"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 22:22:19 +00:00
parent 8109a718e5
commit efb2d79552
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
54 changed files with 3409 additions and 3404 deletions

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "19990823 [Linux] glibc 2.1.x / wu-ftpd <=2.5 / BeroFTPD / lynx / vlock / mc / glibc 2.0.x",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/templates/archive.pike?list=1&msg=lcamtuf.4.05.9907041223290.355-300000@nimue.ids.pl"
},
{ {
"name": "597", "name": "597",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/597" "url": "http://www.securityfocus.com/bid/597"
},
{
"name": "19990823 [Linux] glibc 2.1.x / wu-ftpd <=2.5 / BeroFTPD / lynx / vlock / mc / glibc 2.0.x",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/templates/archive.pike?list=1&msg=lcamtuf.4.05.9907041223290.355-300000@nimue.ids.pl"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "excel-call(1737)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1737"
},
{ {
"name": "MS98-018", "name": "MS98-018",
"refsource": "MS", "refsource": "MS",
@ -61,11 +66,6 @@
"name": "179", "name": "179",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/179" "url": "http://www.securityfocus.com/bid/179"
},
{
"name" : "excel-call(1737)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/1737"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.enterasys.com/support/relnotes/VH-4802-2050509-patch-rel.pdf",
"refsource" : "CONFIRM",
"url" : "http://www.enterasys.com/support/relnotes/VH-4802-2050509-patch-rel.pdf"
},
{ {
"name": "15757", "name": "15757",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/15757" "url": "http://secunia.com/advisories/15757"
},
{
"name": "http://www.enterasys.com/support/relnotes/VH-4802-2050509-patch-rel.pdf",
"refsource": "CONFIRM",
"url": "http://www.enterasys.com/support/relnotes/VH-4802-2050509-patch-rel.pdf"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "http://www.syscp.de/forum/viewtopic.php?t=1772",
"refsource": "CONFIRM",
"url": "http://www.syscp.de/forum/viewtopic.php?t=1772"
},
{ {
"name": "20050808 Advisory 13/2005: Remote code execution in SysCP", "name": "20050808 Advisory 13/2005: Remote code execution in SysCP",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -61,11 +66,6 @@
"name": "http://www.hardened-php.net/advisory_132005.64.html", "name": "http://www.hardened-php.net/advisory_132005.64.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.hardened-php.net/advisory_132005.64.html" "url": "http://www.hardened-php.net/advisory_132005.64.html"
},
{
"name" : "http://www.syscp.de/forum/viewtopic.php?t=1772",
"refsource" : "CONFIRM",
"url" : "http://www.syscp.de/forum/viewtopic.php?t=1772"
} }
] ]
} }

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "33667",
"refsource": "OSVDB",
"url": "http://osvdb.org/33667"
},
{
"name": "http://www.symantec.com/avcenter/reference/Vista_Network_Attack_Surface_RTM.pdf",
"refsource": "MISC",
"url": "http://www.symantec.com/avcenter/reference/Vista_Network_Attack_Surface_RTM.pdf"
},
{ {
"name": "20070313 New report on Windows Vista network attack surface", "name": "20070313 New report on Windows Vista network attack surface",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -62,11 +72,6 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/464617/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/464617/100/0/threaded"
}, },
{
"name" : "http://www.symantec.com/avcenter/reference/Vista_Network_Attack_Surface_RTM.pdf",
"refsource" : "MISC",
"url" : "http://www.symantec.com/avcenter/reference/Vista_Network_Attack_Surface_RTM.pdf"
},
{ {
"name": "http://www.symantec.com/enterprise/security_response/weblog/2007/04/microsofts_inaccurate_teredo_d.html", "name": "http://www.symantec.com/enterprise/security_response/weblog/2007/04/microsofts_inaccurate_teredo_d.html",
"refsource": "MISC", "refsource": "MISC",
@ -76,11 +81,6 @@
"name": "23267", "name": "23267",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/23267" "url": "http://www.securityfocus.com/bid/23267"
},
{
"name" : "33667",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33667"
} }
] ]
} }

View File

@ -58,9 +58,9 @@
"url": "https://www.exploit-db.com/exploits/3694" "url": "https://www.exploit-db.com/exploits/3694"
}, },
{ {
"name" : "23392", "name": "php121-php121db-file-include(33525)",
"refsource" : "BID", "refsource": "XF",
"url" : "http://www.securityfocus.com/bid/23392" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33525"
}, },
{ {
"name": "ADV-2007-1314", "name": "ADV-2007-1314",
@ -68,9 +68,9 @@
"url": "http://www.vupen.com/english/advisories/2007/1314" "url": "http://www.vupen.com/english/advisories/2007/1314"
}, },
{ {
"name" : "34720", "name": "23392",
"refsource" : "OSVDB", "refsource": "BID",
"url" : "http://osvdb.org/34720" "url": "http://www.securityfocus.com/bid/23392"
}, },
{ {
"name": "24818", "name": "24818",
@ -78,9 +78,9 @@
"url": "http://secunia.com/advisories/24818" "url": "http://secunia.com/advisories/24818"
}, },
{ {
"name" : "php121-php121db-file-include(33525)", "name": "34720",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33525" "url": "http://osvdb.org/34720"
} }
] ]
} }

View File

@ -52,40 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20071017 Multiple SQL Injection Flaws in Oracle CTX_DOC package",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/482425/100/0/threaded"
},
{
"name" : "http://www.ngssoftware.com/advisories/high-risk-vulnerability-in-oracle-ctx-doc/",
"refsource" : "MISC",
"url" : "http://www.ngssoftware.com/advisories/high-risk-vulnerability-in-oracle-ctx-doc/"
},
{ {
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html", "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html" "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html"
}, },
{ {
"name" : "HPSBMA02133", "name": "http://www.ngssoftware.com/advisories/high-risk-vulnerability-in-oracle-ctx-doc/",
"refsource" : "HP", "refsource": "MISC",
"url" : "http://marc.info/?l=bugtraq&m=119332677525918&w=2" "url": "http://www.ngssoftware.com/advisories/high-risk-vulnerability-in-oracle-ctx-doc/"
},
{
"name" : "SSRT061201",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
},
{
"name" : "TA07-290A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-290A.html"
},
{
"name" : "26101",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26101"
}, },
{ {
"name": "ADV-2007-3524", "name": "ADV-2007-3524",
@ -97,25 +72,50 @@
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3626" "url": "http://www.vupen.com/english/advisories/2007/3626"
}, },
{
"name": "TA07-290A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-290A.html"
},
{
"name": "SSRT061201",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
},
{
"name": "20071017 Multiple SQL Injection Flaws in Oracle CTX_DOC package",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/482425/100/0/threaded"
},
{
"name": "3242",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3242"
},
{
"name": "26101",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26101"
},
{
"name": "HPSBMA02133",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
},
{ {
"name": "1018823", "name": "1018823",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018823" "url": "http://www.securitytracker.com/id?1018823"
}, },
{
"name" : "27251",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27251"
},
{ {
"name": "27409", "name": "27409",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27409" "url": "http://secunia.com/advisories/27409"
}, },
{ {
"name" : "3242", "name": "27251",
"refsource" : "SREASON", "refsource": "SECUNIA",
"url" : "http://securityreason.com/securityalert/3242" "url": "http://secunia.com/advisories/27251"
} }
] ]
} }

View File

@ -57,21 +57,6 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html" "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html"
}, },
{
"name" : "HPSBMA02133",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
},
{
"name" : "SSRT061201",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
},
{
"name" : "TA07-290A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-290A.html"
},
{ {
"name": "ADV-2007-3524", "name": "ADV-2007-3524",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -82,20 +67,35 @@
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3626" "url": "http://www.vupen.com/english/advisories/2007/3626"
}, },
{
"name": "TA07-290A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-290A.html"
},
{
"name": "SSRT061201",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
},
{
"name": "HPSBMA02133",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
},
{ {
"name": "1018823", "name": "1018823",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018823" "url": "http://www.securitytracker.com/id?1018823"
}, },
{
"name" : "27251",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27251"
},
{ {
"name": "27409", "name": "27409",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27409" "url": "http://secunia.com/advisories/27409"
},
{
"name": "27251",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27251"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2009-2001", "ID": "CVE-2009-2001",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html", "name": "37027",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html" "url": "http://secunia.com/advisories/37027"
},
{
"name" : "TA09-294A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA09-294A.html"
},
{
"name" : "36743",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/36743"
}, },
{ {
"name": "1023057", "name": "1023057",
@ -73,9 +63,19 @@
"url": "http://www.securitytracker.com/id?1023057" "url": "http://www.securitytracker.com/id?1023057"
}, },
{ {
"name" : "37027", "name": "TA09-294A",
"refsource" : "SECUNIA", "refsource": "CERT",
"url" : "http://secunia.com/advisories/37027" "url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"
},
{
"name": "36743",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/36743"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-0663", "ID": "CVE-2015-0663",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-0793", "ID": "CVE-2015-0793",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-3071", "ID": "CVE-2015-3071",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-15-195", "name": "74604",
"refsource" : "MISC", "refsource": "BID",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-195" "url": "http://www.securityfocus.com/bid/74604"
}, },
{ {
"name": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", "name": "https://helpx.adobe.com/security/products/reader/apsb15-10.html",
@ -63,9 +63,9 @@
"url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html" "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html"
}, },
{ {
"name" : "74604", "name": "http://www.zerodayinitiative.com/advisories/ZDI-15-195",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/74604" "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-195"
}, },
{ {
"name": "1032284", "name": "1032284",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-3258", "ID": "CVE-2015-3258",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,36 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "USN-2659-1",
"refsource": "UBUNTU",
"url": "http://ubuntu.com/usn/usn-2659-1"
},
{
"name": "GLSA-201510-08",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201510-08"
},
{
"name": "75436",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/75436"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{ {
"name": "[oss-security] 20150626 CVE-2015-3258 cups-filters: texttopdf heap-based buffer overflow", "name": "[oss-security] 20150626 CVE-2015-3258 cups-filters: texttopdf heap-based buffer overflow",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/06/26/4" "url": "http://www.openwall.com/lists/oss-security/2015/06/26/4"
}, },
{
"name": "openSUSE-SU-2015:1244",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00033.html"
},
{ {
"name": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7363", "name": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7363",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -67,40 +92,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1235385" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1235385"
}, },
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{ {
"name": "DSA-3303", "name": "DSA-3303",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3303" "url": "http://www.debian.org/security/2015/dsa-3303"
}, },
{
"name" : "GLSA-201510-08",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201510-08"
},
{ {
"name": "RHSA-2015:2360", "name": "RHSA-2015:2360",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2360.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-2360.html"
},
{
"name" : "openSUSE-SU-2015:1244",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-07/msg00033.html"
},
{
"name" : "USN-2659-1",
"refsource" : "UBUNTU",
"url" : "http://ubuntu.com/usn/usn-2659-1"
},
{
"name" : "75436",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/75436"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://www.navixia.com/CVE-2015-3441.txt",
"refsource" : "MISC",
"url" : "https://www.navixia.com/CVE-2015-3441.txt"
},
{ {
"name": "95398", "name": "95398",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/95398" "url": "http://www.securityfocus.com/bid/95398"
},
{
"name": "https://www.navixia.com/CVE-2015-3441.txt",
"refsource": "MISC",
"url": "https://www.navixia.com/CVE-2015-3441.txt"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-3763", "ID": "CVE-2015-3763",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,9 +58,9 @@
"url": "https://support.apple.com/kb/HT205030" "url": "https://support.apple.com/kb/HT205030"
}, },
{ {
"name" : "APPLE-SA-2015-08-13-3", "name": "1033275",
"refsource" : "APPLE", "refsource": "SECTRACK",
"url" : "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html" "url": "http://www.securitytracker.com/id/1033275"
}, },
{ {
"name": "76337", "name": "76337",
@ -68,9 +68,9 @@
"url": "http://www.securityfocus.com/bid/76337" "url": "http://www.securityfocus.com/bid/76337"
}, },
{ {
"name" : "1033275", "name": "APPLE-SA-2015-08-13-3",
"refsource" : "SECTRACK", "refsource": "APPLE",
"url" : "http://www.securitytracker.com/id/1033275" "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.blackberry.com/btsc/KB37207" "url": "http://www.blackberry.com/btsc/KB37207"
}, },
{
"name" : "75950",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/75950"
},
{ {
"name": "1032969", "name": "1032969",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032969" "url": "http://www.securitytracker.com/id/1032969"
},
{
"name": "75950",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/75950"
} }
] ]
} }

View File

@ -52,70 +52,70 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20150609 [CVE-2015-4342]SQL Injection and Location header injection from cdef id",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2015/Jun/19"
},
{
"name" : "http://packetstormsecurity.com/files/132224/Cacti-SQL-Injection-Header-Injection.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/132224/Cacti-SQL-Injection-Header-Injection.html"
},
{
"name" : "http://bugs.cacti.net/view.php?id=2571",
"refsource" : "CONFIRM",
"url" : "http://bugs.cacti.net/view.php?id=2571"
},
{
"name" : "http://www.cacti.net/release_notes_0_8_8d.php",
"refsource" : "CONFIRM",
"url" : "http://www.cacti.net/release_notes_0_8_8d.php"
},
{ {
"name": "https://bugzilla.suse.com/show_bug.cgi?id=934187", "name": "https://bugzilla.suse.com/show_bug.cgi?id=934187",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=934187" "url": "https://bugzilla.suse.com/show_bug.cgi?id=934187"
}, },
{
"name" : "https://www.suse.com/security/cve/CVE-2015-4342.html",
"refsource" : "CONFIRM",
"url" : "https://www.suse.com/security/cve/CVE-2015-4342.html"
},
{
"name" : "DSA-3295",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3295"
},
{
"name" : "FEDORA-2016-4a5ce6a6c0",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183454.html"
},
{
"name" : "FEDORA-2016-852a39e085",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183919.html"
},
{
"name" : "FEDORA-2016-a8e2be0fe6",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183449.html"
},
{ {
"name": "openSUSE-SU-2015:1133", "name": "openSUSE-SU-2015:1133",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-06/msg00052.html" "url": "http://lists.opensuse.org/opensuse-updates/2015-06/msg00052.html"
}, },
{ {
"name" : "75108", "name": "FEDORA-2016-a8e2be0fe6",
"refsource" : "BID", "refsource": "FEDORA",
"url" : "http://www.securityfocus.com/bid/75108" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183449.html"
},
{
"name": "https://www.suse.com/security/cve/CVE-2015-4342.html",
"refsource": "CONFIRM",
"url": "https://www.suse.com/security/cve/CVE-2015-4342.html"
},
{
"name": "http://packetstormsecurity.com/files/132224/Cacti-SQL-Injection-Header-Injection.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/132224/Cacti-SQL-Injection-Header-Injection.html"
},
{
"name": "http://www.cacti.net/release_notes_0_8_8d.php",
"refsource": "CONFIRM",
"url": "http://www.cacti.net/release_notes_0_8_8d.php"
},
{
"name": "http://bugs.cacti.net/view.php?id=2571",
"refsource": "CONFIRM",
"url": "http://bugs.cacti.net/view.php?id=2571"
}, },
{ {
"name": "1032672", "name": "1032672",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032672" "url": "http://www.securitytracker.com/id/1032672"
},
{
"name": "FEDORA-2016-852a39e085",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183919.html"
},
{
"name": "75108",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/75108"
},
{
"name": "DSA-3295",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3295"
},
{
"name": "20150609 [CVE-2015-4342]SQL Injection and Location header injection from cdef id",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Jun/19"
},
{
"name": "FEDORA-2016-4a5ce6a6c0",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183454.html"
} }
] ]
} }

View File

@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://www.drupal.org/node/2452569",
"refsource": "CONFIRM",
"url": "https://www.drupal.org/node/2452569"
},
{ {
"name": "[oss-security] 20150425 CVE requests for Drupal contributed modules (from SA-CONTRIB-2015-034 to SA-CONTRIB-2015-099)", "name": "[oss-security] 20150425 CVE requests for Drupal contributed modules (from SA-CONTRIB-2015-034 to SA-CONTRIB-2015-099)",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/04/25/6" "url": "http://www.openwall.com/lists/oss-security/2015/04/25/6"
}, },
{
"name" : "https://www.drupal.org/node/2445971",
"refsource" : "MISC",
"url" : "https://www.drupal.org/node/2445971"
},
{ {
"name": "https://www.drupal.org/node/2449747", "name": "https://www.drupal.org/node/2449747",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.drupal.org/node/2449747" "url": "https://www.drupal.org/node/2449747"
}, },
{
"name" : "https://www.drupal.org/node/2452569",
"refsource" : "CONFIRM",
"url" : "https://www.drupal.org/node/2452569"
},
{ {
"name": "72953", "name": "72953",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/72953" "url": "http://www.securityfocus.com/bid/72953"
},
{
"name": "https://www.drupal.org/node/2445971",
"refsource": "MISC",
"url": "https://www.drupal.org/node/2445971"
} }
] ]
} }

View File

@ -53,14 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20151209 Symfony CMS 2.6.3 – Multiple Cross-Site Scripting Vulnerability", "name": "20151223 Re: [FD] Symfony CMS 2.6.3 \u00c3\u00a2\u00e2\u0082\u00ac\u00e2\u0080\u009c Multiple Cross-Site Scripting Vulnerability",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2015/Dec/7"
},
{
"name" : "20151223 Re: [FD] Symfony CMS 2.6.3 – Multiple Cross-Site Scripting Vulnerability",
"refsource": "FULLDISC", "refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Dec/101" "url": "http://seclists.org/fulldisclosure/2015/Dec/101"
},
{
"name": "20151209 Symfony CMS 2.6.3 \u00c3\u00a2\u00e2\u0082\u00ac\u00e2\u0080\u009c Multiple Cross-Site Scripting Vulnerability",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Dec/7"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-8426", "ID": "CVE-2015-8426",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "39650", "name": "openSUSE-SU-2015:2239",
"refsource" : "EXPLOIT-DB", "refsource": "SUSE",
"url" : "https://www.exploit-db.com/exploits/39650/" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html"
},
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
}, },
{ {
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680", "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680",
@ -73,39 +63,49 @@
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680" "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
}, },
{ {
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722", "name": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722" "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html"
},
{
"name" : "GLSA-201601-03",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201601-03"
},
{
"name" : "SUSE-SU-2015:2236",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html"
},
{
"name" : "SUSE-SU-2015:2247",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html"
},
{
"name" : "openSUSE-SU-2015:2239",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html"
}, },
{ {
"name": "78715", "name": "78715",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/78715" "url": "http://www.securityfocus.com/bid/78715"
}, },
{
"name": "SUSE-SU-2015:2236",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
},
{
"name": "39650",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/39650/"
},
{
"name": "SUSE-SU-2015:2247",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html"
},
{ {
"name": "1034318", "name": "1034318",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034318" "url": "http://www.securitytracker.com/id/1034318"
},
{
"name": "GLSA-201601-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201601-03"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2015-8509", "ID": "CVE-2015-8509",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,21 +57,11 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://seclists.org/bugtraq/2015/Dec/131" "url": "http://seclists.org/bugtraq/2015/Dec/131"
}, },
{
"name" : "http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html"
},
{ {
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1232785", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1232785",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1232785" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1232785"
}, },
{
"name" : "https://www.bugzilla.org/security/4.2.15/",
"refsource" : "CONFIRM",
"url" : "https://www.bugzilla.org/security/4.2.15/"
},
{ {
"name": "79662", "name": "79662",
"refsource": "BID", "refsource": "BID",
@ -81,6 +71,16 @@
"name": "1034556", "name": "1034556",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034556" "url": "http://www.securitytracker.com/id/1034556"
},
{
"name": "http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html"
},
{
"name": "https://www.bugzilla.org/security/4.2.15/",
"refsource": "CONFIRM",
"url": "https://www.bugzilla.org/security/4.2.15/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2016-1629", "ID": "CVE-2016-1629",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,34 +58,9 @@
"url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_18.html" "url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_18.html"
}, },
{ {
"name" : "https://code.google.com/p/chromium/issues/detail?id=583431", "name": "USN-2905-1",
"refsource" : "CONFIRM", "refsource": "UBUNTU",
"url" : "https://code.google.com/p/chromium/issues/detail?id=583431" "url": "http://www.ubuntu.com/usn/USN-2905-1"
},
{
"name" : "DSA-3486",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3486"
},
{
"name" : "GLSA-201603-09",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201603-09"
},
{
"name" : "RHSA-2016:0286",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0286.html"
},
{
"name" : "openSUSE-SU-2016:0520",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00045.html"
},
{
"name" : "openSUSE-SU-2016:0525",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00047.html"
}, },
{ {
"name": "openSUSE-SU-2016:0529", "name": "openSUSE-SU-2016:0529",
@ -93,9 +68,34 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00048.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00048.html"
}, },
{ {
"name" : "USN-2905-1", "name": "1035184",
"refsource" : "UBUNTU", "refsource": "SECTRACK",
"url" : "http://www.ubuntu.com/usn/USN-2905-1" "url": "http://www.securitytracker.com/id/1035184"
},
{
"name": "RHSA-2016:0286",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0286.html"
},
{
"name": "GLSA-201603-09",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201603-09"
},
{
"name": "DSA-3486",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3486"
},
{
"name": "openSUSE-SU-2016:0525",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00047.html"
},
{
"name": "openSUSE-SU-2016:0520",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00045.html"
}, },
{ {
"name": "83302", "name": "83302",
@ -103,9 +103,9 @@
"url": "http://www.securityfocus.com/bid/83302" "url": "http://www.securityfocus.com/bid/83302"
}, },
{ {
"name" : "1035184", "name": "https://code.google.com/p/chromium/issues/detail?id=583431",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1035184" "url": "https://code.google.com/p/chromium/issues/detail?id=583431"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2016-1655", "ID": "CVE-2016-1655",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html", "name": "openSUSE-SU-2016:1136",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html"
}, },
{ {
"name": "https://codereview.chromium.org/1642283002", "name": "https://codereview.chromium.org/1642283002",
@ -63,19 +63,9 @@
"url": "https://codereview.chromium.org/1642283002" "url": "https://codereview.chromium.org/1642283002"
}, },
{ {
"name" : "https://crbug.com/582008", "name": "openSUSE-SU-2016:1135",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "https://crbug.com/582008" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html"
},
{
"name" : "DSA-3549",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3549"
},
{
"name" : "GLSA-201605-02",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201605-02"
}, },
{ {
"name": "RHSA-2016:0638", "name": "RHSA-2016:0638",
@ -87,25 +77,35 @@
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html"
}, },
{
"name": "DSA-3549",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3549"
},
{ {
"name": "openSUSE-SU-2016:1061", "name": "openSUSE-SU-2016:1061",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html"
}, },
{ {
"name" : "openSUSE-SU-2016:1135", "name": "https://crbug.com/582008",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html" "url": "https://crbug.com/582008"
},
{
"name" : "openSUSE-SU-2016:1136",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html"
}, },
{ {
"name": "USN-2955-1", "name": "USN-2955-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2955-1" "url": "http://www.ubuntu.com/usn/USN-2955-1"
},
{
"name": "http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html"
},
{
"name": "GLSA-201605-02",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201605-02"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5452", "ID": "CVE-2016-5452",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,16 +57,16 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
}, },
{
"name" : "91787",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/91787"
},
{ {
"name": "91916", "name": "91916",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/91916" "url": "http://www.securityfocus.com/bid/91916"
}, },
{
"name": "91787",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91787"
},
{ {
"name": "1036407", "name": "1036407",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5592", "ID": "CVE-2016-5592",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
}, },
{
"name" : "93721",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/93721"
},
{ {
"name": "1037038", "name": "1037038",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037038" "url": "http://www.securitytracker.com/id/1037038"
},
{
"name": "93721",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93721"
} }
] ]
} }

View File

@ -52,56 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20160623 Re: CVE for PHP 5.5.37 issues",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/06/23/4"
},
{
"name" : "http://github.com/php/php-src/commit/6c5211a0cef0cc2854eaa387e0eb036e012904d0?w=1",
"refsource" : "CONFIRM",
"url" : "http://github.com/php/php-src/commit/6c5211a0cef0cc2854eaa387e0eb036e012904d0?w=1"
},
{
"name" : "http://php.net/ChangeLog-5.php",
"refsource" : "CONFIRM",
"url" : "http://php.net/ChangeLog-5.php"
},
{
"name" : "http://php.net/ChangeLog-7.php",
"refsource" : "CONFIRM",
"url" : "http://php.net/ChangeLog-7.php"
},
{
"name" : "https://bugs.php.net/bug.php?id=72455",
"refsource" : "CONFIRM",
"url" : "https://bugs.php.net/bug.php?id=72455"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
},
{
"name" : "https://support.apple.com/HT207170",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT207170"
},
{ {
"name": "APPLE-SA-2016-09-20", "name": "APPLE-SA-2016-09-20",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html" "url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html"
}, },
{
"name" : "DSA-3618",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3618"
},
{
"name" : "SUSE-SU-2016:2013",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html"
},
{ {
"name": "openSUSE-SU-2016:1761", "name": "openSUSE-SU-2016:1761",
"refsource": "SUSE", "refsource": "SUSE",
@ -112,10 +67,55 @@
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html" "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html"
}, },
{
"name": "http://github.com/php/php-src/commit/6c5211a0cef0cc2854eaa387e0eb036e012904d0?w=1",
"refsource": "CONFIRM",
"url": "http://github.com/php/php-src/commit/6c5211a0cef0cc2854eaa387e0eb036e012904d0?w=1"
},
{
"name": "http://php.net/ChangeLog-5.php",
"refsource": "CONFIRM",
"url": "http://php.net/ChangeLog-5.php"
},
{
"name": "[oss-security] 20160623 Re: CVE for PHP 5.5.37 issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/06/23/4"
},
{
"name": "DSA-3618",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3618"
},
{
"name": "http://php.net/ChangeLog-7.php",
"refsource": "CONFIRM",
"url": "http://php.net/ChangeLog-7.php"
},
{
"name": "https://bugs.php.net/bug.php?id=72455",
"refsource": "CONFIRM",
"url": "https://bugs.php.net/bug.php?id=72455"
},
{ {
"name": "91399", "name": "91399",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/91399" "url": "http://www.securityfocus.com/bid/91399"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
},
{
"name": "https://support.apple.com/HT207170",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207170"
},
{
"name": "SUSE-SU-2016:2013",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-07-31T15:54:50.973212", "DATE_ASSIGNED": "2018-07-31T15:54:50.973212",
"DATE_REQUESTED": "2018-07-30T00:00:00", "DATE_REQUESTED": "2018-07-30T00:00:00",
"ID": "CVE-2018-1999032", "ID": "CVE-2018-1999032",
@ -14,18 +14,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "Jenkins Agiletestware Pangolin Connector for TestRail Plugin", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "2.1 and earlier" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Jenkins project" "vendor_name": "n/a"
} }
] ]
} }
@ -47,7 +47,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "CWE-285" "value": "n/a"
} }
] ]
} }

View File

@ -61,56 +61,66 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[debian-lts-announce] 20180419 [SECURITY] [DLA 1355-1] mysql-5.5 security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html"
},
{
"name" : "[debian-lts-announce] 20180629 [SECURITY] [DLA 1407-1] mariadb-10.0 security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
},
{
"name" : "https://security.netapp.com/advisory/ntap-20180419-0002/",
"refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20180419-0002/"
},
{
"name" : "DSA-4176",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4176"
},
{ {
"name": "DSA-4341", "name": "DSA-4341",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4341" "url": "https://www.debian.org/security/2018/dsa-4341"
}, },
{
"name": "1040698",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040698"
},
{ {
"name": "RHSA-2018:1254", "name": "RHSA-2018:1254",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1254" "url": "https://access.redhat.com/errata/RHSA-2018:1254"
}, },
{ {
"name" : "RHSA-2018:2439", "name": "https://security.netapp.com/advisory/ntap-20180419-0002/",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "https://access.redhat.com/errata/RHSA-2018:2439" "url": "https://security.netapp.com/advisory/ntap-20180419-0002/"
}, },
{ {
"name": "RHSA-2018:2729", "name": "RHSA-2018:2729",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2729" "url": "https://access.redhat.com/errata/RHSA-2018:2729"
}, },
{
"name": "DSA-4176",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4176"
},
{
"name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1407-1] mariadb-10.0 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html"
},
{
"name": "[debian-lts-announce] 20180419 [SECURITY] [DLA 1355-1] mysql-5.5 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html"
},
{ {
"name": "RHSA-2018:3655", "name": "RHSA-2018:3655",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3655" "url": "https://access.redhat.com/errata/RHSA-2018:3655"
}, },
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
},
{
"name": "103828",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103828"
},
{
"name": "RHSA-2018:2439",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2439"
},
{ {
"name": "USN-3629-1", "name": "USN-3629-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
@ -125,16 +135,6 @@
"name": "USN-3629-3", "name": "USN-3629-3",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3629-3/" "url": "https://usn.ubuntu.com/3629-3/"
},
{
"name" : "103828",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/103828"
},
{
"name" : "1040698",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1040698"
} }
] ]
} }

View File

@ -20,7 +20,7 @@
}, },
{ {
"version_affected": "=", "version_affected": "=",
"version_value" : "17.1 17.12" "version_value": "17.1 \u2013 17.12"
} }
] ]
} }
@ -57,15 +57,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
},
{ {
"name": "103835", "name": "103835",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/103835" "url": "http://www.securityfocus.com/bid/103835"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
} }
] ]
} }

View File

@ -53,11 +53,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html",
"refsource" : "CONFIRM",
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html"
},
{ {
"name": "107109", "name": "107109",
"refsource": "BID", "refsource": "BID",
@ -67,6 +62,11 @@
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01", "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01",
"refsource": "MISC", "refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01" "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01"
},
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html"
} }
] ]
} }

View File

@ -176,6 +176,11 @@
"name": "https://access.redhat.com/security/vulnerabilities/runcescape", "name": "https://access.redhat.com/security/vulnerabilities/runcescape",
"refsource": "MISC", "refsource": "MISC",
"url": "https://access.redhat.com/security/vulnerabilities/runcescape" "url": "https://access.redhat.com/security/vulnerabilities/runcescape"
},
{
"refsource": "CISCO",
"name": "",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190215-runc"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "chrome-cve-admin@google.com", "ASSIGNER": "security@google.com",
"ID": "CVE-2019-5763", "ID": "CVE-2019-5763",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,30 +53,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "106767",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106767"
},
{ {
"name": "https://crbug.com/914731", "name": "https://crbug.com/914731",
"refsource": "MISC", "refsource": "MISC",
"url": "https://crbug.com/914731" "url": "https://crbug.com/914731"
}, },
{
"name" : "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html",
"refsource" : "CONFIRM",
"url" : "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html"
},
{
"name" : "DSA-4395",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2019/dsa-4395"
},
{ {
"name": "RHSA-2019:0309", "name": "RHSA-2019:0309",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0309" "url": "https://access.redhat.com/errata/RHSA-2019:0309"
}, },
{ {
"name" : "106767", "name": "DSA-4395",
"refsource" : "BID", "refsource": "DEBIAN",
"url" : "http://www.securityfocus.com/bid/106767" "url": "https://www.debian.org/security/2019/dsa-4395"
},
{
"name": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html",
"refsource": "CONFIRM",
"url": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html"
} }
] ]
} }