"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 01:17:59 +00:00
parent ca63507b22
commit de3761ccb5
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
63 changed files with 4439 additions and 4439 deletions

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS98-013",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-013"
},
{ {
"name": "7837", "name": "7837",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -66,6 +61,11 @@
"name": "ie-crossframe-file-read(3668)", "name": "ie-crossframe-file-read(3668)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/3668" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/3668"
},
{
"name": "MS98-013",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-013"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2007-0324", "ID": "CVE-2007-0324",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,49 +53,49 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070215 Lizardtech DjVu Browser Plug-in - Multiple Vulnerabilities", "name": "2259",
"refsource" : "BUGTRAQ", "refsource": "SREASON",
"url" : "http://www.securityfocus.com/archive/1/460197/100/0/threaded" "url": "http://securityreason.com/securityalert/2259"
},
{
"name" : "http://www.lizardtech.com/products/doc/djvupluginrelease.php",
"refsource" : "MISC",
"url" : "http://www.lizardtech.com/products/doc/djvupluginrelease.php"
},
{
"name" : "VU#522393",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/522393"
},
{
"name" : "22569",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22569"
},
{
"name" : "ADV-2007-0618",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0618"
}, },
{ {
"name": "33199", "name": "33199",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/33199" "url": "http://osvdb.org/33199"
}, },
{
"name": "djvu-browser-multiple-bo(32510)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32510"
},
{
"name": "ADV-2007-0618",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0618"
},
{ {
"name": "24149", "name": "24149",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24149" "url": "http://secunia.com/advisories/24149"
}, },
{ {
"name" : "2259", "name": "22569",
"refsource" : "SREASON", "refsource": "BID",
"url" : "http://securityreason.com/securityalert/2259" "url": "http://www.securityfocus.com/bid/22569"
}, },
{ {
"name" : "djvu-browser-multiple-bo(32510)", "name": "VU#522393",
"refsource" : "XF", "refsource": "CERT-VN",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32510" "url": "http://www.kb.cert.org/vuls/id/522393"
},
{
"name": "http://www.lizardtech.com/products/doc/djvupluginrelease.php",
"refsource": "MISC",
"url": "http://www.lizardtech.com/products/doc/djvupluginrelease.php"
},
{
"name": "20070215 Lizardtech DjVu Browser Plug-in - Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/460197/100/0/threaded"
} }
] ]
} }

View File

@ -52,26 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "BEA07-148.00",
"refsource" : "BEA",
"url" : "http://dev2dev.bea.com/pub/advisory/215"
},
{
"name" : "22082",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22082"
},
{
"name" : "ADV-2007-0213",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0213"
},
{
"name" : "32859",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/32859"
},
{ {
"name": "1017525", "name": "1017525",
"refsource": "SECTRACK", "refsource": "SECTRACK",
@ -81,6 +61,26 @@
"name": "23750", "name": "23750",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23750" "url": "http://secunia.com/advisories/23750"
},
{
"name": "22082",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22082"
},
{
"name": "32859",
"refsource": "OSVDB",
"url": "http://osvdb.org/32859"
},
{
"name": "BEA07-148.00",
"refsource": "BEA",
"url": "http://dev2dev.bea.com/pub/advisory/215"
},
{
"name": "ADV-2007-0213",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0213"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "3286",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3286"
},
{
"name" : "ADV-2007-0540",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0540"
},
{ {
"name": "34598", "name": "34598",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -71,6 +61,16 @@
"name": "lightro-index-sql-injection(32347)", "name": "lightro-index-sql-injection(32347)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32347" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32347"
},
{
"name": "ADV-2007-0540",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0540"
},
{
"name": "3286",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3286"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-1003", "ID": "CVE-2007-1003",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,6 +57,141 @@
"refsource": "IDEFENSE", "refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=503" "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=503"
}, },
{
"name": "23284",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23284"
},
{
"name": "24745",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24745"
},
{
"name": "oval:org.mitre.oval:def:1980",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1980"
},
{
"name": "29622",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29622"
},
{
"name": "SUSE-SR:2008:008",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html"
},
{
"name": "24771",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24771"
},
{
"name": "24770",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24770"
},
{
"name": "25006",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25006"
},
{
"name": "24756",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24756"
},
{
"name": "RHSA-2007:0126",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0126.html"
},
{
"name": "23300",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23300"
},
{
"name": "GLSA-200705-10",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200705-10.xml"
},
{
"name": "USN-448-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-448-1"
},
{
"name": "MDKSA-2007:080",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:080"
},
{
"name": "24758",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24758"
},
{
"name": "1017857",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017857"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm"
},
{
"name": "25195",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25195"
},
{
"name": "RHSA-2007:0125",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0125.html"
},
{
"name": "24741",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24741"
},
{
"name": "[xorg-announce] 20070403 various integer overflow vulnerabilites in xserver, libX11 and libXfont",
"refsource": "MLIST",
"url": "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html"
},
{
"name": "24791",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24791"
},
{
"name": "SUSE-SA:2007:027",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_27_x.html"
},
{
"name": "RHSA-2007:0127",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0127.html"
},
{
"name": "DSA-1294",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1294"
},
{
"name": "24765",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24765"
},
{
"name": "25216",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25216"
},
{ {
"name": "20070404 rPSA-2007-0065-1 freetype xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs", "name": "20070404 rPSA-2007-0065-1 freetype xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -68,109 +203,9 @@
"url": "http://www.securityfocus.com/archive/1/464816/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/464816/100/0/threaded"
}, },
{ {
"name" : "[xorg-announce] 20070403 various integer overflow vulnerabilites in xserver, libX11 and libXfont", "name": "xorg-xcmisc-overflow(33424)",
"refsource" : "MLIST", "refsource": "XF",
"url" : "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33424"
},
{
"name" : "http://issues.foresightlinux.org/browse/FL-223",
"refsource" : "CONFIRM",
"url" : "http://issues.foresightlinux.org/browse/FL-223"
},
{
"name" : "https://issues.rpath.com/browse/RPL-1213",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-1213"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm"
},
{
"name" : "DSA-1294",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1294"
},
{
"name" : "GLSA-200705-10",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200705-10.xml"
},
{
"name" : "MDKSA-2007:079",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079"
},
{
"name" : "MDKSA-2007:080",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:080"
},
{
"name" : "[3.9] 021: SECURITY FIX: April 4, 2007",
"refsource" : "OPENBSD",
"url" : "http://www.openbsd.org/errata39.html#021_xorg"
},
{
"name" : "[4.0] 011: SECURITY FIX: April 4, 2007",
"refsource" : "OPENBSD",
"url" : "http://www.openbsd.org/errata40.html#011_xorg"
},
{
"name" : "RHSA-2007:0126",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0126.html"
},
{
"name" : "RHSA-2007:0125",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2007-0125.html"
},
{
"name" : "RHSA-2007:0127",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0127.html"
},
{
"name" : "102886",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1"
},
{
"name" : "SUSE-SA:2007:027",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_27_x.html"
},
{
"name" : "SUSE-SR:2008:008",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html"
},
{
"name" : "USN-448-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-448-1"
},
{
"name" : "23284",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23284"
},
{
"name" : "23300",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23300"
},
{
"name" : "oval:org.mitre.oval:def:9798",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9798"
},
{
"name" : "ADV-2007-1217",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1217"
}, },
{ {
"name": "ADV-2007-1548", "name": "ADV-2007-1548",
@ -178,94 +213,59 @@
"url": "http://www.vupen.com/english/advisories/2007/1548" "url": "http://www.vupen.com/english/advisories/2007/1548"
}, },
{ {
"name" : "oval:org.mitre.oval:def:1980", "name": "102886",
"refsource" : "OVAL", "refsource": "SUNALERT",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1980" "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1"
}, },
{ {
"name" : "1017857", "name": "ADV-2007-1217",
"refsource" : "SECTRACK", "refsource": "VUPEN",
"url" : "http://www.securitytracker.com/id?1017857" "url": "http://www.vupen.com/english/advisories/2007/1217"
}, },
{ {
"name" : "24741", "name": "[4.0] 011: SECURITY FIX: April 4, 2007",
"refsource" : "SECUNIA", "refsource": "OPENBSD",
"url" : "http://secunia.com/advisories/24741" "url": "http://www.openbsd.org/errata40.html#011_xorg"
}, },
{ {
"name" : "24756", "name": "https://issues.rpath.com/browse/RPL-1213",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/24756" "url": "https://issues.rpath.com/browse/RPL-1213"
},
{
"name" : "24770",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24770"
},
{
"name" : "24745",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24745"
},
{
"name" : "24758",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24758"
},
{
"name" : "24765",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24765"
},
{
"name" : "24771",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24771"
},
{
"name" : "24772",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24772"
},
{
"name" : "24791",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24791"
}, },
{ {
"name": "25004", "name": "25004",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25004" "url": "http://secunia.com/advisories/25004"
}, },
{
"name" : "25006",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25006"
},
{
"name" : "25195",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25195"
},
{
"name" : "25216",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25216"
},
{ {
"name": "25305", "name": "25305",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25305" "url": "http://secunia.com/advisories/25305"
}, },
{ {
"name" : "29622", "name": "24772",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/29622" "url": "http://secunia.com/advisories/24772"
}, },
{ {
"name" : "xorg-xcmisc-overflow(33424)", "name": "[3.9] 021: SECURITY FIX: April 4, 2007",
"refsource" : "XF", "refsource": "OPENBSD",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33424" "url": "http://www.openbsd.org/errata39.html#021_xorg"
},
{
"name": "oval:org.mitre.oval:def:9798",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9798"
},
{
"name": "http://issues.foresightlinux.org/browse/FL-223",
"refsource": "CONFIRM",
"url": "http://issues.foresightlinux.org/browse/FL-223"
},
{
"name": "MDKSA-2007:079",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079"
} }
] ]
} }

View File

@ -52,41 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070305 CORE-2007-0115: GnuPG and GnuPG clients unsigned data injection vulnerability ",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/461958/100/0/threaded"
},
{
"name" : "20070305 CORE-2007-0115: GnuPG and GnuPG clients unsigned data injection vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/461958/30/7710/threaded"
},
{ {
"name": "[gnupg-users] 20070306 [Announce] Multiple Messages Problem in GnuPG and GPGME", "name": "[gnupg-users] 20070306 [Announce] Multiple Messages Problem in GnuPG and GPGME",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://lists.gnupg.org/pipermail/gnupg-users/2007-March/030514.html" "url": "http://lists.gnupg.org/pipermail/gnupg-users/2007-March/030514.html"
}, },
{
"name" : "http://www.coresecurity.com/?action=item&id=1687",
"refsource" : "MISC",
"url" : "http://www.coresecurity.com/?action=item&id=1687"
},
{
"name" : "22778",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22778"
},
{
"name" : "ADV-2007-0835",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0835"
},
{
"name" : "1017727",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017727"
},
{ {
"name": "24415", "name": "24415",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -96,6 +66,36 @@
"name": "2353", "name": "2353",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2353" "url": "http://securityreason.com/securityalert/2353"
},
{
"name": "20070305 CORE-2007-0115: GnuPG and GnuPG clients unsigned data injection vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/461958/30/7710/threaded"
},
{
"name": "http://www.coresecurity.com/?action=item&id=1687",
"refsource": "MISC",
"url": "http://www.coresecurity.com/?action=item&id=1687"
},
{
"refsource": "BUGTRAQ",
"name": "20070305 CORE-2007-0115: GnuPG and GnuPG clients unsigned data injection vulnerability",
"url": "http://www.securityfocus.com/archive/1/461958/100/0/threaded"
},
{
"name": "22778",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22778"
},
{
"name": "1017727",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017727"
},
{
"name": "ADV-2007-0835",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0835"
} }
] ]
} }

View File

@ -53,25 +53,15 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "3387", "name": "33835",
"refsource" : "EXPLOIT-DB", "refsource": "OSVDB",
"url" : "https://www.exploit-db.com/exploits/3387" "url": "http://osvdb.org/33835"
}, },
{ {
"name": "http://www.vbulletin.com/forum/showthread.php?postid=1314422", "name": "http://www.vbulletin.com/forum/showthread.php?postid=1314422",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.vbulletin.com/forum/showthread.php?postid=1314422" "url": "http://www.vbulletin.com/forum/showthread.php?postid=1314422"
}, },
{
"name" : "22780",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22780"
},
{
"name" : "33835",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33835"
},
{ {
"name": "24341", "name": "24341",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -81,6 +71,16 @@
"name": "vbulletin-inlinemod-sql-injection(32746)", "name": "vbulletin-inlinemod-sql-injection(32746)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32746" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32746"
},
{
"name": "3387",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3387"
},
{
"name": "22780",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22780"
} }
] ]
} }

View File

@ -53,15 +53,60 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.php-security.org/MOPB/MOPB-22-2007.html", "name": "ADV-2007-0960",
"refsource" : "MISC", "refsource": "VUPEN",
"url" : "http://www.php-security.org/MOPB/MOPB-22-2007.html" "url": "http://www.vupen.com/english/advisories/2007/0960"
},
{
"name": "ADV-2007-2732",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2732"
},
{
"name": "25056",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25056"
},
{
"name": "DSA-1283",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1283"
},
{
"name": "24505",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24505"
},
{
"name": "APPLE-SA-2007-07-31",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html"
},
{
"name": "GLSA-200705-19",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200705-19.xml"
}, },
{ {
"name": "http://us2.php.net/releases/4_4_7.php", "name": "http://us2.php.net/releases/4_4_7.php",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://us2.php.net/releases/4_4_7.php" "url": "http://us2.php.net/releases/4_4_7.php"
}, },
{
"name": "25062",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25062"
},
{
"name": "USN-455-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-455-1"
},
{
"name": "DSA-1282",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1282"
},
{ {
"name": "http://us2.php.net/releases/5_2_2.php", "name": "http://us2.php.net/releases/5_2_2.php",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -73,39 +118,9 @@
"url": "http://docs.info.apple.com/article.html?artnum=306172" "url": "http://docs.info.apple.com/article.html?artnum=306172"
}, },
{ {
"name" : "APPLE-SA-2007-07-31", "name": "http://www.php-security.org/MOPB/MOPB-22-2007.html",
"refsource" : "APPLE", "refsource": "MISC",
"url" : "http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html" "url": "http://www.php-security.org/MOPB/MOPB-22-2007.html"
},
{
"name" : "DSA-1282",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1282"
},
{
"name" : "DSA-1283",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1283"
},
{
"name" : "GLSA-200705-19",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200705-19.xml"
},
{
"name" : "SUSE-SA:2007:032",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_32_php.html"
},
{
"name" : "USN-455-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-455-1"
},
{
"name" : "22968",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22968"
}, },
{ {
"name": "25159", "name": "25159",
@ -113,29 +128,9 @@
"url": "http://www.securityfocus.com/bid/25159" "url": "http://www.securityfocus.com/bid/25159"
}, },
{ {
"name" : "ADV-2007-0960", "name": "25445",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0960"
},
{
"name" : "ADV-2007-2732",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2732"
},
{
"name" : "24505",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/24505" "url": "http://secunia.com/advisories/25445"
},
{
"name" : "25025",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25025"
},
{
"name" : "25062",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25062"
}, },
{ {
"name": "25057", "name": "25057",
@ -143,14 +138,19 @@
"url": "http://secunia.com/advisories/25057" "url": "http://secunia.com/advisories/25057"
}, },
{ {
"name" : "25056", "name": "SUSE-SA:2007:032",
"refsource" : "SECUNIA", "refsource": "SUSE",
"url" : "http://secunia.com/advisories/25056" "url": "http://www.novell.com/linux/security/advisories/2007_32_php.html"
}, },
{ {
"name" : "25445", "name": "25025",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/25445" "url": "http://secunia.com/advisories/25025"
},
{
"name": "22968",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22968"
}, },
{ {
"name": "26235", "name": "26235",

View File

@ -62,11 +62,6 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://openid.net/pipermail/security/2007-March/000288.html" "url": "http://openid.net/pipermail/security/2007-March/000288.html"
}, },
{
"name" : "[security] 20070321 MyOpenID",
"refsource" : "MLIST",
"url" : "http://openid.net/pipermail/security/2007-March/000291.html"
},
{ {
"name": "[security] 20070321 MyOpenID", "name": "[security] 20070321 MyOpenID",
"refsource": "MLIST", "refsource": "MLIST",
@ -86,6 +81,11 @@
"name": "43600", "name": "43600",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/43600" "url": "http://osvdb.org/43600"
},
{
"name": "[security] 20070321 MyOpenID",
"refsource": "MLIST",
"url": "http://openid.net/pipermail/security/2007-March/000291.html"
} }
] ]
} }

View File

@ -58,14 +58,9 @@
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=442840" "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=442840"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=293081", "name": "27771",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=293081" "url": "http://www.securityfocus.com/bid/27771"
},
{
"name" : "http://duplicity.nongnu.org/CHANGELOG",
"refsource" : "CONFIRM",
"url" : "http://duplicity.nongnu.org/CHANGELOG"
}, },
{ {
"name": "FEDORA-2008-1521", "name": "FEDORA-2008-1521",
@ -73,14 +68,19 @@
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00356.html" "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00356.html"
}, },
{ {
"name" : "FEDORA-2008-1584", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=293081",
"refsource" : "FEDORA", "refsource": "CONFIRM",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00445.html" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=293081"
}, },
{ {
"name" : "27771", "name": "28917",
"refsource" : "BID", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/bid/27771" "url": "http://secunia.com/advisories/28917"
},
{
"name": "http://duplicity.nongnu.org/CHANGELOG",
"refsource": "CONFIRM",
"url": "http://duplicity.nongnu.org/CHANGELOG"
}, },
{ {
"name": "42339", "name": "42339",
@ -88,9 +88,9 @@
"url": "http://osvdb.org/42339" "url": "http://osvdb.org/42339"
}, },
{ {
"name" : "28917", "name": "FEDORA-2008-1584",
"refsource" : "SECUNIA", "refsource": "FEDORA",
"url" : "http://secunia.com/advisories/28917" "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00445.html"
} }
] ]
} }

View File

@ -62,15 +62,15 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/25940" "url": "http://www.securityfocus.com/bid/25940"
}, },
{
"name" : "27080",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27080"
},
{ {
"name": "helm-domain-filemanager-xss(36962)", "name": "helm-domain-filemanager-xss(36962)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36962" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36962"
},
{
"name": "27080",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27080"
} }
] ]
} }

View File

@ -52,26 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20071017 AST-2007-023: SQL Injection POC and details",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066744.html"
},
{
"name" : "http://downloads.digium.com/pub/security/AST-2007-023.html",
"refsource" : "CONFIRM",
"url" : "http://downloads.digium.com/pub/security/AST-2007-023.html"
},
{
"name" : "26095",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26095"
},
{ {
"name": "37880", "name": "37880",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/37880" "url": "http://osvdb.org/37880"
}, },
{
"name": "asterisk-cdraddonmysql-sql-injection(37235)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37235"
},
{ {
"name": "1018824", "name": "1018824",
"refsource": "SECTRACK", "refsource": "SECTRACK",
@ -83,9 +73,19 @@
"url": "http://secunia.com/advisories/27278" "url": "http://secunia.com/advisories/27278"
}, },
{ {
"name" : "asterisk-cdraddonmysql-sql-injection(37235)", "name": "http://downloads.digium.com/pub/security/AST-2007-023.html",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/37235" "url": "http://downloads.digium.com/pub/security/AST-2007-023.html"
},
{
"name": "26095",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26095"
},
{
"name": "20071017 AST-2007-023: SQL Injection POC and details",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066744.html"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "4618",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4618"
},
{ {
"name": "26400", "name": "26400",
"refsource": "BID", "refsource": "BID",
@ -66,6 +61,11 @@
"name": "softbiz-admanagement-ads-sql-injection(38400)", "name": "softbiz-admanagement-ads-sql-injection(38400)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38400" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38400"
},
{
"name": "4618",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4618"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-3202", "ID": "CVE-2015-3202",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,105 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "37089",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/37089/"
},
{
"name" : "[oss-security] 20150521 CVE-2015-3202 fuse privilege escalation",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/05/21/9"
},
{
"name" : "https://gist.github.com/taviso/ecb70eb12d461dd85cba",
"refsource" : "MISC",
"url" : "https://gist.github.com/taviso/ecb70eb12d461dd85cba"
},
{
"name" : "https://twitter.com/taviso/status/601370527437967360",
"refsource" : "MISC",
"url" : "https://twitter.com/taviso/status/601370527437967360"
},
{
"name" : "http://packetstormsecurity.com/files/132021/Fuse-Local-Privilege-Escalation.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/132021/Fuse-Local-Privilege-Escalation.html"
},
{
"name" : "DSA-3266",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3266"
},
{ {
"name": "DSA-3268", "name": "DSA-3268",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3268" "url": "http://www.debian.org/security/2015/dsa-3268"
}, },
{
"name" : "FEDORA-2015-8751",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159831.html"
},
{
"name" : "FEDORA-2015-8756",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159683.html"
},
{
"name" : "FEDORA-2015-8771",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159543.html"
},
{
"name" : "FEDORA-2015-8773",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159298.html"
},
{
"name" : "FEDORA-2015-8777",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160106.html"
},
{
"name" : "FEDORA-2015-8782",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160094.html"
},
{
"name" : "GLSA-201603-04",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201603-04"
},
{
"name" : "GLSA-201701-19",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201701-19"
},
{
"name" : "openSUSE-SU-2015:0997",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-06/msg00005.html"
},
{
"name" : "openSUSE-SU-2015:1003",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-06/msg00007.html"
},
{ {
"name": "USN-2617-1", "name": "USN-2617-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2617-1" "url": "http://www.ubuntu.com/usn/USN-2617-1"
}, },
{ {
"name" : "USN-2617-2", "name": "FEDORA-2015-8771",
"refsource" : "UBUNTU", "refsource": "FEDORA",
"url" : "http://www.ubuntu.com/usn/USN-2617-2" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159543.html"
}, },
{ {
"name" : "USN-2617-3", "name": "FEDORA-2015-8782",
"refsource" : "UBUNTU", "refsource": "FEDORA",
"url" : "http://www.ubuntu.com/usn/USN-2617-3" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160094.html"
},
{
"name": "FEDORA-2015-8751",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159831.html"
},
{
"name": "1032386",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032386"
},
{
"name": "https://gist.github.com/taviso/ecb70eb12d461dd85cba",
"refsource": "MISC",
"url": "https://gist.github.com/taviso/ecb70eb12d461dd85cba"
}, },
{ {
"name": "74765", "name": "74765",
@ -158,9 +93,74 @@
"url": "http://www.securityfocus.com/bid/74765" "url": "http://www.securityfocus.com/bid/74765"
}, },
{ {
"name" : "1032386", "name": "FEDORA-2015-8773",
"refsource" : "SECTRACK", "refsource": "FEDORA",
"url" : "http://www.securitytracker.com/id/1032386" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159298.html"
},
{
"name": "openSUSE-SU-2015:1003",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-06/msg00007.html"
},
{
"name": "DSA-3266",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3266"
},
{
"name": "GLSA-201603-04",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201603-04"
},
{
"name": "USN-2617-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2617-2"
},
{
"name": "FEDORA-2015-8777",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160106.html"
},
{
"name": "FEDORA-2015-8756",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159683.html"
},
{
"name": "GLSA-201701-19",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-19"
},
{
"name": "[oss-security] 20150521 CVE-2015-3202 fuse privilege escalation",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/05/21/9"
},
{
"name": "openSUSE-SU-2015:0997",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-06/msg00005.html"
},
{
"name": "http://packetstormsecurity.com/files/132021/Fuse-Local-Privilege-Escalation.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/132021/Fuse-Local-Privilege-Escalation.html"
},
{
"name": "https://twitter.com/taviso/status/601370527437967360",
"refsource": "MISC",
"url": "https://twitter.com/taviso/status/601370527437967360"
},
{
"name": "37089",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/37089/"
},
{
"name": "USN-2617-3",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2617-3"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-3204", "ID": "CVE-2015-3204",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,16 +57,16 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://libreswan.org/security/CVE-2015-3204/CVE-2015-3204.txt" "url": "https://libreswan.org/security/CVE-2015-3204/CVE-2015-3204.txt"
}, },
{
"name" : "GLSA-201603-13",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201603-13"
},
{ {
"name": "RHSA-2015:1154", "name": "RHSA-2015:1154",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1154.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-1154.html"
}, },
{
"name": "GLSA-201603-13",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201603-13"
},
{ {
"name": "75392", "name": "75392",
"refsource": "BID", "refsource": "BID",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-3233", "ID": "CVE-2015-3233",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20150704 CVE requests for Drupal contributed modules (from SA-CONTRIB-2015-100 to SA-CONTRIB-2015-131)", "name": "FEDORA-2015-10189",
"refsource" : "MLIST", "refsource": "FEDORA",
"url" : "http://www.openwall.com/lists/oss-security/2015/07/04/4" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161265.html"
},
{
"name" : "https://www.drupal.org/node/2507729",
"refsource" : "MISC",
"url" : "https://www.drupal.org/node/2507729"
},
{
"name" : "https://www.drupal.org/node/2507735",
"refsource" : "MISC",
"url" : "https://www.drupal.org/node/2507735"
}, },
{ {
"name": "https://www.drupal.org/node/2507741", "name": "https://www.drupal.org/node/2507741",
@ -73,35 +63,20 @@
"url": "https://www.drupal.org/node/2507741" "url": "https://www.drupal.org/node/2507741"
}, },
{ {
"name" : "https://www.drupal.org/SA-CORE-2015-002", "name": "75284",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "https://www.drupal.org/SA-CORE-2015-002" "url": "http://www.securityfocus.com/bid/75284"
}, },
{ {
"name" : "https://www.drupal.org/node/2507535", "name": "https://www.drupal.org/node/2507735",
"refsource" : "CONFIRM", "refsource": "MISC",
"url" : "https://www.drupal.org/node/2507535" "url": "https://www.drupal.org/node/2507735"
},
{
"name" : "https://www.drupal.org/node/2507555",
"refsource" : "CONFIRM",
"url" : "https://www.drupal.org/node/2507555"
},
{
"name" : "https://www.drupal.org/node/2507561",
"refsource" : "CONFIRM",
"url" : "https://www.drupal.org/node/2507561"
}, },
{ {
"name": "DSA-3291", "name": "DSA-3291",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3291" "url": "http://www.debian.org/security/2015/dsa-3291"
}, },
{
"name" : "FEDORA-2015-10189",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161265.html"
},
{ {
"name": "FEDORA-2015-10290", "name": "FEDORA-2015-10290",
"refsource": "FEDORA", "refsource": "FEDORA",
@ -112,15 +87,40 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/75279" "url": "http://www.securityfocus.com/bid/75279"
}, },
{
"name": "https://www.drupal.org/SA-CORE-2015-002",
"refsource": "CONFIRM",
"url": "https://www.drupal.org/SA-CORE-2015-002"
},
{
"name": "https://www.drupal.org/node/2507535",
"refsource": "CONFIRM",
"url": "https://www.drupal.org/node/2507535"
},
{ {
"name": "75280", "name": "75280",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/75280" "url": "http://www.securityfocus.com/bid/75280"
}, },
{ {
"name" : "75284", "name": "https://www.drupal.org/node/2507561",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/75284" "url": "https://www.drupal.org/node/2507561"
},
{
"name": "https://www.drupal.org/node/2507555",
"refsource": "CONFIRM",
"url": "https://www.drupal.org/node/2507555"
},
{
"name": "[oss-security] 20150704 CVE requests for Drupal contributed modules (from SA-CONTRIB-2015-100 to SA-CONTRIB-2015-131)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/07/04/4"
},
{
"name": "https://www.drupal.org/node/2507729",
"refsource": "MISC",
"url": "https://www.drupal.org/node/2507729"
} }
] ]
} }

View File

@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20150205 CVE requests for Drupal contributed modules", "name": "72569",
"refsource" : "MLIST", "refsource": "BID",
"url" : "http://www.openwall.com/lists/oss-security/2015/02/05/16" "url": "http://www.securityfocus.com/bid/72569"
}, },
{ {
"name": "https://www.drupal.org/node/2420139", "name": "https://www.drupal.org/node/2420139",
"refsource": "MISC", "refsource": "MISC",
"url": "https://www.drupal.org/node/2420139" "url": "https://www.drupal.org/node/2420139"
}, },
{
"name" : "https://www.drupal.org/node/2420121",
"refsource" : "CONFIRM",
"url" : "https://www.drupal.org/node/2420121"
},
{
"name" : "72569",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/72569"
},
{ {
"name": "pathbreadcrum-drupal-node-sec-bypass(100672)", "name": "pathbreadcrum-drupal-node-sec-bypass(100672)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100672" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100672"
},
{
"name": "[oss-security] 20150205 CVE requests for Drupal contributed modules",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/02/05/16"
},
{
"name": "https://www.drupal.org/node/2420121",
"refsource": "CONFIRM",
"url": "https://www.drupal.org/node/2420121"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-7059", "ID": "CVE-2015-7059",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,24 +58,9 @@
"url": "https://support.apple.com/HT205637" "url": "https://support.apple.com/HT205637"
}, },
{ {
"name" : "https://support.apple.com/HT205640", "name": "1034344",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://support.apple.com/HT205640" "url": "http://www.securitytracker.com/id/1034344"
},
{
"name" : "https://support.apple.com/HT205641",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205641"
},
{
"name" : "APPLE-SA-2015-12-08-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Dec/msg00001.html"
},
{
"name" : "APPLE-SA-2015-12-08-3",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
}, },
{ {
"name": "APPLE-SA-2015-12-08-4", "name": "APPLE-SA-2015-12-08-4",
@ -83,9 +68,24 @@
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00002.html" "url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00002.html"
}, },
{ {
"name" : "1034344", "name": "APPLE-SA-2015-12-08-3",
"refsource" : "SECTRACK", "refsource": "APPLE",
"url" : "http://www.securitytracker.com/id/1034344" "url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
},
{
"name": "https://support.apple.com/HT205641",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205641"
},
{
"name": "https://support.apple.com/HT205640",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205640"
},
{
"name": "APPLE-SA-2015-12-08-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00001.html"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://zerodayinitiative.com/advisories/ZDI-15-363/",
"refsource" : "MISC",
"url" : "http://zerodayinitiative.com/advisories/ZDI-15-363/"
},
{ {
"name": "VU#966927", "name": "VU#966927",
"refsource": "CERT-VN", "refsource": "CERT-VN",
@ -71,6 +66,11 @@
"name": "1033861", "name": "1033861",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033861" "url": "http://www.securitytracker.com/id/1033861"
},
{
"name": "http://zerodayinitiative.com/advisories/ZDI-15-363/",
"refsource": "MISC",
"url": "http://zerodayinitiative.com/advisories/ZDI-15-363/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2015-7904", "ID": "CVE-2015-7904",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-7955", "ID": "CVE-2015-7955",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-8114", "ID": "CVE-2015-8114",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-8176", "ID": "CVE-2015-8176",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://kb.isc.org/article/AA-01318" "url": "https://kb.isc.org/article/AA-01318"
}, },
{
"name" : "FEDORA-2015-930b020175",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175218.html"
},
{ {
"name": "FEDORA-2015-aa3a69bdc3", "name": "FEDORA-2015-aa3a69bdc3",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175337.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175337.html"
},
{
"name": "FEDORA-2015-930b020175",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175218.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2015-8507", "ID": "CVE-2015-8507",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -57,6 +57,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2015-40.html" "url": "http://www.wireshark.org/security/wnpa-sec-2015-40.html"
}, },
{
"name": "DSA-3505",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3505"
},
{ {
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11548", "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11548",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -68,14 +73,9 @@
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=cec0593ae6c3bca65eff65741c2a10f3de3e0afe" "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=cec0593ae6c3bca65eff65741c2a10f3de3e0afe"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", "name": "79814",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" "url": "http://www.securityfocus.com/bid/79814"
},
{
"name" : "DSA-3505",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3505"
}, },
{ {
"name": "GLSA-201604-05", "name": "GLSA-201604-05",
@ -83,9 +83,9 @@
"url": "https://security.gentoo.org/glsa/201604-05" "url": "https://security.gentoo.org/glsa/201604-05"
}, },
{ {
"name" : "79814", "name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/79814" "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
}, },
{ {
"name": "1034551", "name": "1034551",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-8820", "ID": "CVE-2015-8820",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2017-06-05T00:00:00", "DATE_PUBLIC": "2017-06-05T00:00:00",
"ID": "CVE-2015-9011", "ID": "CVE-2015-9011",
"STATE": "PUBLIC" "STATE": "PUBLIC"

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0402", "ID": "CVE-2016-0402",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", "name": "openSUSE-SU-2016:0272",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "name": "81096",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" "url": "http://www.securityfocus.com/bid/81096"
},
{
"name": "1034715",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034715"
},
{
"name": "openSUSE-SU-2016:0279",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"
},
{
"name": "GLSA-201610-08",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201610-08"
},
{
"name": "USN-2884-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2884-1"
}, },
{ {
"name": "DSA-3465", "name": "DSA-3465",
@ -68,19 +88,19 @@
"url": "http://www.debian.org/security/2016/dsa-3465" "url": "http://www.debian.org/security/2016/dsa-3465"
}, },
{ {
"name" : "DSA-3458", "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
"refsource" : "DEBIAN", "refsource": "CONFIRM",
"url" : "http://www.debian.org/security/2016/dsa-3458" "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
}, },
{ {
"name" : "GLSA-201603-14", "name": "USN-2885-1",
"refsource" : "GENTOO", "refsource": "UBUNTU",
"url" : "https://security.gentoo.org/glsa/201603-14" "url": "http://www.ubuntu.com/usn/USN-2885-1"
}, },
{ {
"name" : "GLSA-201610-08", "name": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"refsource" : "GENTOO", "refsource": "CONFIRM",
"url" : "https://security.gentoo.org/glsa/201610-08" "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
}, },
{ {
"name": "RHSA-2016:1430", "name": "RHSA-2016:1430",
@ -93,9 +113,9 @@
"url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html" "url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html"
}, },
{ {
"name" : "RHSA-2016:0050", "name": "openSUSE-SU-2016:0270",
"refsource" : "REDHAT", "refsource": "SUSE",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0050.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
}, },
{ {
"name": "RHSA-2016:0053", "name": "RHSA-2016:0053",
@ -103,49 +123,49 @@
"url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html" "url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html"
}, },
{ {
"name" : "RHSA-2016:0054", "name": "SUSE-SU-2016:0269",
"refsource" : "REDHAT", "refsource": "SUSE",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0054.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"
},
{
"name" : "RHSA-2016:0055",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0055.html"
},
{
"name" : "RHSA-2016:0056",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0056.html"
},
{
"name" : "RHSA-2016:0057",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0057.html"
}, },
{ {
"name": "RHSA-2016:0067", "name": "RHSA-2016:0067",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html" "url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html"
}, },
{
"name": "openSUSE-SU-2016:0263",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html"
},
{ {
"name": "SUSE-SU-2016:0256", "name": "SUSE-SU-2016:0256",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html"
}, },
{ {
"name" : "SUSE-SU-2016:0265", "name": "GLSA-201603-14",
"refsource" : "SUSE", "refsource": "GENTOO",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" "url": "https://security.gentoo.org/glsa/201603-14"
}, },
{ {
"name" : "SUSE-SU-2016:0269", "name": "RHSA-2016:0057",
"refsource" : "SUSE", "refsource": "REDHAT",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" "url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html"
}, },
{ {
"name" : "openSUSE-SU-2016:0263", "name": "RHSA-2016:0055",
"refsource" : "SUSE", "refsource": "REDHAT",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html" "url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html"
},
{
"name": "RHSA-2016:0054",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html"
},
{
"name": "RHSA-2016:0056",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html"
}, },
{ {
"name": "openSUSE-SU-2016:0268", "name": "openSUSE-SU-2016:0268",
@ -153,39 +173,19 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"
}, },
{ {
"name" : "openSUSE-SU-2016:0270", "name": "RHSA-2016:0050",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html"
},
{
"name": "DSA-3458",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3458"
},
{
"name": "SUSE-SU-2016:0265",
"refsource": "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"
},
{
"name" : "openSUSE-SU-2016:0272",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html"
},
{
"name" : "openSUSE-SU-2016:0279",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"
},
{
"name" : "USN-2884-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2884-1"
},
{
"name" : "USN-2885-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2885-1"
},
{
"name" : "81096",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/81096"
},
{
"name" : "1034715",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034715"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0686", "ID": "CVE-2016-0686",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,144 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", "name": "86473",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" "url": "http://www.securityfocus.com/bid/86473"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
},
{
"name" : "https://security.netapp.com/advisory/ntap-20160420-0001/",
"refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20160420-0001/"
},
{
"name" : "DSA-3558",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3558"
},
{
"name" : "GLSA-201606-18",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201606-18"
},
{
"name" : "RHSA-2016:0701",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0701.html"
},
{
"name" : "RHSA-2016:0702",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0702.html"
},
{
"name" : "RHSA-2016:0708",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0708.html"
},
{
"name" : "RHSA-2016:0716",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0716.html"
},
{
"name" : "RHSA-2016:0723",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0723.html"
},
{
"name" : "RHSA-2016:1430",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1430"
},
{
"name" : "RHSA-2016:1039",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1039.html"
},
{
"name" : "RHSA-2016:0650",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0650.html"
},
{
"name" : "RHSA-2016:0651",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0651.html"
},
{
"name" : "RHSA-2016:0675",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0675.html"
},
{
"name" : "RHSA-2016:0676",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0676.html"
},
{
"name" : "RHSA-2016:0677",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0677.html"
},
{
"name" : "RHSA-2016:0678",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0678.html"
},
{
"name" : "RHSA-2016:0679",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0679.html"
},
{
"name" : "RHSA-2017:1216",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1216"
},
{
"name" : "SUSE-SU-2016:1299",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"
},
{
"name" : "SUSE-SU-2016:1300",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"
},
{
"name" : "SUSE-SU-2016:1303",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"
},
{
"name" : "SUSE-SU-2016:1378",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"
},
{
"name" : "SUSE-SU-2016:1379",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"
},
{
"name" : "SUSE-SU-2016:1388",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"
},
{
"name" : "SUSE-SU-2016:1458",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"
},
{
"name" : "SUSE-SU-2016:1475",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"
}, },
{ {
"name": "openSUSE-SU-2016:1222", "name": "openSUSE-SU-2016:1222",
@ -198,29 +63,139 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html"
}, },
{ {
"name" : "openSUSE-SU-2016:1230", "name": "RHSA-2016:0677",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html"
},
{
"name": "SUSE-SU-2016:1299",
"refsource": "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"
},
{
"name": "RHSA-2016:1039",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html"
},
{
"name": "RHSA-2016:0701",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html"
},
{
"name": "USN-2972-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2972-1"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
},
{
"name": "SUSE-SU-2016:1303",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"
},
{
"name": "SUSE-SU-2016:1475",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"
}, },
{ {
"name": "openSUSE-SU-2016:1235", "name": "openSUSE-SU-2016:1235",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html"
}, },
{
"name": "openSUSE-SU-2016:1262",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html"
},
{
"name": "SUSE-SU-2016:1300",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"
},
{
"name": "RHSA-2016:0676",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0676.html"
},
{
"name": "RHSA-2016:1430",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1430"
},
{
"name": "https://security.netapp.com/advisory/ntap-20160420-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20160420-0001/"
},
{
"name": "RHSA-2016:0708",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html"
},
{
"name": "RHSA-2016:0723",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0723.html"
},
{
"name": "RHSA-2016:0651",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0651.html"
},
{
"name": "SUSE-SU-2016:1378",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"
},
{ {
"name": "SUSE-SU-2016:1248", "name": "SUSE-SU-2016:1248",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html"
}, },
{ {
"name" : "SUSE-SU-2016:1250", "name": "SUSE-SU-2016:1379",
"refsource": "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"
}, },
{ {
"name" : "openSUSE-SU-2016:1262", "name": "USN-2964-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2964-1"
},
{
"name": "openSUSE-SU-2016:1230",
"refsource": "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html"
},
{
"name": "SUSE-SU-2016:1458",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"
},
{
"name": "GLSA-201606-18",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201606-18"
},
{
"name": "RHSA-2016:0716",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html"
},
{
"name": "1035596",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035596"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
}, },
{ {
"name": "openSUSE-SU-2016:1265", "name": "openSUSE-SU-2016:1265",
@ -233,24 +208,49 @@
"url": "http://www.ubuntu.com/usn/USN-2963-1" "url": "http://www.ubuntu.com/usn/USN-2963-1"
}, },
{ {
"name" : "USN-2964-1", "name": "RHSA-2016:0675",
"refsource" : "UBUNTU", "refsource": "REDHAT",
"url" : "http://www.ubuntu.com/usn/USN-2964-1" "url": "http://rhn.redhat.com/errata/RHSA-2016-0675.html"
}, },
{ {
"name" : "USN-2972-1", "name": "SUSE-SU-2016:1250",
"refsource" : "UBUNTU", "refsource": "SUSE",
"url" : "http://www.ubuntu.com/usn/USN-2972-1" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html"
}, },
{ {
"name" : "86473", "name": "SUSE-SU-2016:1388",
"refsource" : "BID", "refsource": "SUSE",
"url" : "http://www.securityfocus.com/bid/86473" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"
}, },
{ {
"name" : "1035596", "name": "RHSA-2016:0702",
"refsource" : "SECTRACK", "refsource": "REDHAT",
"url" : "http://www.securitytracker.com/id/1035596" "url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html"
},
{
"name": "RHSA-2016:0679",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0679.html"
},
{
"name": "RHSA-2017:1216",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1216"
},
{
"name": "DSA-3558",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3558"
},
{
"name": "RHSA-2016:0678",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0678.html"
},
{
"name": "RHSA-2016:0650",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0650.html"
} }
] ]
} }

View File

@ -52,210 +52,135 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20160222 [SECURITY] CVE-2016-0714 Apache Tomcat Security Manager Bypass",
"refsource" : "BUGTRAQ",
"url" : "http://seclists.org/bugtraq/2016/Feb/145"
},
{
"name" : "http://svn.apache.org/viewvc?view=revision&revision=1725263",
"refsource" : "CONFIRM",
"url" : "http://svn.apache.org/viewvc?view=revision&revision=1725263"
},
{
"name" : "http://svn.apache.org/viewvc?view=revision&revision=1725914",
"refsource" : "CONFIRM",
"url" : "http://svn.apache.org/viewvc?view=revision&revision=1725914"
},
{
"name" : "http://svn.apache.org/viewvc?view=revision&revision=1726196",
"refsource" : "CONFIRM",
"url" : "http://svn.apache.org/viewvc?view=revision&revision=1726196"
},
{
"name" : "http://svn.apache.org/viewvc?view=revision&revision=1726203",
"refsource" : "CONFIRM",
"url" : "http://svn.apache.org/viewvc?view=revision&revision=1726203"
},
{
"name" : "http://svn.apache.org/viewvc?view=revision&revision=1726923",
"refsource" : "CONFIRM",
"url" : "http://svn.apache.org/viewvc?view=revision&revision=1726923"
},
{
"name" : "http://svn.apache.org/viewvc?view=revision&revision=1727034",
"refsource" : "CONFIRM",
"url" : "http://svn.apache.org/viewvc?view=revision&revision=1727034"
},
{
"name" : "http://svn.apache.org/viewvc?view=revision&revision=1727166",
"refsource" : "CONFIRM",
"url" : "http://svn.apache.org/viewvc?view=revision&revision=1727166"
},
{
"name" : "http://svn.apache.org/viewvc?view=revision&revision=1727182",
"refsource" : "CONFIRM",
"url" : "http://svn.apache.org/viewvc?view=revision&revision=1727182"
},
{
"name" : "http://tomcat.apache.org/security-6.html",
"refsource" : "CONFIRM",
"url" : "http://tomcat.apache.org/security-6.html"
},
{
"name" : "http://tomcat.apache.org/security-7.html",
"refsource" : "CONFIRM",
"url" : "http://tomcat.apache.org/security-7.html"
},
{
"name" : "http://tomcat.apache.org/security-8.html",
"refsource" : "CONFIRM",
"url" : "http://tomcat.apache.org/security-8.html"
},
{
"name" : "http://tomcat.apache.org/security-9.html",
"refsource" : "CONFIRM",
"url" : "http://tomcat.apache.org/security-9.html"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626"
},
{ {
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964", "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964" "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964"
}, },
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html"
},
{
"name" : "https://bto.bluecoat.com/security-advisory/sa118",
"refsource" : "CONFIRM",
"url" : "https://bto.bluecoat.com/security-advisory/sa118"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name" : "https://security.netapp.com/advisory/ntap-20180531-0001/",
"refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20180531-0001/"
},
{ {
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
}, },
{
"name" : "DSA-3530",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3530"
},
{
"name" : "DSA-3609",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3609"
},
{
"name" : "DSA-3552",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3552"
},
{ {
"name": "GLSA-201705-09", "name": "GLSA-201705-09",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201705-09" "url": "https://security.gentoo.org/glsa/201705-09"
}, },
{ {
"name" : "HPSBUX03561", "name": "http://svn.apache.org/viewvc?view=revision&revision=1726196",
"refsource" : "HP", "refsource": "CONFIRM",
"url" : "http://marc.info/?l=bugtraq&m=145974991225029&w=2" "url": "http://svn.apache.org/viewvc?view=revision&revision=1726196"
}, },
{ {
"name" : "RHSA-2016:2045", "name": "20160222 [SECURITY] CVE-2016-0714 Apache Tomcat Security Manager Bypass",
"refsource" : "REDHAT", "refsource": "BUGTRAQ",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2045.html" "url": "http://seclists.org/bugtraq/2016/Feb/145"
}, },
{ {
"name" : "RHSA-2016:1087", "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "https://access.redhat.com/errata/RHSA-2016:1087" "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html"
},
{
"name" : "RHSA-2016:1088",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1088"
},
{
"name" : "RHSA-2016:1089",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1089.html"
},
{
"name" : "RHSA-2016:2599",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2599.html"
},
{
"name" : "RHSA-2016:2807",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2807.html"
},
{
"name" : "RHSA-2016:2808",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2808.html"
},
{
"name" : "SUSE-SU-2016:0769",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html"
},
{
"name" : "SUSE-SU-2016:0822",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html"
},
{
"name" : "SUSE-SU-2016:0839",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html"
}, },
{ {
"name": "openSUSE-SU-2016:0865", "name": "openSUSE-SU-2016:0865",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html"
}, },
{
"name": "http://tomcat.apache.org/security-9.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-9.html"
},
{ {
"name": "USN-3024-1", "name": "USN-3024-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3024-1" "url": "http://www.ubuntu.com/usn/USN-3024-1"
}, },
{ {
"name" : "83327", "name": "SUSE-SU-2016:0769",
"refsource" : "BID", "refsource": "SUSE",
"url" : "http://www.securityfocus.com/bid/83327" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html"
},
{
"name": "RHSA-2016:2045",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2045.html"
},
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=1725263",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1725263"
},
{
"name": "DSA-3530",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3530"
},
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=1726923",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1726923"
},
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=1727166",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1727166"
},
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=1727034",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1727034"
},
{
"name": "http://tomcat.apache.org/security-7.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-7.html"
},
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=1725914",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1725914"
},
{
"name": "HPSBUX03561",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=145974991225029&w=2"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name": "1037640",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037640"
},
{
"name": "RHSA-2016:1089",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1089.html"
},
{
"name": "http://tomcat.apache.org/security-8.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-8.html"
},
{
"name": "RHSA-2016:1087",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1087"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
}, },
{ {
"name": "1035069", "name": "1035069",
@ -263,9 +188,84 @@
"url": "http://www.securitytracker.com/id/1035069" "url": "http://www.securitytracker.com/id/1035069"
}, },
{ {
"name" : "1037640", "name": "https://bto.bluecoat.com/security-advisory/sa118",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1037640" "url": "https://bto.bluecoat.com/security-advisory/sa118"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442"
},
{
"name": "RHSA-2016:2807",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2807.html"
},
{
"name": "RHSA-2016:1088",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1088"
},
{
"name": "https://security.netapp.com/advisory/ntap-20180531-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180531-0001/"
},
{
"name": "http://tomcat.apache.org/security-6.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"name": "RHSA-2016:2808",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2808.html"
},
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=1726203",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1726203"
},
{
"name": "SUSE-SU-2016:0822",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html"
},
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=1727182",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1727182"
},
{
"name": "83327",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/83327"
},
{
"name": "RHSA-2016:2599",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2599.html"
},
{
"name": "DSA-3609",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3609"
},
{
"name": "SUSE-SU-2016:0839",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626"
},
{
"name": "DSA-3552",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3552"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1417", "ID": "CVE-2016-1417",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20161012 Snort v2.9.7.0-WIN32 DLL Hijack", "name": "1036936",
"refsource" : "BUGTRAQ", "refsource": "SECTRACK",
"url" : "http://www.securityfocus.com/archive/1/539579/100/0/threaded" "url": "http://www.securitytracker.com/id/1036936"
}, },
{ {
"name": "http://hyp3rlinx.altervista.org/advisories/SNORT-DLL-HIJACK.txt", "name": "http://hyp3rlinx.altervista.org/advisories/SNORT-DLL-HIJACK.txt",
"refsource": "MISC", "refsource": "MISC",
"url": "http://hyp3rlinx.altervista.org/advisories/SNORT-DLL-HIJACK.txt" "url": "http://hyp3rlinx.altervista.org/advisories/SNORT-DLL-HIJACK.txt"
}, },
{
"name" : "http://packetstormsecurity.com/files/138915/Snort-2.9.7.0-WIN32-DLL-Hijacking.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/138915/Snort-2.9.7.0-WIN32-DLL-Hijacking.html"
},
{ {
"name": "93269", "name": "93269",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/93269" "url": "http://www.securityfocus.com/bid/93269"
}, },
{ {
"name" : "1036936", "name": "http://packetstormsecurity.com/files/138915/Snort-2.9.7.0-WIN32-DLL-Hijacking.html",
"refsource" : "SECTRACK", "refsource": "MISC",
"url" : "http://www.securitytracker.com/id/1036936" "url": "http://packetstormsecurity.com/files/138915/Snort-2.9.7.0-WIN32-DLL-Hijacking.html"
},
{
"name": "20161012 Snort v2.9.7.0-WIN32 DLL Hijack",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/539579/100/0/threaded"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://www.prevanders.net/dwarfbug.html",
"refsource": "CONFIRM",
"url": "https://www.prevanders.net/dwarfbug.html"
},
{ {
"name": "[oss-security] 20160524 CVE request: Multiple vunerabilities in libdwarf & dwarfdump", "name": "[oss-security] 20160524 CVE request: Multiple vunerabilities in libdwarf & dwarfdump",
"refsource": "MLIST", "refsource": "MLIST",
@ -66,11 +71,6 @@
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1332145", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1332145",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1332145" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1332145"
},
{
"name" : "https://www.prevanders.net/dwarfbug.html",
"refsource" : "CONFIRM",
"url" : "https://www.prevanders.net/dwarfbug.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5451", "ID": "CVE-2016-5451",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1036400",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036400"
},
{ {
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
}, },
{
"name" : "91787",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/91787"
},
{ {
"name": "91954", "name": "91954",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/91954" "url": "http://www.securityfocus.com/bid/91954"
}, },
{ {
"name" : "1036400", "name": "91787",
"refsource" : "SECTRACK", "refsource": "BID",
"url" : "http://www.securitytracker.com/id/1036400" "url": "http://www.securityfocus.com/bid/91787"
} }
] ]
} }

View File

@ -57,11 +57,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://launchpad.support.sap.com/#/notes/2696714",
"refsource" : "MISC",
"url" : "https://launchpad.support.sap.com/#/notes/2696714"
},
{ {
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943", "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943",
"refsource": "MISC", "refsource": "MISC",
@ -71,6 +66,11 @@
"name": "106998", "name": "106998",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/106998" "url": "http://www.securityfocus.com/bid/106998"
},
{
"name": "https://launchpad.support.sap.com/#/notes/2696714",
"refsource": "MISC",
"url": "https://launchpad.support.sap.com/#/notes/2696714"
} }
] ]
} }