"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 22:13:21 +00:00
parent 9355bbdff2
commit fc20099cb0
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
58 changed files with 3468 additions and 3468 deletions

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-0454",
"STATE": "PUBLIC"
},
@ -53,49 +53,94 @@
"references": {
"reference_data": [
{
"name" : "20070205 [SAMBA-SECURITY] CVE-2007-0454: Format string bug in afsacl.so VFS plugin",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/459179/100/0/threaded"
"name": "VU#649732",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/649732"
},
{
"name": "24046",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24046"
},
{
"name": "24101",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24101"
},
{
"name": "20070207 rPSA-2007-0026-1 samba samba-swat",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/459365/100/0/threaded"
},
{
"name" : "http://us1.samba.org/samba/security/CVE-2007-0454.html",
"refsource" : "CONFIRM",
"url" : "http://us1.samba.org/samba/security/CVE-2007-0454.html"
},
{
"name" : "https://issues.rpath.com/browse/RPL-1005",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-1005"
},
{
"name" : "DSA-1257",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1257"
},
{
"name": "GLSA-200702-01",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200702-01.xml"
},
{
"name" : "MDKSA-2007:034",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:034"
},
{
"name": "OpenPKG-SA-2007.012",
"refsource": "OPENPKG",
"url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html"
},
{
"name" : "SSA:2007-038-01",
"refsource" : "SLACKWARE",
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916"
"name": "1017588",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017588"
},
{
"name": "24151",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24151"
},
{
"name": "ADV-2007-0483",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0483"
},
{
"name": "24021",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24021"
},
{
"name": "https://issues.rpath.com/browse/RPL-1005",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1005"
},
{
"name": "http://us1.samba.org/samba/security/CVE-2007-0454.html",
"refsource": "CONFIRM",
"url": "http://us1.samba.org/samba/security/CVE-2007-0454.html"
},
{
"name": "24067",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24067"
},
{
"name": "33101",
"refsource": "OSVDB",
"url": "http://osvdb.org/33101"
},
{
"name": "24145",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24145"
},
{
"name": "24060",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24060"
},
{
"name": "MDKSA-2007:034",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:034"
},
{
"name": "20070205 [SAMBA-SECURITY] CVE-2007-0454: Format string bug in afsacl.so VFS plugin",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/459179/100/0/threaded"
},
{
"name": "2007-0007",
@ -108,9 +153,9 @@
"url": "http://www.ubuntu.com/usn/usn-419-1"
},
{
"name" : "VU#649732",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/649732"
"name": "samba-afsacl-format-string(32304)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32304"
},
{
"name": "22403",
@ -118,59 +163,14 @@
"url": "http://www.securityfocus.com/bid/22403"
},
{
"name" : "ADV-2007-0483",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0483"
"name": "SSA:2007-038-01",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916"
},
{
"name" : "33101",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33101"
},
{
"name" : "1017588",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1017588"
},
{
"name" : "24021",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24021"
},
{
"name" : "24060",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24060"
},
{
"name" : "24067",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24067"
},
{
"name" : "24101",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24101"
},
{
"name" : "24046",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24046"
},
{
"name" : "24151",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24151"
},
{
"name" : "24145",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24145"
},
{
"name" : "samba-afsacl-format-string(32304)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32304"
"name": "DSA-1257",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1257"
}
]
}

View File

@ -53,44 +53,44 @@
"references": {
"reference_data": [
{
"name" : "102699",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102699-1"
"name": "oval:org.mitre.oval:def:1372",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1372"
},
{
"name": "22364",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22364"
},
{
"name": "solaris-loopbackfs-dos(32140)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32140"
},
{
"name": "ADV-2007-0462",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0462"
},
{
"name": "102699",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102699-1"
},
{
"name": "31879",
"refsource": "OSVDB",
"url": "http://osvdb.org/31879"
},
{
"name" : "oval:org.mitre.oval:def:1372",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1372"
},
{
"name" : "1017582",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1017582"
},
{
"name": "23996",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23996"
},
{
"name" : "solaris-loopbackfs-dos(32140)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32140"
"name": "1017582",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017582"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "33652",
"refsource": "OSVDB",
"url": "http://osvdb.org/33652"
},
{
"name": "MDKSA-2007:053",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:053"
},
{
"name": "20070201 umount crash and xterm (kind of) information leak!",
"refsource": "FULLDISC",
@ -62,21 +72,11 @@
"refsource": "MISC",
"url": "http://gotfault.wordpress.com/2007/01/18/umount-bug/"
},
{
"name" : "MDKSA-2007:053",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:053"
},
{
"name": "22850",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22850"
},
{
"name" : "33652",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33652"
},
{
"name": "1017729",
"refsource": "SECTRACK",

View File

@ -53,39 +53,39 @@
"references": {
"reference_data": [
{
"name" : "20070530 PHP JackKnife [multiple vulnerabilities]",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/470111/100/0/threaded"
"name": "38878",
"refsource": "OSVDB",
"url": "http://osvdb.org/38878"
},
{
"name": "phpjk-indexgdisplayauthenticate-xss(34643)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34643"
},
{
"name": "24253",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24253"
},
{
"name": "2768",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2768"
},
{
"name": "38877",
"refsource": "OSVDB",
"url": "http://osvdb.org/38877"
},
{
"name" : "38878",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/38878"
},
{
"name": "38879",
"refsource": "OSVDB",
"url": "http://osvdb.org/38879"
},
{
"name" : "2768",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2768"
},
{
"name" : "phpjk-indexgdisplayauthenticate-xss(34643)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34643"
"name": "20070530 PHP JackKnife [multiple vulnerabilities]",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/470111/100/0/threaded"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "42022",
"refsource": "OSVDB",
"url": "http://osvdb.org/42022"
},
{
"name": "24822",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24822"
},
{
"name": "20070707 [Eleytt] 7LIPIEC2007",
"refsource": "BUGTRAQ",
@ -61,16 +71,6 @@
"name": "http://www.eleytt.com/advisories/eleytt_NONNOIASPBARCODE.pdf",
"refsource": "MISC",
"url": "http://www.eleytt.com/advisories/eleytt_NONNOIASPBARCODE.pdf"
},
{
"name" : "24822",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24822"
},
{
"name" : "42022",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/42022"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "101918",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101918-1"
},
{
"name" : "200386",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200386-1"
},
{
"name": "24859",
"refsource": "BID",
@ -72,6 +62,11 @@
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2496"
},
{
"name": "26030",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26030"
},
{
"name": "37249",
"refsource": "OSVDB",
@ -83,9 +78,14 @@
"url": "http://www.securitytracker.com/id?1018370"
},
{
"name" : "26030",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26030"
"name": "101918",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101918-1"
},
{
"name": "200386",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200386-1"
},
{
"name": "sun-jsam-message-information-disclosure(35339)",

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "4190",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4190"
"name": "24959",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24959"
},
{
"name": "5395",
@ -63,24 +63,24 @@
"url": "https://www.exploit-db.com/exploits/5395"
},
{
"name" : "24959",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24959"
"name": "datadynamics-actbar3-file-overwrite(35471)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35471"
},
{
"name": "37692",
"refsource": "OSVDB",
"url": "http://osvdb.org/37692"
},
{
"name": "4190",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4190"
},
{
"name": "26098",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26098"
},
{
"name" : "datadynamics-actbar3-file-overwrite(35471)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35471"
}
]
}

View File

@ -52,21 +52,36 @@
},
"references": {
"reference_data": [
{
"name": "2919",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2919"
},
{
"name": "26165",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26165"
},
{
"name": "jblog-ajoutaut-authentication-bypass(35550)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35550"
},
{
"name": "20070720 JBlog 1.0 Creat Admin exploit, xss, Cookie Manipulation",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/474320/100/0/threaded"
},
{
"name" : "4211",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4211"
},
{
"name": "24991",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24991"
},
{
"name": "4211",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4211"
},
{
"name": "ADV-2007-2611",
"refsource": "VUPEN",
@ -76,21 +91,6 @@
"name": "38561",
"refsource": "OSVDB",
"url": "http://osvdb.org/38561"
},
{
"name" : "26165",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26165"
},
{
"name" : "2919",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2919"
},
{
"name" : "jblog-ajoutaut-authentication-bypass(35550)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35550"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20070720 Secure Computing - Security Reporter Auth Bypass and Directory Traversal Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=118522960430476&w=2"
},
{
"name": "http://www.oliverkarow.de/research/securityreporter.txt",
"refsource": "MISC",
"url": "http://www.oliverkarow.de/research/securityreporter.txt"
},
{
"name": "20070720 Secure Computing - Security Reporter Auth Bypass and Directory Traversal Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=118522960430476&w=2"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "28389",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28389"
},
{
"name": "http://downloads.securityfocus.com/vulnerabilities/exploits/25148.html",
"refsource": "MISC",
"url": "http://downloads.securityfocus.com/vulnerabilities/exploits/25148.html"
},
{
"name" : "25148",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25148"
},
{
"name": "40156",
"refsource": "OSVDB",
"url": "http://osvdb.org/40156"
},
{
"name" : "28389",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28389"
"name": "25148",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25148"
}
]
}

View File

@ -52,20 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.kaspersky.com/technews?id=203038705",
"refsource" : "CONFIRM",
"url" : "http://www.kaspersky.com/technews?id=203038705"
},
{
"name": "25189",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25189"
},
{
"name" : "37216",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/37216"
"name": "http://www.kaspersky.com/technews?id=203038705",
"refsource": "CONFIRM",
"url": "http://www.kaspersky.com/technews?id=203038705"
},
{
"name": "26312",
@ -76,6 +71,11 @@
"name": "kaspersky-antispam-insecure-permissions(35782)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35782"
},
{
"name": "37216",
"refsource": "OSVDB",
"url": "http://osvdb.org/37216"
}
]
}

View File

@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070803 Joomla J! Reactions Component Remote File include Bug",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/475544/100/0/threaded"
},
{
"name" : "20070818 Re: Joomla J! Reactions Component Remote File include Bug",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/477144/100/0/threaded"
},
{
"name" : "20070820 Re: Re: Joomla J! Reactions Component Remote File include Bug",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/477245/100/0/threaded"
},
{
"name" : "http://yollubunlar.org/joomla-j-reactions-component-rfi-75.html",
"refsource" : "MISC",
"url" : "http://yollubunlar.org/joomla-j-reactions-component-rfi-75.html"
"name": "2984",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2984"
},
{
"name": "25198",
@ -78,9 +63,24 @@
"url": "http://www.securityfocus.com/bid/25198"
},
{
"name" : "2984",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2984"
"name": "http://yollubunlar.org/joomla-j-reactions-component-rfi-75.html",
"refsource": "MISC",
"url": "http://yollubunlar.org/joomla-j-reactions-component-rfi-75.html"
},
{
"name": "20070820 Re: Re: Joomla J! Reactions Component Remote File include Bug",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/477245/100/0/threaded"
},
{
"name": "20070818 Re: Joomla J! Reactions Component Remote File include Bug",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/477144/100/0/threaded"
},
{
"name": "20070803 Joomla J! Reactions Component Remote File include Bug",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/475544/100/0/threaded"
},
{
"name": "jreactions-langset-file-include(35808)",

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "exv2-setlang-xss(35992)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35992"
},
{
"name": "36479",
"refsource": "OSVDB",
"url": "http://osvdb.org/36479"
},
{
"name": "20070813 eXV2.de Browser Cookie is not properly sanitised",
"refsource": "BUGTRAQ",
@ -62,20 +72,10 @@
"refsource": "MISC",
"url": "http://www.i-s-o.org/security.txt"
},
{
"name" : "36479",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/36479"
},
{
"name": "3021",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3021"
},
{
"name" : "exv2-setlang-xss(35992)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35992"
}
]
}

View File

@ -52,50 +52,50 @@
},
"references": {
"reference_data": [
{
"name": "29580",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29580"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=202354",
"refsource": "MISC",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=202354"
},
{
"name" : "http://johnst.org/sw/exiftags/CHANGES",
"refsource" : "CONFIRM",
"url" : "http://johnst.org/sw/exiftags/CHANGES"
},
{
"name" : "DSA-1533",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1533"
},
{
"name" : "GLSA-200712-17",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200712-17.xml"
},
{
"name" : "26892",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26892"
},
{
"name" : "ADV-2007-4251",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/4251"
},
{
"name": "28110",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28110"
},
{
"name": "DSA-1533",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1533"
},
{
"name": "28268",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28268"
},
{
"name" : "29580",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29580"
"name": "GLSA-200712-17",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200712-17.xml"
},
{
"name": "ADV-2007-4251",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/4251"
},
{
"name": "http://johnst.org/sw/exiftags/CHANGES",
"refsource": "CONFIRM",
"url": "http://johnst.org/sw/exiftags/CHANGES"
},
{
"name": "26892",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26892"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "40355",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/40355"
},
{
"name": "64857",
"refsource": "OSVDB",
"url": "http://osvdb.org/64857"
},
{
"name": "40355",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/40355"
},
{
"name": "39901",
"refsource": "SECUNIA",

View File

@ -52,31 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "RHSA-2015:0794",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0794.html"
},
{
"name": "[debian-lts-announce] 20180131 [SECURITY] [DLA 1265-1] krb5 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html"
},
{
"name" : "https://github.com/krb5/krb5/commit/d1f707024f1d0af6e54a18885322d70fa15ec4d3",
"refsource" : "CONFIRM",
"url" : "https://github.com/krb5/krb5/commit/d1f707024f1d0af6e54a18885322d70fa15ec4d3"
},
{
"name" : "http://advisories.mageia.org/MGASA-2014-0536.html",
"refsource" : "CONFIRM",
"url" : "http://advisories.mageia.org/MGASA-2014-0536.html"
},
{
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773226",
"refsource": "CONFIRM",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773226"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
},
{
"name": "FEDORA-2015-5949",
"refsource": "FEDORA",
@ -87,20 +77,30 @@
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:009"
},
{
"name": "openSUSE-SU-2015:0542",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00061.html"
},
{
"name": "1031376",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031376"
},
{
"name": "RHSA-2015:0439",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0439.html"
},
{
"name" : "RHSA-2015:0794",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0794.html"
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
},
{
"name" : "openSUSE-SU-2015:0542",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-03/msg00061.html"
"name": "https://github.com/krb5/krb5/commit/d1f707024f1d0af6e54a18885322d70fa15ec4d3",
"refsource": "CONFIRM",
"url": "https://github.com/krb5/krb5/commit/d1f707024f1d0af6e54a18885322d70fa15ec4d3"
},
{
"name": "USN-2498-1",
@ -113,9 +113,9 @@
"url": "http://www.securityfocus.com/bid/71679"
},
{
"name" : "1031376",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1031376"
"name": "http://advisories.mageia.org/MGASA-2014-0536.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2014-0536.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5652",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
"name": "VU#884689",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/884689"
},
{
"name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name" : "VU#884689",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/884689"
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5688",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#941801",
"refsource": "CERT-VN",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2015-2007",
"STATE": "PUBLIC"
},

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-2437",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2015-2720",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "74611",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/74611"
},
{
"name": "http://www.mozilla.org/security/announce/2015/mfsa2015-58.html",
"refsource": "CONFIRM",
@ -66,11 +71,6 @@
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name" : "74611",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/74611"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-6149",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-589"
},
{
"name" : "MS15-124",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-124"
},
{
"name": "1034315",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034315"
},
{
"name": "MS15-124",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-124"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-6177",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-6370",
"STATE": "PUBLIC"
},

View File

@ -53,19 +53,14 @@
"references": {
"reference_data": [
{
"name" : "20161227 PHPMailer < 5.2.18 Remote Code Execution [updated advisory] [CVE-2016-10033]",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/539963/100/0/threaded"
"name": "http://packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html"
},
{
"name" : "40968",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/40968/"
},
{
"name" : "40970",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/40970/"
"name": "https://www.drupal.org/psa-2016-004",
"refsource": "CONFIRM",
"url": "https://www.drupal.org/psa-2016-004"
},
{
"name": "42221",
@ -73,9 +68,9 @@
"url": "https://www.exploit-db.com/exploits/42221/"
},
{
"name" : "42024",
"name": "40969",
"refsource": "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/42024/"
"url": "https://www.exploit-db.com/exploits/40969/"
},
{
"name": "41962",
@ -83,14 +78,34 @@
"url": "https://www.exploit-db.com/exploits/41962/"
},
{
"name" : "41996",
"name": "40968",
"refsource": "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/41996/"
"url": "https://www.exploit-db.com/exploits/40968/"
},
{
"name" : "40969",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/40969/"
"name": "https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html",
"refsource": "MISC",
"url": "https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html"
},
{
"name": "https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.18",
"refsource": "CONFIRM",
"url": "https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.18"
},
{
"name": "20161227 PHPMailer < 5.2.18 Remote Code Execution [updated advisory] [CVE-2016-10033]",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/539963/100/0/threaded"
},
{
"name": "https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities",
"refsource": "CONFIRM",
"url": "https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities"
},
{
"name": "http://packetstormsecurity.com/files/140291/PHPMailer-Remote-Code-Execution.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/140291/PHPMailer-Remote-Code-Execution.html"
},
{
"name": "40974",
@ -103,24 +118,9 @@
"url": "https://www.exploit-db.com/exploits/40986/"
},
{
"name" : "20161227 PHPMailer < 5.2.18 Remote Code Execution [CVE-2016-10033]",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2016/Dec/78"
},
{
"name" : "http://packetstormsecurity.com/files/140291/PHPMailer-Remote-Code-Execution.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/140291/PHPMailer-Remote-Code-Execution.html"
},
{
"name" : "https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html",
"refsource" : "MISC",
"url" : "https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html"
},
{
"name" : "http://packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html"
"name": "40970",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40970/"
},
{
"name": "http://www.rapid7.com/db/modules/exploit/multi/http/phpmailer_arg_injection",
@ -128,24 +128,14 @@
"url": "http://www.rapid7.com/db/modules/exploit/multi/http/phpmailer_arg_injection"
},
{
"name" : "https://developer.joomla.org/security-centre/668-20161205-phpmailer-security-advisory.html",
"refsource" : "CONFIRM",
"url" : "https://developer.joomla.org/security-centre/668-20161205-phpmailer-security-advisory.html"
"name": "41996",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/41996/"
},
{
"name" : "https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.18",
"refsource" : "CONFIRM",
"url" : "https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.18"
},
{
"name" : "https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities",
"refsource" : "CONFIRM",
"url" : "https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities"
},
{
"name" : "https://www.drupal.org/psa-2016-004",
"refsource" : "CONFIRM",
"url" : "https://www.drupal.org/psa-2016-004"
"name": "20161227 PHPMailer < 5.2.18 Remote Code Execution [CVE-2016-10033]",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2016/Dec/78"
},
{
"name": "95108",
@ -156,6 +146,16 @@
"name": "1037533",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037533"
},
{
"name": "https://developer.joomla.org/security-centre/668-20161205-phpmailer-security-advisory.html",
"refsource": "CONFIRM",
"url": "https://developer.joomla.org/security-centre/668-20161205-phpmailer-security-advisory.html"
},
{
"name": "42024",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/42024/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2016-10284",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4170",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/experience-manager/apsb16-27.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/experience-manager/apsb16-27.html"
"name": "1036563",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036563"
},
{
"name": "92378",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/92378"
},
{
"name" : "1036563",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036563"
"name": "https://helpx.adobe.com/security/products/experience-manager/apsb16-27.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb16-27.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@debian.org",
"ID": "CVE-2016-4913",
"STATE": "PUBLIC"
},
@ -53,29 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20160518 CVE Request: Linux: information leak in Rock Ridge Extensions to iso9660 -- fs/isofs/rock.c",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/05/18/3"
},
{
"name" : "[oss-security] 20160518 Re: CVE Request: Linux: information leak in Rock Ridge Extensions to iso9660 -- fs/isofs/rock.c",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/05/18/5"
},
{
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99d825822eade8d827a1817357cbf3f889a552d6",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99d825822eade8d827a1817357cbf3f889a552d6"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1337528",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1337528"
"name": "RHSA-2018:3083",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3083"
},
{
"name": "https://github.com/torvalds/linux/commit/99d825822eade8d827a1817357cbf3f889a552d6",
@ -88,29 +68,9 @@
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html"
},
{
"name" : "DSA-3607",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3607"
},
{
"name" : "RHSA-2018:3083",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:3083"
},
{
"name" : "RHSA-2018:3096",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:3096"
},
{
"name" : "SUSE-SU-2016:1672",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html"
"name": "USN-3017-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3017-1"
},
{
"name": "SUSE-SU-2016:1985",
@ -118,15 +78,95 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html"
},
{
"name" : "USN-3016-1",
"name": "USN-3017-3",
"refsource": "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3016-1"
"url": "http://www.ubuntu.com/usn/USN-3017-3"
},
{
"name": "USN-3018-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3018-2"
},
{
"name": "USN-3021-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3021-2"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1337528",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337528"
},
{
"name": "USN-3017-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3017-2"
},
{
"name": "USN-3019-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3019-1"
},
{
"name": "DSA-3607",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3607"
},
{
"name": "USN-3016-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3016-2"
},
{
"name": "USN-3016-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3016-1"
},
{
"name": "SUSE-SU-2016:1672",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html"
},
{
"name": "USN-3021-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3021-1"
},
{
"name": "[oss-security] 20160518 Re: CVE Request: Linux: information leak in Rock Ridge Extensions to iso9660 -- fs/isofs/rock.c",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/05/18/5"
},
{
"name": "USN-3018-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3018-1"
},
{
"name": "[oss-security] 20160518 CVE Request: Linux: information leak in Rock Ridge Extensions to iso9660 -- fs/isofs/rock.c",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/05/18/3"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html"
},
{
"name": "90730",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/90730"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99d825822eade8d827a1817357cbf3f889a552d6",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99d825822eade8d827a1817357cbf3f889a552d6"
},
{
"name": "USN-3016-3",
"refsource": "UBUNTU",
@ -138,54 +178,14 @@
"url": "http://www.ubuntu.com/usn/USN-3016-4"
},
{
"name" : "USN-3017-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3017-1"
},
{
"name" : "USN-3017-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3017-2"
},
{
"name" : "USN-3017-3",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3017-3"
},
{
"name" : "USN-3018-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3018-1"
},
{
"name" : "USN-3018-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3018-2"
},
{
"name" : "USN-3019-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3019-1"
"name": "RHSA-2018:3096",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3096"
},
{
"name": "USN-3020-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3020-1"
},
{
"name" : "USN-3021-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3021-1"
},
{
"name" : "USN-3021-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3021-2"
},
{
"name" : "90730",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/90730"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/revive-adserver/revive-adserver/commit/05b1eceb",
"refsource" : "MISC",
"url" : "https://github.com/revive-adserver/revive-adserver/commit/05b1eceb"
},
{
"name": "https://hackerone.com/reports/128181",
"refsource": "MISC",
"url": "https://hackerone.com/reports/128181"
},
{
"name": "https://github.com/revive-adserver/revive-adserver/commit/05b1eceb",
"refsource": "MISC",
"url": "https://github.com/revive-adserver/revive-adserver/commit/05b1eceb"
},
{
"name": "https://www.revive-adserver.com/security/revive-sa-2016-002/",
"refsource": "MISC",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-9756",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.12",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.12"
},
{
"name": "[oss-security] 20161201 CVE request: Kernel: kvm: stack memory information leakage",
"refsource": "MLIST",
@ -63,29 +68,24 @@
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2117d5398c81554fbf803f5fd1dc55eb78216c0c"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.12",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.12"
"name": "94615",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94615"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1400468",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400468"
},
{
"name" : "https://github.com/torvalds/linux/commit/2117d5398c81554fbf803f5fd1dc55eb78216c0c",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/2117d5398c81554fbf803f5fd1dc55eb78216c0c"
},
{
"name": "openSUSE-SU-2017:0002",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00000.html"
},
{
"name" : "94615",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/94615"
"name": "https://github.com/torvalds/linux/commit/2117d5398c81554fbf803f5fd1dc55eb78216c0c",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/2117d5398c81554fbf803f5fd1dc55eb78216c0c"
}
]
}