {
"name" : "ADV-2007-3433", "name": "20071006 idmos-phoenix cms Remote File inclusion",
"refsource" : "VUPEN", "refsource": "BUGTRAQ",
"url" : "http://www.vupen.com/english/advisories/2007/3433" "url": "http://www.securityfocus.com/archive/1/481682/100/0/threaded"
},
{
"name": "3205",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3205"
}, },
{ {
"name": "38633", "name": "38633",
@ -73,9 +73,9 @@
"url": "http://osvdb.org/38633" "url": "http://osvdb.org/38633"
}, },
{ {
"name" : "3205", "name": "ADV-2007-3433",
"refsource" : "SREASON", "refsource": "VUPEN",
"url" : "http://securityreason.com/securityalert/3205" "url": "http://www.vupen.com/english/advisories/2007/3433"
}, },
{ {
"name": "idmos-aural-file-include(36994)", "name": "idmos-aural-file-include(36994)",

View File

@ -52,31 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20071017 Oracle RDBMS TNS Data packet DoS",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/482424/100/0/threaded"
},
{ {
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html", "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html" "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html"
}, },
{
"name" : "HPSBMA02133",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
},
{
"name" : "SSRT061201",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
},
{
"name" : "TA07-290A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-290A.html"
},
{ {
"name": "26108", "name": "26108",
"refsource": "BID", "refsource": "BID",
@ -87,30 +67,50 @@
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3524" "url": "http://www.vupen.com/english/advisories/2007/3524"
}, },
{
"name": "20071017 Oracle RDBMS TNS Data packet DoS",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/482424/100/0/threaded"
},
{ {
"name": "ADV-2007-3626", "name": "ADV-2007-3626",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3626" "url": "http://www.vupen.com/english/advisories/2007/3626"
}, },
{
"name": "TA07-290A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-290A.html"
},
{
"name": "3244",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3244"
},
{
"name": "SSRT061201",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
},
{
"name": "HPSBMA02133",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
},
{ {
"name": "1018823", "name": "1018823",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018823" "url": "http://www.securitytracker.com/id?1018823"
}, },
{
"name" : "27251",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27251"
},
{ {
"name": "27409", "name": "27409",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27409" "url": "http://secunia.com/advisories/27409"
}, },
{ {
"name" : "3244", "name": "27251",
"refsource" : "SREASON", "refsource": "SECUNIA",
"url" : "http://securityreason.com/securityalert/3244" "url": "http://secunia.com/advisories/27251"
} }
] ]
} }

View File

@ -58,9 +58,9 @@
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg21261095" "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21261095"
}, },
{ {
"name" : "26176", "name": "domino-ca-password-disclosure(37372)",
"refsource" : "BID", "refsource": "XF",
"url" : "http://www.securityfocus.com/bid/26176" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37372"
}, },
{ {
"name": "ADV-2007-3598", "name": "ADV-2007-3598",
@ -72,15 +72,15 @@
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/40952" "url": "http://osvdb.org/40952"
}, },
{
"name": "26176",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26176"
},
{ {
"name": "27321", "name": "27321",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27321" "url": "http://secunia.com/advisories/27321"
},
{
"name" : "domino-ca-password-disclosure(37372)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/37372"
} }
] ]
} }

View File

@ -62,15 +62,15 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/26416" "url": "http://www.securityfocus.com/bid/26416"
}, },
{
"name" : "ADV-2007-3904",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3904"
},
{ {
"name": "patbbcode-bbcodesource-file-include(38425)", "name": "patbbcode-bbcodesource-file-include(38425)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38425" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38425"
},
{
"name": "ADV-2007-3904",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3904"
} }
] ]
} }

View File

@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://blog.fuzzing-project.org/11-Read-heap-overflow-invalid-memory-access-in-Wireshark-TFPA-0072015.html",
"refsource" : "MISC",
"url" : "https://blog.fuzzing-project.org/11-Read-heap-overflow-invalid-memory-access-in-Wireshark-TFPA-0072015.html"
},
{
"name" : "http://www.wireshark.org/security/wnpa-sec-2015-18.html",
"refsource" : "CONFIRM",
"url" : "http://www.wireshark.org/security/wnpa-sec-2015-18.html"
},
{ {
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11188", "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11188",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11188" "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11188"
}, },
{
"name" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=b3b1f7c3aa2233a147294bad833b748d38fba84d",
"refsource" : "CONFIRM",
"url" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=b3b1f7c3aa2233a147294bad833b748d38fba84d"
},
{ {
"name": "DSA-3277", "name": "DSA-3277",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3277" "url": "http://www.debian.org/security/2015/dsa-3277"
}, },
{
"name": "74630",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/74630"
},
{
"name": "http://www.wireshark.org/security/wnpa-sec-2015-18.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2015-18.html"
},
{
"name": "https://blog.fuzzing-project.org/11-Read-heap-overflow-invalid-memory-access-in-Wireshark-TFPA-0072015.html",
"refsource": "MISC",
"url": "https://blog.fuzzing-project.org/11-Read-heap-overflow-invalid-memory-access-in-Wireshark-TFPA-0072015.html"
},
{ {
"name": "GLSA-201510-03", "name": "GLSA-201510-03",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201510-03" "url": "https://security.gentoo.org/glsa/201510-03"
}, },
{ {
"name" : "74630", "name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=b3b1f7c3aa2233a147294bad833b748d38fba84d",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/74630" "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=b3b1f7c3aa2233a147294bad833b748d38fba84d"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2015-3876", "ID": "CVE-2015-3876",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://twitter.com/4Dgifts/statuses/649589185792339968", "name": "1033725",
"refsource" : "MISC", "refsource": "SECTRACK",
"url" : "http://twitter.com/4Dgifts/statuses/649589185792339968" "url": "http://www.securitytracker.com/id/1033725"
}, },
{ {
"name": "https://code.google.com/p/android/issues/detail?id=182386", "name": "https://code.google.com/p/android/issues/detail?id=182386",
@ -63,9 +63,9 @@
"url": "https://code.google.com/p/android/issues/detail?id=182386" "url": "https://code.google.com/p/android/issues/detail?id=182386"
}, },
{ {
"name" : "1033725", "name": "http://twitter.com/4Dgifts/statuses/649589185792339968",
"refsource" : "SECTRACK", "refsource": "MISC",
"url" : "http://www.securitytracker.com/id/1033725" "url": "http://twitter.com/4Dgifts/statuses/649589185792339968"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-4883", "ID": "CVE-2015-4883",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,31 +52,51 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "SUSE-SU-2015:2182",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"
},
{
"name": "77161",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/77161"
},
{
"name": "USN-2784-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2784-1"
},
{
"name": "openSUSE-SU-2015:1905",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"
},
{
"name": "SUSE-SU-2015:2192",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"
},
{
"name": "openSUSE-SU-2015:1906",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"
},
{
"name": "RHSA-2015:2507",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html"
},
{
"name": "RHSA-2015:1928",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html"
},
{ {
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
}, },
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"name" : "DSA-3381",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3381"
},
{
"name" : "GLSA-201603-11",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201603-11"
},
{
"name" : "GLSA-201603-14",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201603-14"
},
{ {
"name": "RHSA-2016:1430", "name": "RHSA-2016:1430",
"refsource": "REDHAT", "refsource": "REDHAT",
@ -87,65 +107,15 @@
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html"
}, },
{
"name" : "RHSA-2015:2507",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2507.html"
},
{
"name" : "RHSA-2015:2508",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2508.html"
},
{ {
"name": "RHSA-2015:2509", "name": "RHSA-2015:2509",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html"
}, },
{ {
"name" : "RHSA-2015:2518", "name": "1033884",
"refsource" : "REDHAT", "refsource": "SECTRACK",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2518.html" "url": "http://www.securitytracker.com/id/1033884"
},
{
"name" : "RHSA-2015:1919",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1919.html"
},
{
"name" : "RHSA-2015:1920",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1920.html"
},
{
"name" : "RHSA-2015:1921",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1921.html"
},
{
"name" : "RHSA-2015:1926",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1926.html"
},
{
"name" : "RHSA-2015:1927",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1927.html"
},
{
"name" : "RHSA-2015:1928",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1928.html"
},
{
"name" : "SUSE-SU-2016:0113",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"
},
{
"name" : "openSUSE-SU-2016:0270",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
}, },
{ {
"name": "SUSE-SU-2015:2166", "name": "SUSE-SU-2015:2166",
@ -153,39 +123,24 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"
}, },
{ {
"name" : "SUSE-SU-2015:2168", "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
}, },
{ {
"name" : "SUSE-SU-2015:2182", "name": "openSUSE-SU-2016:0270",
"refsource": "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
}, },
{ {
"name" : "SUSE-SU-2015:2192", "name": "RHSA-2015:1919",
"refsource" : "SUSE", "refsource": "REDHAT",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-1919.html"
}, },
{ {
"name" : "SUSE-SU-2015:2216", "name": "GLSA-201603-11",
"refsource" : "SUSE", "refsource": "GENTOO",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" "url": "https://security.gentoo.org/glsa/201603-11"
},
{
"name" : "SUSE-SU-2015:2268",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"
},
{
"name" : "SUSE-SU-2015:1874",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"
},
{
"name" : "SUSE-SU-2015:1875",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"
}, },
{ {
"name": "openSUSE-SU-2015:1902", "name": "openSUSE-SU-2015:1902",
@ -193,39 +148,84 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"
}, },
{ {
"name" : "openSUSE-SU-2015:1905", "name": "RHSA-2015:1920",
"refsource" : "SUSE", "refsource": "REDHAT",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-1920.html"
}, },
{ {
"name" : "openSUSE-SU-2015:1906", "name": "RHSA-2015:2518",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2518.html"
},
{
"name": "GLSA-201603-14",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201603-14"
},
{
"name": "SUSE-SU-2015:2216",
"refsource": "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"
},
{
"name": "RHSA-2015:1927",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html"
}, },
{ {
"name": "openSUSE-SU-2015:1971", "name": "openSUSE-SU-2015:1971",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"
}, },
{
"name": "SUSE-SU-2015:2268",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"
},
{
"name": "SUSE-SU-2015:2168",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"
},
{
"name": "RHSA-2015:1921",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1921.html"
},
{
"name": "SUSE-SU-2015:1874",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"
},
{
"name": "DSA-3381",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3381"
},
{
"name": "RHSA-2015:1926",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html"
},
{
"name": "SUSE-SU-2015:1875",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"
},
{
"name": "RHSA-2015:2508",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2508.html"
},
{
"name": "SUSE-SU-2016:0113",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"
},
{ {
"name": "USN-2827-1", "name": "USN-2827-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2827-1" "url": "http://www.ubuntu.com/usn/USN-2827-1"
},
{
"name" : "USN-2784-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2784-1"
},
{
"name" : "77161",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/77161"
},
{
"name" : "1033884",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1033884"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://github.com/tinfoil/devise-two-factor/blob/master/UPGRADING.md",
"refsource": "CONFIRM",
"url": "https://github.com/tinfoil/devise-two-factor/blob/master/UPGRADING.md"
},
{ {
"name": "[oss-security] 20150917 Re: CVE Request: TOTP Replay Attack in Ruby library", "name": "[oss-security] 20150917 Re: CVE Request: TOTP Replay Attack in Ruby library",
"refsource": "MLIST", "refsource": "MLIST",
@ -62,25 +67,20 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/06/20/4" "url": "http://www.openwall.com/lists/oss-security/2015/06/20/4"
}, },
{
"name": "76789",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/76789"
},
{ {
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798466", "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798466",
"refsource": "MISC", "refsource": "MISC",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798466" "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798466"
}, },
{
"name" : "https://github.com/tinfoil/devise-two-factor/blob/master/UPGRADING.md",
"refsource" : "CONFIRM",
"url" : "https://github.com/tinfoil/devise-two-factor/blob/master/UPGRADING.md"
},
{ {
"name": "https://github.com/tinfoil/devise-two-factor/issues/45#issuecomment-139335608", "name": "https://github.com/tinfoil/devise-two-factor/issues/45#issuecomment-139335608",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/tinfoil/devise-two-factor/issues/45#issuecomment-139335608" "url": "https://github.com/tinfoil/devise-two-factor/issues/45#issuecomment-139335608"
},
{
"name" : "76789",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/76789"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2015-7397", "ID": "CVE-2015-7397",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21969562",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21969562"
},
{ {
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg24041142", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24041142",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg24041142" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24041142"
}, },
{
"name" : "JR54295",
"refsource" : "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1JR54295"
},
{ {
"name": "1034640", "name": "1034640",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034640" "url": "http://www.securitytracker.com/id/1034640"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21969562",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21969562"
},
{
"name": "JR54295",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR54295"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-7549", "ID": "CVE-2015-7549",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,14 +58,9 @@
"url": "http://www.openwall.com/lists/oss-security/2015/12/14/2" "url": "http://www.openwall.com/lists/oss-security/2015/12/14/2"
}, },
{ {
"name" : "http://git.qemu.org/?p=qemu.git;a=commit;h=43b11a91dd861a946b231b89b754285", "name": "80761",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://git.qemu.org/?p=qemu.git;a=commit;h=43b11a91dd861a946b231b89b754285" "url": "http://www.securityfocus.com/bid/80761"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1291137",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1291137"
}, },
{ {
"name": "DSA-3471", "name": "DSA-3471",
@ -73,9 +68,14 @@
"url": "http://www.debian.org/security/2016/dsa-3471" "url": "http://www.debian.org/security/2016/dsa-3471"
}, },
{ {
"name" : "FEDORA-2016-e9bba2bb01", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1291137",
"refsource" : "FEDORA", "refsource": "CONFIRM",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175380.html" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291137"
},
{
"name": "http://git.qemu.org/?p=qemu.git;a=commit;h=43b11a91dd861a946b231b89b754285",
"refsource": "CONFIRM",
"url": "http://git.qemu.org/?p=qemu.git;a=commit;h=43b11a91dd861a946b231b89b754285"
}, },
{ {
"name": "GLSA-201602-01", "name": "GLSA-201602-01",
@ -83,9 +83,9 @@
"url": "https://security.gentoo.org/glsa/201602-01" "url": "https://security.gentoo.org/glsa/201602-01"
}, },
{ {
"name" : "80761", "name": "FEDORA-2016-e9bba2bb01",
"refsource" : "BID", "refsource": "FEDORA",
"url" : "http://www.securityfocus.com/bid/80761" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175380.html"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-8202", "ID": "CVE-2015-8202",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@debian.org",
"ID": "CVE-2015-8746", "ID": "CVE-2015-8746",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20160105 CVE request -- linux kernel: nfs: kernel panic occurs at nfs client when nfsv4.2 migration is executed",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/01/05/9"
},
{
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=18e3b739fdc826481c6a1335ce0c5b19b3d415da",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=18e3b739fdc826481c6a1335ce0c5b19b3d415da"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.2",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.2"
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1295802", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1295802",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -77,20 +62,35 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/18e3b739fdc826481c6a1335ce0c5b19b3d415da" "url": "https://github.com/torvalds/linux/commit/18e3b739fdc826481c6a1335ce0c5b19b3d415da"
}, },
{
"name" : "RHSA-2016:2574",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2574.html"
},
{ {
"name": "RHSA-2016:2584", "name": "RHSA-2016:2584",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2584.html" "url": "http://rhn.redhat.com/errata/RHSA-2016-2584.html"
}, },
{
"name": "RHSA-2016:2574",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2574.html"
},
{ {
"name": "1034594", "name": "1034594",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034594" "url": "http://www.securitytracker.com/id/1034594"
},
{
"name": "[oss-security] 20160105 CVE request -- linux kernel: nfs: kernel panic occurs at nfs client when nfsv4.2 migration is executed",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/01/05/9"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.2",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.2"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=18e3b739fdc826481c6a1335ce0c5b19b3d415da",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=18e3b739fdc826481c6a1335ce0c5b19b3d415da"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0418", "ID": "CVE-2016-0418",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-1111", "ID": "CVE-2016-1111",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-16-273/",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-16-273/"
},
{ {
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-02.html", "name": "https://helpx.adobe.com/security/products/acrobat/apsb16-02.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-02.html" "url": "https://helpx.adobe.com/security/products/acrobat/apsb16-02.html"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-273/",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-273/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1342", "ID": "CVE-2016-1342",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5513", "ID": "CVE-2016-5513",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5538", "ID": "CVE-2016-5538",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5618", "ID": "CVE-2016-5618",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "40200",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/40200/"
},
{ {
"name": "VU#856152", "name": "VU#856152",
"refsource": "CERT-VN", "refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "92318", "name": "92318",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/92318" "url": "http://www.securityfocus.com/bid/92318"
},
{
"name": "40200",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40200/"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-2243", "ID": "CVE-2018-2243",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -61,16 +61,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://blogs.sap.com/2018/01/09/sap-security-patch-day-january-2018/",
"refsource" : "CONFIRM",
"url" : "https://blogs.sap.com/2018/01/09/sap-security-patch-day-january-2018/"
},
{ {
"name": "https://launchpad.support.sap.com/#/notes/2523961", "name": "https://launchpad.support.sap.com/#/notes/2523961",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://launchpad.support.sap.com/#/notes/2523961" "url": "https://launchpad.support.sap.com/#/notes/2523961"
}, },
{
"name": "https://blogs.sap.com/2018/01/09/sap-security-patch-day-january-2018/",
"refsource": "CONFIRM",
"url": "https://blogs.sap.com/2018/01/09/sap-security-patch-day-january-2018/"
},
{ {
"name": "102448", "name": "102448",
"refsource": "BID", "refsource": "BID",

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1040693",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040693"
},
{ {
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", "name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "103812", "name": "103812",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/103812" "url": "http://www.securityfocus.com/bid/103812"
},
{
"name" : "1040693",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1040693"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "Secure@Microsoft.com", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2019-0588", "ID": "CVE-2019-0588",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://www.ichain.co.jp/security20190311.html",
"refsource" : "MISC",
"url" : "https://www.ichain.co.jp/security20190311.html"
},
{ {
"name": "JVN#11622218", "name": "JVN#11622218",
"refsource": "JVN", "refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN11622218/index.html" "url": "http://jvn.jp/en/jp/JVN11622218/index.html"
},
{
"name": "https://www.ichain.co.jp/security20190311.html",
"refsource": "MISC",
"url": "https://www.ichain.co.jp/security20190311.html"
} }
] ]
} }