mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
8109a718e5
commit
efb2d79552
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "19990823 [Linux] glibc 2.1.x / wu-ftpd <=2.5 / BeroFTPD / lynx / vlock / mc / glibc 2.0.x",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/templates/archive.pike?list=1&msg=lcamtuf.4.05.9907041223290.355-300000@nimue.ids.pl"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "597",
|
"name": "597",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/597"
|
"url": "http://www.securityfocus.com/bid/597"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "19990823 [Linux] glibc 2.1.x / wu-ftpd <=2.5 / BeroFTPD / lynx / vlock / mc / glibc 2.0.x",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/templates/archive.pike?list=1&msg=lcamtuf.4.05.9907041223290.355-300000@nimue.ids.pl"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "excel-call(1737)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1737"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "MS98-018",
|
"name": "MS98-018",
|
||||||
"refsource": "MS",
|
"refsource": "MS",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "179",
|
"name": "179",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/179"
|
"url": "http://www.securityfocus.com/bid/179"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "excel-call(1737)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/1737"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.enterasys.com/support/relnotes/VH-4802-2050509-patch-rel.pdf",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.enterasys.com/support/relnotes/VH-4802-2050509-patch-rel.pdf"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "15757",
|
"name": "15757",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/15757"
|
"url": "http://secunia.com/advisories/15757"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.enterasys.com/support/relnotes/VH-4802-2050509-patch-rel.pdf",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.enterasys.com/support/relnotes/VH-4802-2050509-patch-rel.pdf"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "http://www.syscp.de/forum/viewtopic.php?t=1772",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.syscp.de/forum/viewtopic.php?t=1772"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20050808 Advisory 13/2005: Remote code execution in SysCP",
|
"name": "20050808 Advisory 13/2005: Remote code execution in SysCP",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "http://www.hardened-php.net/advisory_132005.64.html",
|
"name": "http://www.hardened-php.net/advisory_132005.64.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.hardened-php.net/advisory_132005.64.html"
|
"url": "http://www.hardened-php.net/advisory_132005.64.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.syscp.de/forum/viewtopic.php?t=1772",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.syscp.de/forum/viewtopic.php?t=1772"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "33667",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/33667"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.symantec.com/avcenter/reference/Vista_Network_Attack_Surface_RTM.pdf",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.symantec.com/avcenter/reference/Vista_Network_Attack_Surface_RTM.pdf"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20070313 New report on Windows Vista network attack surface",
|
"name": "20070313 New report on Windows Vista network attack surface",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
@ -62,11 +72,6 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/464617/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/464617/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.symantec.com/avcenter/reference/Vista_Network_Attack_Surface_RTM.pdf",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.symantec.com/avcenter/reference/Vista_Network_Attack_Surface_RTM.pdf"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.symantec.com/enterprise/security_response/weblog/2007/04/microsofts_inaccurate_teredo_d.html",
|
"name": "http://www.symantec.com/enterprise/security_response/weblog/2007/04/microsofts_inaccurate_teredo_d.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -76,11 +81,6 @@
|
|||||||
"name": "23267",
|
"name": "23267",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/23267"
|
"url": "http://www.securityfocus.com/bid/23267"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "33667",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/33667"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -58,9 +58,9 @@
|
|||||||
"url": "https://www.exploit-db.com/exploits/3694"
|
"url": "https://www.exploit-db.com/exploits/3694"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "23392",
|
"name": "php121-php121db-file-include(33525)",
|
||||||
"refsource" : "BID",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/bid/23392"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33525"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2007-1314",
|
"name": "ADV-2007-1314",
|
||||||
@ -68,9 +68,9 @@
|
|||||||
"url": "http://www.vupen.com/english/advisories/2007/1314"
|
"url": "http://www.vupen.com/english/advisories/2007/1314"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "34720",
|
"name": "23392",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "BID",
|
||||||
"url" : "http://osvdb.org/34720"
|
"url": "http://www.securityfocus.com/bid/23392"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "24818",
|
"name": "24818",
|
||||||
@ -78,9 +78,9 @@
|
|||||||
"url": "http://secunia.com/advisories/24818"
|
"url": "http://secunia.com/advisories/24818"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "php121-php121db-file-include(33525)",
|
"name": "34720",
|
||||||
"refsource" : "XF",
|
"refsource": "OSVDB",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33525"
|
"url": "http://osvdb.org/34720"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,40 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20071017 Multiple SQL Injection Flaws in Oracle CTX_DOC package",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/482425/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.ngssoftware.com/advisories/high-risk-vulnerability-in-oracle-ctx-doc/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.ngssoftware.com/advisories/high-risk-vulnerability-in-oracle-ctx-doc/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html",
|
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html"
|
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "HPSBMA02133",
|
"name": "http://www.ngssoftware.com/advisories/high-risk-vulnerability-in-oracle-ctx-doc/",
|
||||||
"refsource" : "HP",
|
"refsource": "MISC",
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
|
"url": "http://www.ngssoftware.com/advisories/high-risk-vulnerability-in-oracle-ctx-doc/"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSRT061201",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "TA07-290A",
|
|
||||||
"refsource" : "CERT",
|
|
||||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-290A.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "26101",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/26101"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2007-3524",
|
"name": "ADV-2007-3524",
|
||||||
@ -97,25 +72,50 @@
|
|||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2007/3626"
|
"url": "http://www.vupen.com/english/advisories/2007/3626"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "TA07-290A",
|
||||||
|
"refsource": "CERT",
|
||||||
|
"url": "http://www.us-cert.gov/cas/techalerts/TA07-290A.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSRT061201",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20071017 Multiple SQL Injection Flaws in Oracle CTX_DOC package",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/482425/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "3242",
|
||||||
|
"refsource": "SREASON",
|
||||||
|
"url": "http://securityreason.com/securityalert/3242"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "26101",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/26101"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBMA02133",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1018823",
|
"name": "1018823",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id?1018823"
|
"url": "http://www.securitytracker.com/id?1018823"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "27251",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/27251"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "27409",
|
"name": "27409",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/27409"
|
"url": "http://secunia.com/advisories/27409"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "3242",
|
"name": "27251",
|
||||||
"refsource" : "SREASON",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://securityreason.com/securityalert/3242"
|
"url": "http://secunia.com/advisories/27251"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,21 +57,6 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html"
|
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "HPSBMA02133",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSRT061201",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "TA07-290A",
|
|
||||||
"refsource" : "CERT",
|
|
||||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-290A.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2007-3524",
|
"name": "ADV-2007-3524",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
@ -82,20 +67,35 @@
|
|||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2007/3626"
|
"url": "http://www.vupen.com/english/advisories/2007/3626"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "TA07-290A",
|
||||||
|
"refsource": "CERT",
|
||||||
|
"url": "http://www.us-cert.gov/cas/techalerts/TA07-290A.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSRT061201",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBMA02133",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1018823",
|
"name": "1018823",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id?1018823"
|
"url": "http://www.securitytracker.com/id?1018823"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "27251",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/27251"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "27409",
|
"name": "27409",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/27409"
|
"url": "http://secunia.com/advisories/27409"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "27251",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/27251"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2009-2001",
|
"ID": "CVE-2009-2001",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,19 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html",
|
"name": "37027",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"
|
"url": "http://secunia.com/advisories/37027"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "TA09-294A",
|
|
||||||
"refsource" : "CERT",
|
|
||||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA09-294A.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "36743",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/36743"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1023057",
|
"name": "1023057",
|
||||||
@ -73,9 +63,19 @@
|
|||||||
"url": "http://www.securitytracker.com/id?1023057"
|
"url": "http://www.securitytracker.com/id?1023057"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "37027",
|
"name": "TA09-294A",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CERT",
|
||||||
"url" : "http://secunia.com/advisories/37027"
|
"url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "36743",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/36743"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2015-0663",
|
"ID": "CVE-2015-0663",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2015-0793",
|
"ID": "CVE-2015-0793",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2015-3071",
|
"ID": "CVE-2015-3071",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-15-195",
|
"name": "74604",
|
||||||
"refsource" : "MISC",
|
"refsource": "BID",
|
||||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-195"
|
"url": "http://www.securityfocus.com/bid/74604"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://helpx.adobe.com/security/products/reader/apsb15-10.html",
|
"name": "https://helpx.adobe.com/security/products/reader/apsb15-10.html",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html"
|
"url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "74604",
|
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-195",
|
||||||
"refsource" : "BID",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.securityfocus.com/bid/74604"
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-195"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1032284",
|
"name": "1032284",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2015-3258",
|
"ID": "CVE-2015-3258",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,36 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "USN-2659-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://ubuntu.com/usn/usn-2659-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201510-08",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "https://security.gentoo.org/glsa/201510-08"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "75436",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/75436"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20150626 CVE-2015-3258 cups-filters: texttopdf heap-based buffer overflow",
|
"name": "[oss-security] 20150626 CVE-2015-3258 cups-filters: texttopdf heap-based buffer overflow",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2015/06/26/4"
|
"url": "http://www.openwall.com/lists/oss-security/2015/06/26/4"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2015:1244",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00033.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7363",
|
"name": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7363",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -67,40 +92,15 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1235385"
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1235385"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "DSA-3303",
|
"name": "DSA-3303",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"url": "http://www.debian.org/security/2015/dsa-3303"
|
"url": "http://www.debian.org/security/2015/dsa-3303"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "GLSA-201510-08",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201510-08"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "RHSA-2015:2360",
|
"name": "RHSA-2015:2360",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-2360.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-2360.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2015:1244",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2015-07/msg00033.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-2659-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://ubuntu.com/usn/usn-2659-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "75436",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/75436"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://www.navixia.com/CVE-2015-3441.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://www.navixia.com/CVE-2015-3441.txt"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "95398",
|
"name": "95398",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/95398"
|
"url": "http://www.securityfocus.com/bid/95398"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.navixia.com/CVE-2015-3441.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://www.navixia.com/CVE-2015-3441.txt"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2015-3763",
|
"ID": "CVE-2015-3763",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -58,9 +58,9 @@
|
|||||||
"url": "https://support.apple.com/kb/HT205030"
|
"url": "https://support.apple.com/kb/HT205030"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "APPLE-SA-2015-08-13-3",
|
"name": "1033275",
|
||||||
"refsource" : "APPLE",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html"
|
"url": "http://www.securitytracker.com/id/1033275"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "76337",
|
"name": "76337",
|
||||||
@ -68,9 +68,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/76337"
|
"url": "http://www.securityfocus.com/bid/76337"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1033275",
|
"name": "APPLE-SA-2015-08-13-3",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "APPLE",
|
||||||
"url" : "http://www.securitytracker.com/id/1033275"
|
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,15 +57,15 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.blackberry.com/btsc/KB37207"
|
"url": "http://www.blackberry.com/btsc/KB37207"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "75950",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/75950"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1032969",
|
"name": "1032969",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1032969"
|
"url": "http://www.securitytracker.com/id/1032969"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "75950",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/75950"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,70 +52,70 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20150609 [CVE-2015-4342]SQL Injection and Location header injection from cdef id",
|
|
||||||
"refsource" : "FULLDISC",
|
|
||||||
"url" : "http://seclists.org/fulldisclosure/2015/Jun/19"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://packetstormsecurity.com/files/132224/Cacti-SQL-Injection-Header-Injection.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://packetstormsecurity.com/files/132224/Cacti-SQL-Injection-Header-Injection.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://bugs.cacti.net/view.php?id=2571",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://bugs.cacti.net/view.php?id=2571"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.cacti.net/release_notes_0_8_8d.php",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.cacti.net/release_notes_0_8_8d.php"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.suse.com/show_bug.cgi?id=934187",
|
"name": "https://bugzilla.suse.com/show_bug.cgi?id=934187",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://bugzilla.suse.com/show_bug.cgi?id=934187"
|
"url": "https://bugzilla.suse.com/show_bug.cgi?id=934187"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://www.suse.com/security/cve/CVE-2015-4342.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.suse.com/security/cve/CVE-2015-4342.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-3295",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2015/dsa-3295"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2016-4a5ce6a6c0",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183454.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2016-852a39e085",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183919.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2016-a8e2be0fe6",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183449.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2015:1133",
|
"name": "openSUSE-SU-2015:1133",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-06/msg00052.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2015-06/msg00052.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "75108",
|
"name": "FEDORA-2016-a8e2be0fe6",
|
||||||
"refsource" : "BID",
|
"refsource": "FEDORA",
|
||||||
"url" : "http://www.securityfocus.com/bid/75108"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183449.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.suse.com/security/cve/CVE-2015-4342.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.suse.com/security/cve/CVE-2015-4342.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://packetstormsecurity.com/files/132224/Cacti-SQL-Injection-Header-Injection.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://packetstormsecurity.com/files/132224/Cacti-SQL-Injection-Header-Injection.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.cacti.net/release_notes_0_8_8d.php",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.cacti.net/release_notes_0_8_8d.php"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://bugs.cacti.net/view.php?id=2571",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://bugs.cacti.net/view.php?id=2571"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1032672",
|
"name": "1032672",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1032672"
|
"url": "http://www.securitytracker.com/id/1032672"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2016-852a39e085",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183919.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "75108",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/75108"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3295",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2015/dsa-3295"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20150609 [CVE-2015-4342]SQL Injection and Location header injection from cdef id",
|
||||||
|
"refsource": "FULLDISC",
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2015/Jun/19"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2016-4a5ce6a6c0",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183454.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,30 +52,30 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "https://www.drupal.org/node/2452569",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.drupal.org/node/2452569"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20150425 CVE requests for Drupal contributed modules (from SA-CONTRIB-2015-034 to SA-CONTRIB-2015-099)",
|
"name": "[oss-security] 20150425 CVE requests for Drupal contributed modules (from SA-CONTRIB-2015-034 to SA-CONTRIB-2015-099)",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2015/04/25/6"
|
"url": "http://www.openwall.com/lists/oss-security/2015/04/25/6"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://www.drupal.org/node/2445971",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://www.drupal.org/node/2445971"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://www.drupal.org/node/2449747",
|
"name": "https://www.drupal.org/node/2449747",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://www.drupal.org/node/2449747"
|
"url": "https://www.drupal.org/node/2449747"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://www.drupal.org/node/2452569",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.drupal.org/node/2452569"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "72953",
|
"name": "72953",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/72953"
|
"url": "http://www.securityfocus.com/bid/72953"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.drupal.org/node/2445971",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://www.drupal.org/node/2445971"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,14 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20151209 Symfony CMS 2.6.3 ââ¬â Multiple Cross-Site Scripting Vulnerability",
|
"name": "20151223 Re: [FD] Symfony CMS 2.6.3 \u00c3\u00a2\u00e2\u0082\u00ac\u00e2\u0080\u009c Multiple Cross-Site Scripting Vulnerability",
|
||||||
"refsource" : "FULLDISC",
|
|
||||||
"url" : "http://seclists.org/fulldisclosure/2015/Dec/7"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20151223 Re: [FD] Symfony CMS 2.6.3 ââ¬â Multiple Cross-Site Scripting Vulnerability",
|
|
||||||
"refsource": "FULLDISC",
|
"refsource": "FULLDISC",
|
||||||
"url": "http://seclists.org/fulldisclosure/2015/Dec/101"
|
"url": "http://seclists.org/fulldisclosure/2015/Dec/101"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20151209 Symfony CMS 2.6.3 \u00c3\u00a2\u00e2\u0082\u00ac\u00e2\u0080\u009c Multiple Cross-Site Scripting Vulnerability",
|
||||||
|
"refsource": "FULLDISC",
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2015/Dec/7"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2015-8426",
|
"ID": "CVE-2015-8426",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,19 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "39650",
|
"name": "openSUSE-SU-2015:2239",
|
||||||
"refsource" : "EXPLOIT-DB",
|
"refsource": "SUSE",
|
||||||
"url" : "https://www.exploit-db.com/exploits/39650/"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680",
|
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680",
|
||||||
@ -73,39 +63,49 @@
|
|||||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
|
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
|
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
|
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201601-03",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201601-03"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2015:2236",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2015:2247",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2015:2239",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "78715",
|
"name": "78715",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/78715"
|
"url": "http://www.securityfocus.com/bid/78715"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2015:2236",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "39650",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/39650/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2015:2247",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1034318",
|
"name": "1034318",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1034318"
|
"url": "http://www.securitytracker.com/id/1034318"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201601-03",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "https://security.gentoo.org/glsa/201601-03"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@mozilla.org",
|
||||||
"ID": "CVE-2015-8509",
|
"ID": "CVE-2015-8509",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,21 +57,11 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://seclists.org/bugtraq/2015/Dec/131"
|
"url": "http://seclists.org/bugtraq/2015/Dec/131"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1232785",
|
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1232785",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1232785"
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1232785"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://www.bugzilla.org/security/4.2.15/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.bugzilla.org/security/4.2.15/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "79662",
|
"name": "79662",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -81,6 +71,16 @@
|
|||||||
"name": "1034556",
|
"name": "1034556",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1034556"
|
"url": "http://www.securitytracker.com/id/1034556"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.bugzilla.org/security/4.2.15/",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.bugzilla.org/security/4.2.15/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@google.com",
|
||||||
"ID": "CVE-2016-1629",
|
"ID": "CVE-2016-1629",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -58,34 +58,9 @@
|
|||||||
"url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_18.html"
|
"url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_18.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=583431",
|
"name": "USN-2905-1",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "UBUNTU",
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=583431"
|
"url": "http://www.ubuntu.com/usn/USN-2905-1"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-3486",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2016/dsa-3486"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201603-09",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201603-09"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:0286",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0286.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2016:0520",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00045.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2016:0525",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00047.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2016:0529",
|
"name": "openSUSE-SU-2016:0529",
|
||||||
@ -93,9 +68,34 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00048.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00048.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "USN-2905-1",
|
"name": "1035184",
|
||||||
"refsource" : "UBUNTU",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2905-1"
|
"url": "http://www.securitytracker.com/id/1035184"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:0286",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-0286.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201603-09",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "https://security.gentoo.org/glsa/201603-09"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3486",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2016/dsa-3486"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2016:0525",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00047.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2016:0520",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00045.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "83302",
|
"name": "83302",
|
||||||
@ -103,9 +103,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/83302"
|
"url": "http://www.securityfocus.com/bid/83302"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1035184",
|
"name": "https://code.google.com/p/chromium/issues/detail?id=583431",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securitytracker.com/id/1035184"
|
"url": "https://code.google.com/p/chromium/issues/detail?id=583431"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@google.com",
|
||||||
"ID": "CVE-2016-1655",
|
"ID": "CVE-2016-1655",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html",
|
"name": "openSUSE-SU-2016:1136",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SUSE",
|
||||||
"url" : "http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://codereview.chromium.org/1642283002",
|
"name": "https://codereview.chromium.org/1642283002",
|
||||||
@ -63,19 +63,9 @@
|
|||||||
"url": "https://codereview.chromium.org/1642283002"
|
"url": "https://codereview.chromium.org/1642283002"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://crbug.com/582008",
|
"name": "openSUSE-SU-2016:1135",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SUSE",
|
||||||
"url" : "https://crbug.com/582008"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-3549",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2016/dsa-3549"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201605-02",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201605-02"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:0638",
|
"name": "RHSA-2016:0638",
|
||||||
@ -87,25 +77,35 @@
|
|||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3549",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2016/dsa-3549"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2016:1061",
|
"name": "openSUSE-SU-2016:1061",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "openSUSE-SU-2016:1135",
|
"name": "https://crbug.com/582008",
|
||||||
"refsource" : "SUSE",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html"
|
"url": "https://crbug.com/582008"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2016:1136",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-2955-1",
|
"name": "USN-2955-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-2955-1"
|
"url": "http://www.ubuntu.com/usn/USN-2955-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201605-02",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "https://security.gentoo.org/glsa/201605-02"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2016-5452",
|
"ID": "CVE-2016-5452",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,16 +57,16 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "91787",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/91787"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "91916",
|
"name": "91916",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/91916"
|
"url": "http://www.securityfocus.com/bid/91916"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "91787",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/91787"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1036407",
|
"name": "1036407",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2016-5592",
|
"ID": "CVE-2016-5592",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,15 +57,15 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "93721",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/93721"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1037038",
|
"name": "1037038",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1037038"
|
"url": "http://www.securitytracker.com/id/1037038"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "93721",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/93721"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,56 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20160623 Re: CVE for PHP 5.5.37 issues",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2016/06/23/4"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://github.com/php/php-src/commit/6c5211a0cef0cc2854eaa387e0eb036e012904d0?w=1",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://github.com/php/php-src/commit/6c5211a0cef0cc2854eaa387e0eb036e012904d0?w=1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://php.net/ChangeLog-5.php",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://php.net/ChangeLog-5.php"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://php.net/ChangeLog-7.php",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://php.net/ChangeLog-7.php"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugs.php.net/bug.php?id=72455",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugs.php.net/bug.php?id=72455"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT207170",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT207170"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2016-09-20",
|
"name": "APPLE-SA-2016-09-20",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
"url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html"
|
"url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "DSA-3618",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2016/dsa-3618"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2016:2013",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2016:1761",
|
"name": "openSUSE-SU-2016:1761",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
@ -112,10 +67,55 @@
|
|||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://github.com/php/php-src/commit/6c5211a0cef0cc2854eaa387e0eb036e012904d0?w=1",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://github.com/php/php-src/commit/6c5211a0cef0cc2854eaa387e0eb036e012904d0?w=1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://php.net/ChangeLog-5.php",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://php.net/ChangeLog-5.php"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20160623 Re: CVE for PHP 5.5.37 issues",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2016/06/23/4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3618",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2016/dsa-3618"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://php.net/ChangeLog-7.php",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://php.net/ChangeLog-7.php"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugs.php.net/bug.php?id=72455",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugs.php.net/bug.php?id=72455"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "91399",
|
"name": "91399",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/91399"
|
"url": "http://www.securityfocus.com/bid/91399"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT207170",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT207170"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2016:2013",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "kurt@seifried.org",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"DATE_ASSIGNED": "2018-07-31T15:54:50.973212",
|
"DATE_ASSIGNED": "2018-07-31T15:54:50.973212",
|
||||||
"DATE_REQUESTED": "2018-07-30T00:00:00",
|
"DATE_REQUESTED": "2018-07-30T00:00:00",
|
||||||
"ID": "CVE-2018-1999032",
|
"ID": "CVE-2018-1999032",
|
||||||
@ -14,18 +14,18 @@
|
|||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name" : "Jenkins Agiletestware Pangolin Connector for TestRail Plugin",
|
"product_name": "n/a",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value" : "2.1 and earlier"
|
"version_value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"vendor_name" : "Jenkins project"
|
"vendor_name": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -47,7 +47,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value" : "CWE-285"
|
"value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -61,56 +61,66 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[debian-lts-announce] 20180419 [SECURITY] [DLA 1355-1] mysql-5.5 security update",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[debian-lts-announce] 20180629 [SECURITY] [DLA 1407-1] mariadb-10.0 security update",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://security.netapp.com/advisory/ntap-20180419-0002/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://security.netapp.com/advisory/ntap-20180419-0002/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-4176",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "https://www.debian.org/security/2018/dsa-4176"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "DSA-4341",
|
"name": "DSA-4341",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"url": "https://www.debian.org/security/2018/dsa-4341"
|
"url": "https://www.debian.org/security/2018/dsa-4341"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "1040698",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1040698"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:1254",
|
"name": "RHSA-2018:1254",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2018:1254"
|
"url": "https://access.redhat.com/errata/RHSA-2018:1254"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2018:2439",
|
"name": "https://security.netapp.com/advisory/ntap-20180419-0002/",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2018:2439"
|
"url": "https://security.netapp.com/advisory/ntap-20180419-0002/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:2729",
|
"name": "RHSA-2018:2729",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2018:2729"
|
"url": "https://access.redhat.com/errata/RHSA-2018:2729"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-4176",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "https://www.debian.org/security/2018/dsa-4176"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1407-1] mariadb-10.0 security update",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[debian-lts-announce] 20180419 [SECURITY] [DLA 1355-1] mysql-5.5 security update",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:3655",
|
"name": "RHSA-2018:3655",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2018:3655"
|
"url": "https://access.redhat.com/errata/RHSA-2018:3655"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "103828",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/103828"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2018:2439",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2018:2439"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-3629-1",
|
"name": "USN-3629-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
@ -125,16 +135,6 @@
|
|||||||
"name": "USN-3629-3",
|
"name": "USN-3629-3",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "https://usn.ubuntu.com/3629-3/"
|
"url": "https://usn.ubuntu.com/3629-3/"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "103828",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/103828"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1040698",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1040698"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -20,7 +20,7 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"version_affected": "=",
|
"version_affected": "=",
|
||||||
"version_value" : "17.1 – 17.12"
|
"version_value": "17.1 \u2013 17.12"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -57,15 +57,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "103835",
|
"name": "103835",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/103835"
|
"url": "http://www.securityfocus.com/bid/103835"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,11 +53,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "107109",
|
"name": "107109",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -67,6 +62,11 @@
|
|||||||
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01",
|
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01"
|
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -176,6 +176,11 @@
|
|||||||
"name": "https://access.redhat.com/security/vulnerabilities/runcescape",
|
"name": "https://access.redhat.com/security/vulnerabilities/runcescape",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://access.redhat.com/security/vulnerabilities/runcescape"
|
"url": "https://access.redhat.com/security/vulnerabilities/runcescape"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "CISCO",
|
||||||
|
"name": "",
|
||||||
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190215-runc"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "chrome-cve-admin@google.com",
|
"ASSIGNER": "security@google.com",
|
||||||
"ID": "CVE-2019-5763",
|
"ID": "CVE-2019-5763",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,30 +53,30 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "106767",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/106767"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://crbug.com/914731",
|
"name": "https://crbug.com/914731",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://crbug.com/914731"
|
"url": "https://crbug.com/914731"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-4395",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "https://www.debian.org/security/2019/dsa-4395"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "RHSA-2019:0309",
|
"name": "RHSA-2019:0309",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2019:0309"
|
"url": "https://access.redhat.com/errata/RHSA-2019:0309"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "106767",
|
"name": "DSA-4395",
|
||||||
"refsource" : "BID",
|
"refsource": "DEBIAN",
|
||||||
"url" : "http://www.securityfocus.com/bid/106767"
|
"url": "https://www.debian.org/security/2019/dsa-4395"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user