"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 02:37:40 +00:00
parent 962b6290c9
commit ea55c408fb
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
57 changed files with 3770 additions and 3770 deletions

View File

@ -57,16 +57,16 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/465547/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/465547/100/0/threaded"
}, },
{
"name" : "ADV-2007-1386",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1386"
},
{ {
"name": "24873", "name": "24873",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24873" "url": "http://secunia.com/advisories/24873"
}, },
{
"name": "ADV-2007-1386",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1386"
},
{ {
"name": "2595", "name": "2595",
"refsource": "SREASON", "refsource": "SREASON",

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070421 WS_FTP Home 2007 NetscapeFTPHandler denial of service",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/466576/100/0/threaded"
},
{ {
"name": "20070422 Re: WS_FTP Home 2007 NetscapeFTPHandler denial of service", "name": "20070422 Re: WS_FTP Home 2007 NetscapeFTPHandler denial of service",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/466647/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/466647/100/0/threaded"
}, },
{
"name": "20070421 WS_FTP Home 2007 NetscapeFTPHandler denial of service",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/466576/100/0/threaded"
},
{ {
"name": "23584", "name": "23584",
"refsource": "BID", "refsource": "BID",

View File

@ -53,24 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "BEA07-166.00", "name": "weblogic-portal-groupspace-xss(34283)",
"refsource" : "BEA", "refsource": "XF",
"url" : "http://dev2dev.bea.com/pub/advisory/235" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34283"
},
{
"name" : "ADV-2007-1815",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1815"
},
{
"name" : "36066",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/36066"
},
{
"name" : "1018060",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018060"
}, },
{ {
"name": "25284", "name": "25284",
@ -78,9 +63,24 @@
"url": "http://secunia.com/advisories/25284" "url": "http://secunia.com/advisories/25284"
}, },
{ {
"name" : "weblogic-portal-groupspace-xss(34283)", "name": "36066",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34283" "url": "http://osvdb.org/36066"
},
{
"name": "BEA07-166.00",
"refsource": "BEA",
"url": "http://dev2dev.bea.com/pub/advisory/235"
},
{
"name": "1018060",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018060"
},
{
"name": "ADV-2007-1815",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1815"
} }
] ]
} }

View File

@ -52,20 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://bugzilla.ostermiller.com/show_bug.cgi?id=151",
"refsource" : "CONFIRM",
"url" : "http://bugzilla.ostermiller.com/show_bug.cgi?id=151"
},
{ {
"name": "http://ostermiller.org/contactform/", "name": "http://ostermiller.org/contactform/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://ostermiller.org/contactform/" "url": "http://ostermiller.org/contactform/"
}, },
{ {
"name" : "20070620 bit amusing (Contact Form 2.00.02)", "name": "36372",
"refsource" : "VIM", "refsource": "OSVDB",
"url" : "http://www.attrition.org/pipermail/vim/2007-June/001669.html" "url": "http://osvdb.org/36372"
}, },
{ {
"name": "24559", "name": "24559",
@ -78,19 +73,24 @@
"url": "http://www.vupen.com/english/advisories/2007/2333" "url": "http://www.vupen.com/english/advisories/2007/2333"
}, },
{ {
"name" : "36372", "name": "http://bugzilla.ostermiller.com/show_bug.cgi?id=151",
"refsource" : "OSVDB", "refsource": "CONFIRM",
"url" : "http://osvdb.org/36372" "url": "http://bugzilla.ostermiller.com/show_bug.cgi?id=151"
},
{
"name" : "25812",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25812"
}, },
{ {
"name": "contactform-apostrophe-xss(34962)", "name": "contactform-apostrophe-xss(34962)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34962" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34962"
},
{
"name": "20070620 bit amusing (Contact Form 2.00.02)",
"refsource": "VIM",
"url": "http://www.attrition.org/pipermail/vim/2007-June/001669.html"
},
{
"name": "25812",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25812"
} }
] ]
} }

View File

@ -57,6 +57,11 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.sipera.com/index.php?action=resources,threat_advisory&tid=275&" "url": "http://www.sipera.com/index.php?action=resources,threat_advisory&tid=275&"
}, },
{
"name": "25840",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25840"
},
{ {
"name": "24532", "name": "24532",
"refsource": "BID", "refsource": "BID",
@ -66,11 +71,6 @@
"name": "37753", "name": "37753",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/37753" "url": "http://osvdb.org/37753"
},
{
"name" : "25840",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25840"
} }
] ]
} }

View File

@ -52,15 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "http://www.csnc.ch/advisory/sap01.html",
"refsource": "MISC",
"url": "http://www.csnc.ch/advisory/sap01.html"
},
{
"name": "2850",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2850"
},
{ {
"name": "20070627 SAP Web Dynpro Java (BC-WD-JAV) Vulnerability", "name": "20070627 SAP Web Dynpro Java (BC-WD-JAV) Vulnerability",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/472341/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/472341/100/0/threaded"
}, },
{ {
"name" : "http://www.csnc.ch/advisory/sap01.html", "name": "25866",
"refsource" : "MISC", "refsource": "SECUNIA",
"url" : "http://www.csnc.ch/advisory/sap01.html" "url": "http://secunia.com/advisories/25866"
}, },
{ {
"name": "ADV-2007-2381", "name": "ADV-2007-2381",
@ -71,16 +81,6 @@
"name": "37748", "name": "37748",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/37748" "url": "http://osvdb.org/37748"
},
{
"name" : "25866",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25866"
},
{
"name" : "2850",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2850"
} }
] ]
} }

View File

@ -53,15 +53,20 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "4136", "name": "25922",
"refsource" : "EXPLOIT-DB", "refsource": "SECUNIA",
"url" : "https://www.exploit-db.com/exploits/4136" "url": "http://secunia.com/advisories/25922"
}, },
{ {
"name": "24720", "name": "24720",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/24720" "url": "http://www.securityfocus.com/bid/24720"
}, },
{
"name": "youtube-msg-sql-injection(35192)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35192"
},
{ {
"name": "ADV-2007-2400", "name": "ADV-2007-2400",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -73,14 +78,9 @@
"url": "http://osvdb.org/36328" "url": "http://osvdb.org/36328"
}, },
{ {
"name" : "25922", "name": "4136",
"refsource" : "SECUNIA", "refsource": "EXPLOIT-DB",
"url" : "http://secunia.com/advisories/25922" "url": "https://www.exploit-db.com/exploits/4136"
},
{
"name" : "youtube-msg-sql-injection(35192)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35192"
} }
] ]
} }

View File

@ -52,21 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://sourceforge.net/project/shownotes.php?group_id=118575&release_id=519061",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/project/shownotes.php?group_id=118575&release_id=519061"
},
{
"name" : "24732",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24732"
},
{ {
"name": "37793", "name": "37793",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/37793" "url": "http://osvdb.org/37793"
}, },
{
"name": "http://sourceforge.net/project/shownotes.php?group_id=118575&release_id=519061",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?group_id=118575&release_id=519061"
},
{ {
"name": "25791", "name": "25791",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -76,6 +71,11 @@
"name": "esqlanelapse-multiple-unspecified(35227)", "name": "esqlanelapse-multiple-unspecified(35227)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35227" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35227"
},
{
"name": "24732",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24732"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2007-4348", "ID": "CVE-2007-4348",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,34 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://secunia.com/secunia_research/2007-75/advisory", "name": "ADV-2007-3635",
"refsource" : "MISC", "refsource": "VUPEN",
"url" : "http://secunia.com/secunia_research/2007-75/advisory" "url": "http://www.vupen.com/english/advisories/2007/3635"
},
{
"name": "ibm-tsm-cad-xss(38125)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38125"
}, },
{ {
"name": "26221", "name": "26221",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/26221" "url": "http://www.securityfocus.com/bid/26221"
}, },
{
"name" : "ADV-2007-3635",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3635"
},
{
"name" : "1018868",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018868"
},
{ {
"name": "27013", "name": "27013",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27013" "url": "http://secunia.com/advisories/27013"
}, },
{ {
"name" : "ibm-tsm-cad-xss(38125)", "name": "http://secunia.com/secunia_research/2007-75/advisory",
"refsource" : "XF", "refsource": "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38125" "url": "http://secunia.com/secunia_research/2007-75/advisory"
},
{
"name": "1018868",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018868"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.nufw.org/+NuFW-2-2-4,201+.html", "name": "26546",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://www.nufw.org/+NuFW-2-2-4,201+.html" "url": "http://secunia.com/advisories/26546"
},
{
"name" : "25379",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25379"
}, },
{ {
"name": "39725", "name": "39725",
@ -68,9 +63,14 @@
"url": "http://osvdb.org/39725" "url": "http://osvdb.org/39725"
}, },
{ {
"name" : "26546", "name": "25379",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/26546" "url": "http://www.securityfocus.com/bid/25379"
},
{
"name": "http://www.nufw.org/+NuFW-2-2-4,201+.html",
"refsource": "CONFIRM",
"url": "http://www.nufw.org/+NuFW-2-2-4,201+.html"
}, },
{ {
"name": "nufw-arrivaltime-security-bypass(36134)", "name": "nufw-arrivaltime-security-bypass(36134)",

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20071117 Sciurus Hosting Panel Code İnjection", "name": "3388",
"refsource" : "BUGTRAQ", "refsource": "SREASON",
"url" : "http://www.securityfocus.com/archive/1/483867/100/0/threaded" "url": "http://securityreason.com/securityalert/3388"
}, },
{ {
"name": "4635", "name": "4635",
@ -63,9 +63,14 @@
"url": "https://www.exploit-db.com/exploits/4635" "url": "https://www.exploit-db.com/exploits/4635"
}, },
{ {
"name" : "http://www.r57.li/exploit.txt", "name": "20071117 Sciurus Hosting Panel Code İnjection",
"refsource" : "MISC", "refsource": "BUGTRAQ",
"url" : "http://www.r57.li/exploit.txt" "url": "http://www.securityfocus.com/archive/1/483867/100/0/threaded"
},
{
"name": "sciurus-savenews-code-execution(38543)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38543"
}, },
{ {
"name": "26481", "name": "26481",
@ -73,14 +78,9 @@
"url": "http://www.securityfocus.com/bid/26481" "url": "http://www.securityfocus.com/bid/26481"
}, },
{ {
"name" : "3388", "name": "http://www.r57.li/exploit.txt",
"refsource" : "SREASON", "refsource": "MISC",
"url" : "http://securityreason.com/securityalert/3388" "url": "http://www.r57.li/exploit.txt"
},
{
"name" : "sciurus-savenews-code-execution(38543)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38543"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://ispsystem.com/en/support/changelog/ispmgr.html?all=yes",
"refsource" : "MISC",
"url" : "http://ispsystem.com/en/support/changelog/ispmgr.html?all=yes"
},
{
"name" : "http://www.fortconsult.net/images/pdf/advisories/ispmgr_nov2007.pdf",
"refsource" : "MISC",
"url" : "http://www.fortconsult.net/images/pdf/advisories/ispmgr_nov2007.pdf"
},
{ {
"name": "26503", "name": "26503",
"refsource": "BID", "refsource": "BID",
@ -72,6 +62,16 @@
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/42337" "url": "http://osvdb.org/42337"
}, },
{
"name": "http://www.fortconsult.net/images/pdf/advisories/ispmgr_nov2007.pdf",
"refsource": "MISC",
"url": "http://www.fortconsult.net/images/pdf/advisories/ispmgr_nov2007.pdf"
},
{
"name": "http://ispsystem.com/en/support/changelog/ispmgr.html?all=yes",
"refsource": "MISC",
"url": "http://ispsystem.com/en/support/changelog/ispmgr.html?all=yes"
},
{ {
"name": "27585", "name": "27585",
"refsource": "SECUNIA", "refsource": "SECUNIA",

View File

@ -58,9 +58,9 @@
"url": "http://support.citrix.com/article/CTX115281" "url": "http://support.citrix.com/article/CTX115281"
}, },
{ {
"name" : "26705", "name": "edgesight-configuration-file-info-disclosure(38861)",
"refsource" : "BID", "refsource": "XF",
"url" : "http://www.securityfocus.com/bid/26705" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38861"
}, },
{ {
"name": "ADV-2007-4091", "name": "ADV-2007-4091",
@ -72,15 +72,15 @@
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019050" "url": "http://www.securitytracker.com/id?1019050"
}, },
{
"name": "26705",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26705"
},
{ {
"name": "27935", "name": "27935",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27935" "url": "http://secunia.com/advisories/27935"
},
{
"name" : "edgesight-configuration-file-info-disclosure(38861)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38861"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://code.google.com/p/pyftpdlib/issues/detail?id=11",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/pyftpdlib/issues/detail?id=11"
},
{ {
"name": "http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY", "name": "http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY" "url": "http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY"
}, },
{
"name": "http://code.google.com/p/pyftpdlib/issues/detail?id=11",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/pyftpdlib/issues/detail?id=11"
},
{ {
"name": "http://code.google.com/p/pyftpdlib/source/detail?r=32", "name": "http://code.google.com/p/pyftpdlib/source/detail?r=32",
"refsource": "CONFIRM", "refsource": "CONFIRM",

View File

@ -58,29 +58,29 @@
"url": "http://www.exploit-db.com/exploits/12458" "url": "http://www.exploit-db.com/exploits/12458"
}, },
{ {
"name" : "http://packetstormsecurity.org/1004-exploits/scratcher-sqlxss.txt", "name": "scratcher-projects-xss(58235)",
"refsource" : "MISC", "refsource": "XF",
"url" : "http://packetstormsecurity.org/1004-exploits/scratcher-sqlxss.txt" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58235"
},
{
"name" : "39827",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/39827"
}, },
{ {
"name": "64219", "name": "64219",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/64219" "url": "http://osvdb.org/64219"
}, },
{
"name": "http://packetstormsecurity.org/1004-exploits/scratcher-sqlxss.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/1004-exploits/scratcher-sqlxss.txt"
},
{ {
"name": "39631", "name": "39631",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39631" "url": "http://secunia.com/advisories/39631"
}, },
{ {
"name" : "scratcher-projects-xss(58235)", "name": "39827",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/58235" "url": "http://www.securityfocus.com/bid/39827"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2010-1792", "ID": "CVE-2010-1792",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,95 +52,95 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.apple.com/kb/HT4276",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4276"
},
{
"name" : "http://support.apple.com/kb/HT4564",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4564"
},
{
"name" : "APPLE-SA-2010-07-28-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2010//Jul/msg00001.html"
},
{
"name" : "APPLE-SA-2011-03-09-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html"
},
{ {
"name": "MDVSA-2011:039", "name": "MDVSA-2011:039",
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:039" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:039"
}, },
{
"name" : "RHSA-2011:0177",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0177.html"
},
{
"name" : "SUSE-SR:2010:018",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html"
},
{
"name" : "SUSE-SR:2011:002",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name" : "USN-1006-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1006-1"
},
{
"name" : "42020",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/42020"
},
{
"name" : "oval:org.mitre.oval:def:11898",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11898"
},
{
"name" : "41856",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/41856"
},
{
"name" : "43068",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43068"
},
{
"name" : "43086",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43086"
},
{ {
"name": "ADV-2010-2722", "name": "ADV-2010-2722",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2722" "url": "http://www.vupen.com/english/advisories/2010/2722"
}, },
{
"name": "43068",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43068"
},
{
"name": "http://support.apple.com/kb/HT4564",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4564"
},
{
"name": "http://support.apple.com/kb/HT4276",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4276"
},
{
"name": "USN-1006-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1006-1"
},
{
"name": "41856",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41856"
},
{ {
"name": "ADV-2011-0212", "name": "ADV-2011-0212",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0212" "url": "http://www.vupen.com/english/advisories/2011/0212"
}, },
{
"name": "APPLE-SA-2010-07-28-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Jul/msg00001.html"
},
{ {
"name": "ADV-2011-0216", "name": "ADV-2011-0216",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0216" "url": "http://www.vupen.com/english/advisories/2011/0216"
}, },
{
"name": "43086",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43086"
},
{
"name": "SUSE-SR:2011:002",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name": "APPLE-SA-2011-03-09-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html"
},
{
"name": "RHSA-2011:0177",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0177.html"
},
{
"name": "oval:org.mitre.oval:def:11898",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11898"
},
{ {
"name": "ADV-2011-0552", "name": "ADV-2011-0552",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0552" "url": "http://www.vupen.com/english/advisories/2011/0552"
},
{
"name": "42020",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/42020"
},
{
"name": "SUSE-SR:2010:018",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0041", "ID": "CVE-2014-0041",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://github.com/openstack/heat-templates/commit/65a4f8bebc72da71c616e2e378b7b1ac354db1a3CONFIRM:",
"refsource": "CONFIRM",
"url": "https://github.com/openstack/heat-templates/commit/65a4f8bebc72da71c616e2e378b7b1ac354db1a3CONFIRM:"
},
{ {
"name": "https://bugs.launchpad.net/heat-templates/+bug/1267635", "name": "https://bugs.launchpad.net/heat-templates/+bug/1267635",
"refsource": "MISC", "refsource": "MISC",
@ -62,11 +67,6 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1059515" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1059515"
}, },
{
"name" : "https://github.com/openstack/heat-templates/commit/65a4f8bebc72da71c616e2e378b7b1ac354db1a3CONFIRM:",
"refsource" : "CONFIRM",
"url" : "https://github.com/openstack/heat-templates/commit/65a4f8bebc72da71c616e2e378b7b1ac354db1a3CONFIRM:"
},
{ {
"name": "RHSA-2014:0579", "name": "RHSA-2014:0579",
"refsource": "REDHAT", "refsource": "REDHAT",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0042", "ID": "CVE-2014-0042",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,16 +57,16 @@
"refsource": "MISC", "refsource": "MISC",
"url": "https://bugs.launchpad.net/heat-templates/+bug/1267635" "url": "https://bugs.launchpad.net/heat-templates/+bug/1267635"
}, },
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1059520",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1059520"
},
{ {
"name": "https://github.com/openstack/heat-templates/commit/65a4f8bebc72da71c616e2e378b7b1ac354db1a3", "name": "https://github.com/openstack/heat-templates/commit/65a4f8bebc72da71c616e2e378b7b1ac354db1a3",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/openstack/heat-templates/commit/65a4f8bebc72da71c616e2e378b7b1ac354db1a3" "url": "https://github.com/openstack/heat-templates/commit/65a4f8bebc72da71c616e2e378b7b1ac354db1a3"
}, },
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1059520",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1059520"
},
{ {
"name": "RHSA-2014:0579", "name": "RHSA-2014:0579",
"refsource": "REDHAT", "refsource": "REDHAT",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0099", "ID": "CVE-2014-0099",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,61 +52,136 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "http://advisories.mageia.org/MGASA-2014-0268.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2014-0268.html"
},
{
"name": "59121",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59121"
},
{
"name": "RHSA-2015:0765",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0765.html"
},
{
"name": "59732",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59732"
},
{
"name": "59835",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59835"
},
{ {
"name": "20140527 Re: [SECURITY] CVE-2014-0099 Apache Tomcat information disclosure", "name": "20140527 Re: [SECURITY] CVE-2014-0099 Apache Tomcat information disclosure",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/532221/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/532221/100/0/threaded"
}, },
{ {
"name" : "20140527 [SECURITY] CVE-2014-0097 Apache Tomcat information disclosure", "name": "RHSA-2015:0675",
"refsource" : "BUGTRAQ", "refsource": "REDHAT",
"url" : "http://www.securityfocus.com/archive/1/532218/100/0/threaded" "url": "http://rhn.redhat.com/errata/RHSA-2015-0675.html"
}, },
{ {
"name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"refsource" : "BUGTRAQ", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/archive/1/534161/100/0/threaded" "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
}, },
{ {
"name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21681528",
"refsource" : "FULLDISC", "refsource": "CONFIRM",
"url" : "http://seclists.org/fulldisclosure/2014/Dec/23" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21681528"
},
{
"name": "MDVSA-2015:052",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:052"
},
{
"name": "RHSA-2015:0720",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0720.html"
}, },
{ {
"name": "20140527 [SECURITY] Re: [SECURITY] CVE-2014-0099 Apache Tomcat information disclosure", "name": "20140527 [SECURITY] Re: [SECURITY] CVE-2014-0099 Apache Tomcat information disclosure",
"refsource": "FULLDISC", "refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/May/140" "url": "http://seclists.org/fulldisclosure/2014/May/140"
}, },
{
"name": "59849",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59849"
},
{
"name": "http://linux.oracle.com/errata/ELSA-2014-0865.html",
"refsource": "CONFIRM",
"url": "http://linux.oracle.com/errata/ELSA-2014-0865.html"
},
{
"name": "67668",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/67668"
},
{
"name": "MDVSA-2015:084",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:084"
},
{
"name": "DSA-3530",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3530"
},
{
"name": "59678",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59678"
},
{
"name": "HPSBUX03102",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=141017844705317&w=2"
},
{ {
"name": "20140527 [SECURITY] CVE-2014-0097 Apache Tomcat information disclosure", "name": "20140527 [SECURITY] CVE-2014-0097 Apache Tomcat information disclosure",
"refsource" : "FULLDISC", "refsource": "BUGTRAQ",
"url" : "http://seclists.org/fulldisclosure/2014/May/138" "url": "http://www.securityfocus.com/archive/1/532218/100/0/threaded"
},
{
"name" : "http://svn.apache.org/viewvc?view=revision&revision=1578812",
"refsource" : "CONFIRM",
"url" : "http://svn.apache.org/viewvc?view=revision&revision=1578812"
},
{
"name" : "http://svn.apache.org/viewvc?view=revision&revision=1578814",
"refsource" : "CONFIRM",
"url" : "http://svn.apache.org/viewvc?view=revision&revision=1578814"
},
{
"name" : "http://svn.apache.org/viewvc?view=revision&revision=1580473",
"refsource" : "CONFIRM",
"url" : "http://svn.apache.org/viewvc?view=revision&revision=1580473"
},
{
"name" : "http://tomcat.apache.org/security-6.html",
"refsource" : "CONFIRM",
"url" : "http://tomcat.apache.org/security-6.html"
}, },
{ {
"name": "http://tomcat.apache.org/security-7.html", "name": "http://tomcat.apache.org/security-7.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-7.html" "url": "http://tomcat.apache.org/security-7.html"
}, },
{
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
},
{
"name": "MDVSA-2015:053",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:053"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name": "HPSBUX03150",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=141390017113542&w=2"
},
{
"name": "FEDORA-2015-2109",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150282.html"
},
{ {
"name": "http://tomcat.apache.org/security-8.html", "name": "http://tomcat.apache.org/security-8.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -118,39 +193,9 @@
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678231" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678231"
}, },
{ {
"name" : "http://linux.oracle.com/errata/ELSA-2014-0865.html", "name": "http://tomcat.apache.org/security-6.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "http://linux.oracle.com/errata/ELSA-2014-0865.html" "url": "http://tomcat.apache.org/security-6.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21680603",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21680603"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21681528",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21681528"
},
{
"name" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
},
{
"name" : "http://advisories.mageia.org/MGASA-2014-0268.html",
"refsource" : "CONFIRM",
"url" : "http://advisories.mageia.org/MGASA-2014-0268.html"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
}, },
{ {
"name": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013", "name": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013",
@ -158,89 +203,9 @@
"url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013" "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013"
}, },
{ {
"name" : "DSA-3530", "name": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"refsource" : "DEBIAN", "refsource": "CONFIRM",
"url" : "http://www.debian.org/security/2016/dsa-3530" "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
},
{
"name" : "DSA-3447",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3447"
},
{
"name" : "FEDORA-2015-2109",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150282.html"
},
{
"name" : "HPSBUX03150",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=141390017113542&w=2"
},
{
"name" : "HPSBOV03503",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=144498216801440&w=2"
},
{
"name" : "HPSBUX03102",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=141017844705317&w=2"
},
{
"name" : "SSRT101681",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=141017844705317&w=2"
},
{
"name" : "MDVSA-2015:052",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:052"
},
{
"name" : "MDVSA-2015:053",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:053"
},
{
"name" : "MDVSA-2015:084",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:084"
},
{
"name" : "RHSA-2015:0675",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0675.html"
},
{
"name" : "RHSA-2015:0720",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0720.html"
},
{
"name" : "RHSA-2015:0765",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0765.html"
},
{
"name" : "67668",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/67668"
},
{
"name" : "1030302",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030302"
},
{
"name" : "59678",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59678"
},
{
"name" : "59835",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59835"
}, },
{ {
"name": "59873", "name": "59873",
@ -248,14 +213,44 @@
"url": "http://secunia.com/advisories/59873" "url": "http://secunia.com/advisories/59873"
}, },
{ {
"name" : "59732", "name": "http://svn.apache.org/viewvc?view=revision&revision=1578814",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/59732" "url": "http://svn.apache.org/viewvc?view=revision&revision=1578814"
}, },
{ {
"name" : "59849", "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource" : "SECUNIA", "refsource": "FULLDISC",
"url" : "http://secunia.com/advisories/59849" "url": "http://seclists.org/fulldisclosure/2014/Dec/23"
},
{
"name": "1030302",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030302"
},
{
"name": "HPSBOV03503",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=144498216801440&w=2"
},
{
"name": "SSRT101681",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=141017844705317&w=2"
},
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=1578812",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1578812"
},
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=1580473",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1580473"
},
{
"name": "DSA-3447",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3447"
}, },
{ {
"name": "60729", "name": "60729",
@ -268,9 +263,14 @@
"url": "http://secunia.com/advisories/60793" "url": "http://secunia.com/advisories/60793"
}, },
{ {
"name" : "59121", "name": "20140527 [SECURITY] CVE-2014-0097 Apache Tomcat information disclosure",
"refsource" : "SECUNIA", "refsource": "FULLDISC",
"url" : "http://secunia.com/advisories/59121" "url": "http://seclists.org/fulldisclosure/2014/May/138"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21680603",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680603"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0171", "ID": "CVE-2014-0171",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://issues.jboss.org/browse/TEIID-2911",
"refsource" : "CONFIRM",
"url" : "https://issues.jboss.org/browse/TEIID-2911"
},
{ {
"name": "RHSA-2015:0034", "name": "RHSA-2015:0034",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0034.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-0034.html"
},
{
"name": "https://issues.jboss.org/browse/TEIID-2911",
"refsource": "CONFIRM",
"url": "https://issues.jboss.org/browse/TEIID-2911"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-1967", "ID": "CVE-2014-1967",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://play.google.com/store/apps/details?id=jp.denimoba" "url": "https://play.google.com/store/apps/details?id=jp.denimoba"
}, },
{
"name" : "JVN#48810179",
"refsource" : "JVN",
"url" : "http://jvn.jp/en/jp/JVN48810179/index.html"
},
{ {
"name": "JVNDB-2014-000022", "name": "JVNDB-2014-000022",
"refsource": "JVNDB", "refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000022" "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000022"
},
{
"name": "JVN#48810179",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN48810179/index.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-5334", "ID": "CVE-2014-5334",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20140819 Re: FreeNAS default blank password",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/08/19/2"
},
{ {
"name": "https://bugs.freenas.org/issues/5844", "name": "https://bugs.freenas.org/issues/5844",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "69249", "name": "69249",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/69249" "url": "http://www.securityfocus.com/bid/69249"
},
{
"name": "[oss-security] 20140819 Re: FreeNAS default blank password",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/08/19/2"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5556", "ID": "CVE-2014-5556",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#478657", "name": "VU#478657",
"refsource": "CERT-VN", "refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497", "name": "VU#582497",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5826", "ID": "CVE-2014-5826",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#423041", "name": "VU#423041",
"refsource": "CERT-VN", "refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497", "name": "VU#582497",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5873", "ID": "CVE-2014-5873",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "name": "VU#803553",
"refsource" : "MISC", "refsource": "CERT-VN",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" "url": "http://www.kb.cert.org/vuls/id/803553"
}, },
{ {
"name": "VU#582497", "name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
}, },
{ {
"name" : "VU#803553", "name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "CERT-VN", "refsource": "MISC",
"url" : "http://www.kb.cert.org/vuls/id/803553" "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20150221 WooCommerce WordPress plugin 2.2.10 Reflected XSS", "name": "74885",
"refsource" : "FULLDISC", "refsource": "BID",
"url" : "http://seclists.org/fulldisclosure/2015/Feb/75" "url": "http://www.securityfocus.com/bid/74885"
}, },
{ {
"name": "http://packetstormsecurity.com/files/130458/WordPress-WooCommerce-2.2.10-Cross-Site-Scripting.html", "name": "http://packetstormsecurity.com/files/130458/WordPress-WooCommerce-2.2.10-Cross-Site-Scripting.html",
@ -68,9 +68,9 @@
"url": "https://wordpress.org/plugins/woocommerce/changelog/" "url": "https://wordpress.org/plugins/woocommerce/changelog/"
}, },
{ {
"name" : "74885", "name": "20150221 WooCommerce WordPress plugin 2.2.10 Reflected XSS",
"refsource" : "BID", "refsource": "FULLDISC",
"url" : "http://www.securityfocus.com/bid/74885" "url": "http://seclists.org/fulldisclosure/2015/Feb/75"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2015-2917", "ID": "CVE-2015-2917",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@debian.org",
"ID": "CVE-2016-10129", "ID": "CVE-2016-10129",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20170110 CVE Request: two security fixes in libgit2 0.25.1, 0.24.6", "name": "https://libgit2.github.com/security/",
"refsource" : "MLIST", "refsource": "CONFIRM",
"url" : "http://www.openwall.com/lists/oss-security/2017/01/10/5" "url": "https://libgit2.github.com/security/"
},
{
"name" : "[oss-security] 20170110 Re: CVE Request: two security fixes in libgit2 0.25.1, 0.24.6",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2017/01/11/6"
}, },
{ {
"name": "https://github.com/libgit2/libgit2/commit/2fdef641fd0dd2828bd948234ae86de75221a11a", "name": "https://github.com/libgit2/libgit2/commit/2fdef641fd0dd2828bd948234ae86de75221a11a",
@ -73,9 +68,14 @@
"url": "https://github.com/libgit2/libgit2/commit/84d30d569ada986f3eef527cbdb932643c2dd037" "url": "https://github.com/libgit2/libgit2/commit/84d30d569ada986f3eef527cbdb932643c2dd037"
}, },
{ {
"name" : "https://libgit2.github.com/security/", "name": "[oss-security] 20170110 CVE Request: two security fixes in libgit2 0.25.1, 0.24.6",
"refsource" : "CONFIRM", "refsource": "MLIST",
"url" : "https://libgit2.github.com/security/" "url": "http://www.openwall.com/lists/oss-security/2017/01/10/5"
},
{
"name": "[oss-security] 20170110 Re: CVE Request: two security fixes in libgit2 0.25.1, 0.24.6",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/01/11/6"
}, },
{ {
"name": "openSUSE-SU-2017:0397", "name": "openSUSE-SU-2017:0397",
@ -87,15 +87,15 @@
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2017-02/msg00036.html" "url": "http://lists.opensuse.org/opensuse-updates/2017-02/msg00036.html"
}, },
{
"name" : "openSUSE-SU-2017:0484",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2017-02/msg00072.html"
},
{ {
"name": "95339", "name": "95339",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/95339" "url": "http://www.securityfocus.com/bid/95339"
},
{
"name": "openSUSE-SU-2017:0484",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2017-02/msg00072.html"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://bugs.cacti.net/view.php?id=2697", "name": "https://github.com/Cacti/cacti/commit/69983495cd41bf0903fe02baeef84b1fa85f2846",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "http://bugs.cacti.net/view.php?id=2697" "url": "https://github.com/Cacti/cacti/commit/69983495cd41bf0903fe02baeef84b1fa85f2846"
}, },
{ {
"name": "http://www.cacti.net/release_notes_1_0_0.php", "name": "http://www.cacti.net/release_notes_1_0_0.php",
@ -63,9 +63,9 @@
"url": "http://www.cacti.net/release_notes_1_0_0.php" "url": "http://www.cacti.net/release_notes_1_0_0.php"
}, },
{ {
"name" : "https://github.com/Cacti/cacti/commit/69983495cd41bf0903fe02baeef84b1fa85f2846", "name": "http://bugs.cacti.net/view.php?id=2697",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://github.com/Cacti/cacti/commit/69983495cd41bf0903fe02baeef84b1fa85f2846" "url": "http://bugs.cacti.net/view.php?id=2697"
}, },
{ {
"name": "https://web.archive.org/web/20160817090458/http://bugs.cacti.net/view.php?id=2697", "name": "https://web.archive.org/web/20160817090458/http://bugs.cacti.net/view.php?id=2697",

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-3268", "ID": "CVE-2016-3268",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-4439", "ID": "CVE-2016-4439",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,15 +53,35 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20160519 CVE-2016-4439 Qemu: scsi: esp: OOB write while writing to 's->cmdbuf' in esp_reg_write", "name": "USN-3047-1",
"refsource" : "MLIST", "refsource": "UBUNTU",
"url" : "http://www.openwall.com/lists/oss-security/2016/05/19/3" "url": "http://www.ubuntu.com/usn/USN-3047-1"
},
{
"name": "90760",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/90760"
},
{
"name": "GLSA-201609-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201609-01"
},
{
"name": "USN-3047-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3047-2"
}, },
{ {
"name": "[qemu-devel] 20160519 [PATCH 1/2] scsi: check command buffer length before write(CVE-2016-4439)", "name": "[qemu-devel] 20160519 [PATCH 1/2] scsi: check command buffer length before write(CVE-2016-4439)",
"refsource": "MLIST", "refsource": "MLIST",
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03273.html" "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03273.html"
}, },
{
"name": "[oss-security] 20160519 CVE-2016-4439 Qemu: scsi: esp: OOB write while writing to 's->cmdbuf' in esp_reg_write",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/05/19/3"
},
{ {
"name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update", "name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update",
"refsource": "MLIST", "refsource": "MLIST",
@ -71,26 +91,6 @@
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1337502", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1337502",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337502" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337502"
},
{
"name" : "GLSA-201609-01",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201609-01"
},
{
"name" : "USN-3047-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3047-1"
},
{
"name" : "USN-3047-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3047-2"
},
{
"name" : "90760",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/90760"
} }
] ]
} }

View File

@ -52,150 +52,150 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "46006",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/46006/"
},
{
"name" : "[oss-security] 20160504 CVE Request: kernel information leak vulnerability in rtnetlink",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/05/04/27"
},
{
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5f8e44741f9f216e33736ea4ec65ca9ac03036e6",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5f8e44741f9f216e33736ea4ec65ca9ac03036e6"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1333316",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1333316"
},
{
"name" : "https://github.com/torvalds/linux/commit/5f8e44741f9f216e33736ea4ec65ca9ac03036e6",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/5f8e44741f9f216e33736ea4ec65ca9ac03036e6"
},
{
"name" : "DSA-3607",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3607"
},
{
"name" : "SUSE-SU-2016:1672",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html"
},
{ {
"name": "SUSE-SU-2016:1690", "name": "SUSE-SU-2016:1690",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html"
}, },
{
"name" : "SUSE-SU-2016:1696",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html"
},
{
"name" : "SUSE-SU-2016:1937",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html"
},
{
"name" : "openSUSE-SU-2016:1641",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html"
},
{
"name" : "SUSE-SU-2016:1985",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html"
},
{
"name" : "SUSE-SU-2016:2074",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html"
},
{
"name" : "SUSE-SU-2016:2105",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html"
},
{
"name" : "openSUSE-SU-2016:2184",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html"
},
{
"name" : "USN-2996-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2996-1"
},
{
"name" : "USN-2997-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2997-1"
},
{
"name" : "USN-2989-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2989-1"
},
{
"name" : "USN-2998-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2998-1"
},
{
"name" : "USN-3000-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3000-1"
},
{
"name" : "USN-3001-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3001-1"
},
{
"name" : "USN-3002-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3002-1"
},
{
"name" : "USN-3003-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3003-1"
},
{
"name" : "USN-3004-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3004-1"
},
{
"name" : "USN-3005-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3005-1"
},
{ {
"name": "USN-3006-1", "name": "USN-3006-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3006-1" "url": "http://www.ubuntu.com/usn/USN-3006-1"
}, },
{ {
"name" : "USN-3007-1", "name": "USN-3004-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3007-1" "url": "http://www.ubuntu.com/usn/USN-3004-1"
},
{
"name": "USN-3001-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3001-1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1333316",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333316"
},
{
"name": "SUSE-SU-2016:1696",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html"
},
{
"name": "https://github.com/torvalds/linux/commit/5f8e44741f9f216e33736ea4ec65ca9ac03036e6",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/5f8e44741f9f216e33736ea4ec65ca9ac03036e6"
}, },
{ {
"name": "90051", "name": "90051",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/90051" "url": "http://www.securityfocus.com/bid/90051"
},
{
"name": "USN-3005-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3005-1"
},
{
"name": "SUSE-SU-2016:1985",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html"
},
{
"name": "openSUSE-SU-2016:2184",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html"
},
{
"name": "46006",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/46006/"
},
{
"name": "openSUSE-SU-2016:1641",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html"
},
{
"name": "USN-2997-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2997-1"
},
{
"name": "USN-3000-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3000-1"
},
{
"name": "DSA-3607",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3607"
},
{
"name": "USN-3002-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3002-1"
},
{
"name": "USN-2996-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2996-1"
},
{
"name": "SUSE-SU-2016:1672",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html"
},
{
"name": "USN-2989-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2989-1"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5f8e44741f9f216e33736ea4ec65ca9ac03036e6",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5f8e44741f9f216e33736ea4ec65ca9ac03036e6"
},
{
"name": "USN-3007-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3007-1"
},
{
"name": "SUSE-SU-2016:2074",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5"
},
{
"name": "USN-3003-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3003-1"
},
{
"name": "SUSE-SU-2016:2105",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html"
},
{
"name": "USN-2998-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2998-1"
},
{
"name": "[oss-security] 20160504 CVE Request: kernel information leak vulnerability in rtnetlink",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/05/04/27"
},
{
"name": "SUSE-SU-2016:1937",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "psampaio@redhat.com", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-8625", "ID": "CVE-2016-8625",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -69,29 +69,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://curl.haxx.se/docs/adv_20161102K.html", "name": "94107",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "https://curl.haxx.se/docs/adv_20161102K.html" "url": "http://www.securityfocus.com/bid/94107"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8625",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8625"
}, },
{ {
"name": "https://curl.haxx.se/CVE-2016-8625.patch", "name": "https://curl.haxx.se/CVE-2016-8625.patch",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://curl.haxx.se/CVE-2016-8625.patch" "url": "https://curl.haxx.se/CVE-2016-8625.patch"
}, },
{
"name": "RHSA-2018:3558",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3558"
},
{ {
"name": "https://www.tenable.com/security/tns-2016-21", "name": "https://www.tenable.com/security/tns-2016-21",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2016-21" "url": "https://www.tenable.com/security/tns-2016-21"
}, },
{ {
"name" : "GLSA-201701-47", "name": "https://curl.haxx.se/docs/adv_20161102K.html",
"refsource" : "GENTOO", "refsource": "CONFIRM",
"url" : "https://security.gentoo.org/glsa/201701-47" "url": "https://curl.haxx.se/docs/adv_20161102K.html"
},
{
"name": "1037192",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037192"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8625",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8625"
}, },
{ {
"name": "RHSA-2018:2486", "name": "RHSA-2018:2486",
@ -99,19 +109,9 @@
"url": "https://access.redhat.com/errata/RHSA-2018:2486" "url": "https://access.redhat.com/errata/RHSA-2018:2486"
}, },
{ {
"name" : "RHSA-2018:3558", "name": "GLSA-201701-47",
"refsource" : "REDHAT", "refsource": "GENTOO",
"url" : "https://access.redhat.com/errata/RHSA-2018:3558" "url": "https://security.gentoo.org/glsa/201701-47"
},
{
"name" : "94107",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/94107"
},
{
"name" : "1037192",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1037192"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "93777",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93777"
},
{ {
"name": "[oss-security] 20161015 Re: potrace: memory allocation failure", "name": "[oss-security] 20161015 Re: potrace: memory allocation failure",
"refsource": "MLIST", "refsource": "MLIST",
@ -61,11 +66,6 @@
"name": "https://blogs.gentoo.org/ago/2016/08/29/potrace-memory-allocation-failure/", "name": "https://blogs.gentoo.org/ago/2016/08/29/potrace-memory-allocation-failure/",
"refsource": "MISC", "refsource": "MISC",
"url": "https://blogs.gentoo.org/ago/2016/08/29/potrace-memory-allocation-failure/" "url": "https://blogs.gentoo.org/ago/2016/08/29/potrace-memory-allocation-failure/"
},
{
"name" : "93777",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/93777"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-9648", "ID": "CVE-2016-9648",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@suse.com",
"ID": "CVE-2016-9842", "ID": "CVE-2016-9842",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,84 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit", "name": "RHSA-2017:1221",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/12/05/21"
},
{
"name" : "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib",
"refsource" : "MISC",
"url" : "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib"
},
{
"name" : "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf",
"refsource" : "MISC",
"url" : "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1402348",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1402348"
},
{
"name" : "https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958",
"refsource" : "CONFIRM",
"url" : "https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name" : "https://support.apple.com/HT208112",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208112"
},
{
"name" : "https://support.apple.com/HT208113",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208113"
},
{
"name" : "https://support.apple.com/HT208115",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208115"
},
{
"name" : "https://support.apple.com/HT208144",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208144"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name" : "GLSA-201701-56",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201701-56"
},
{
"name" : "RHSA-2017:3046",
"refsource": "REDHAT", "refsource": "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:3046" "url": "https://access.redhat.com/errata/RHSA-2017:1221"
},
{
"name" : "RHSA-2017:3047",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
},
{
"name" : "RHSA-2017:2999",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:2999"
},
{
"name" : "RHSA-2017:3453",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:3453"
}, },
{ {
"name": "RHSA-2017:1220", "name": "RHSA-2017:1220",
@ -138,39 +63,114 @@
"url": "https://access.redhat.com/errata/RHSA-2017:1220" "url": "https://access.redhat.com/errata/RHSA-2017:1220"
}, },
{ {
"name" : "RHSA-2017:1221", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1402348",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402348"
},
{
"name": "https://support.apple.com/HT208144",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208144"
},
{
"name": "RHSA-2017:3047",
"refsource": "REDHAT", "refsource": "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1221" "url": "https://access.redhat.com/errata/RHSA-2017:3047"
}, },
{ {
"name" : "RHSA-2017:1222", "name": "[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit",
"refsource" : "REDHAT", "refsource": "MLIST",
"url" : "https://access.redhat.com/errata/RHSA-2017:1222" "url": "http://www.openwall.com/lists/oss-security/2016/12/05/21"
},
{
"name" : "openSUSE-SU-2016:3202",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html"
},
{
"name" : "openSUSE-SU-2017:0077",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html"
},
{
"name" : "openSUSE-SU-2017:0080",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html"
}, },
{ {
"name": "95131", "name": "95131",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/95131" "url": "http://www.securityfocus.com/bid/95131"
}, },
{
"name": "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib",
"refsource": "MISC",
"url": "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name": "RHSA-2017:3046",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3046"
},
{
"name": "openSUSE-SU-2017:0077",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html"
},
{
"name": "GLSA-201701-56",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-56"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{ {
"name": "1039427", "name": "1039427",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039427" "url": "http://www.securitytracker.com/id/1039427"
},
{
"name": "RHSA-2017:1222",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1222"
},
{
"name": "openSUSE-SU-2017:0080",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html"
},
{
"name": "RHSA-2017:3453",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3453"
},
{
"name": "https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958",
"refsource": "CONFIRM",
"url": "https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958"
},
{
"name": "https://support.apple.com/HT208113",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208113"
},
{
"name": "https://support.apple.com/HT208112",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208112"
},
{
"name": "https://support.apple.com/HT208115",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208115"
},
{
"name": "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf",
"refsource": "MISC",
"url": "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf"
},
{
"name": "openSUSE-SU-2016:3202",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html"
},
{
"name": "RHSA-2017:2999",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2999"
} }
] ]
} }

View File

@ -53,15 +53,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-036-03",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-036-03"
},
{ {
"name": "106861", "name": "106861",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/106861" "url": "http://www.securityfocus.com/bid/106861"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-036-03",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-036-03"
} }
] ]
} }