"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 02:26:20 +00:00
parent 9690b0a7bc
commit fcbddbccce
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
65 changed files with 3697 additions and 3697 deletions

View File

@ -52,21 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070108 magic photo storage website Remote File Inclusion",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/456264/100/0/threaded"
},
{ {
"name": "3100", "name": "3100",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3100" "url": "https://www.exploit-db.com/exploits/3100"
}, },
{
"name" : "21965",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21965"
},
{ {
"name": "ADV-2007-0136", "name": "ADV-2007-0136",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -77,6 +67,16 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23687" "url": "http://secunia.com/advisories/23687"
}, },
{
"name": "20070108 magic photo storage website Remote File Inclusion",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/456264/100/0/threaded"
},
{
"name": "21965",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21965"
},
{ {
"name": "magicphotostorage-config-file-include(31347)", "name": "magicphotostorage-config-file-include(31347)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,25 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070106 NNL-Labs & MNIN - F5 FirePass Security Advisory",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/051651.html"
},
{
"name" : "http://www.mnin.org/advisories/2007_firepass.pdf",
"refsource" : "MISC",
"url" : "http://www.mnin.org/advisories/2007_firepass.pdf"
},
{ {
"name": "https://tech.f5.com/home/solutions/sol6923.html", "name": "https://tech.f5.com/home/solutions/sol6923.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://tech.f5.com/home/solutions/sol6923.html" "url": "https://tech.f5.com/home/solutions/sol6923.html"
}, },
{ {
"name" : "21957", "name": "http://www.mnin.org/advisories/2007_firepass.pdf",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/21957" "url": "http://www.mnin.org/advisories/2007_firepass.pdf"
}, },
{ {
"name": "32736", "name": "32736",
@ -81,6 +71,16 @@
"name": "23627", "name": "23627",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23627" "url": "http://secunia.com/advisories/23627"
},
{
"name": "20070106 NNL-Labs & MNIN - F5 FirePass Security Advisory",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/051651.html"
},
{
"name": "21957",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21957"
} }
] ]
} }

View File

@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070204 Sql injection bugs in Joomla and Mambo", "name": "32520",
"refsource" : "BUGTRAQ", "refsource": "OSVDB",
"url" : "http://www.securityfocus.com/archive/1/459203/100/0/threaded" "url": "http://osvdb.org/32520"
}, },
{ {
"name": "20070118 The vulnerabilities festival !", "name": "20070118 The vulnerabilities festival !",
"refsource": "FULLDISC", "refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0355.html" "url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0355.html"
}, },
{
"name" : "http://www.hackers.ir/advisories/festival.txt",
"refsource" : "MISC",
"url" : "http://www.hackers.ir/advisories/festival.txt"
},
{ {
"name": "19734", "name": "19734",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/19734" "url": "http://www.securityfocus.com/bid/19734"
}, },
{ {
"name" : "32520", "name": "20070204 Sql injection bugs in Joomla and Mambo",
"refsource" : "OSVDB", "refsource": "BUGTRAQ",
"url" : "http://osvdb.org/32520" "url": "http://www.securityfocus.com/archive/1/459203/100/0/threaded"
},
{
"name": "http://www.hackers.ir/advisories/festival.txt",
"refsource": "MISC",
"url": "http://www.hackers.ir/advisories/festival.txt"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070122 Check Point Connectra End Point security bypass", "name": "1017559",
"refsource" : "BUGTRAQ", "refsource": "SECTRACK",
"url" : "http://www.securityfocus.com/archive/1/457683/100/0/threaded" "url": "http://securitytracker.com/id?1017559"
},
{
"name" : "20070122 Re: [Full-disclosure] Check Point Connectra End Point security bypass",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/457621/100/0/threaded"
}, },
{ {
"name": "20070122 Check Point Connectra End Point security bypass", "name": "20070122 Check Point Connectra End Point security bypass",
@ -68,19 +63,9 @@
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/051920.html" "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/051920.html"
}, },
{ {
"name" : "http://secureknowledge.checkpoint.com/SecureKnowledge/viewSolutionDocument.do?lid=sk32472", "name": "20070122 Check Point Connectra End Point security bypass",
"refsource" : "MISC", "refsource": "BUGTRAQ",
"url" : "http://secureknowledge.checkpoint.com/SecureKnowledge/viewSolutionDocument.do?lid=sk32472" "url": "http://www.securityfocus.com/archive/1/457683/100/0/threaded"
},
{
"name" : "http://updates.checkpoint.com/fileserver/ID/7126/FILE/VPN-1_Hotfix1.pdf",
"refsource" : "MISC",
"url" : "http://updates.checkpoint.com/fileserver/ID/7126/FILE/VPN-1_Hotfix1.pdf"
},
{
"name" : "http://www.checkpoint.com/downloads/latest/hfa/vpn1_security/vpn1_R62_Windows.html",
"refsource" : "MISC",
"url" : "http://www.checkpoint.com/downloads/latest/hfa/vpn1_security/vpn1_R62_Windows.html"
}, },
{ {
"name": "http://www.checkpoint.com/downloads/latest/hfa/connectra/security_r62.html", "name": "http://www.checkpoint.com/downloads/latest/hfa/connectra/security_r62.html",
@ -88,39 +73,54 @@
"url": "http://www.checkpoint.com/downloads/latest/hfa/connectra/security_r62.html" "url": "http://www.checkpoint.com/downloads/latest/hfa/connectra/security_r62.html"
}, },
{ {
"name" : "ADV-2007-0276", "name": "http://www.checkpoint.com/downloads/latest/hfa/vpn1_security/vpn1_R62_Windows.html",
"refsource" : "VUPEN", "refsource": "MISC",
"url" : "http://www.vupen.com/english/advisories/2007/0276" "url": "http://www.checkpoint.com/downloads/latest/hfa/vpn1_security/vpn1_R62_Windows.html"
},
{
"name" : "31655",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/31655"
},
{
"name" : "1017559",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1017559"
},
{
"name" : "1017560",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1017560"
},
{
"name" : "23847",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23847"
}, },
{ {
"name": "2179", "name": "2179",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2179" "url": "http://securityreason.com/securityalert/2179"
}, },
{
"name": "23847",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23847"
},
{
"name": "20070122 Re: [Full-disclosure] Check Point Connectra End Point security bypass",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/457621/100/0/threaded"
},
{ {
"name": "checkpoint-params-security-bypass(31646)", "name": "checkpoint-params-security-bypass(31646)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31646" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31646"
},
{
"name": "http://secureknowledge.checkpoint.com/SecureKnowledge/viewSolutionDocument.do?lid=sk32472",
"refsource": "MISC",
"url": "http://secureknowledge.checkpoint.com/SecureKnowledge/viewSolutionDocument.do?lid=sk32472"
},
{
"name": "31655",
"refsource": "OSVDB",
"url": "http://osvdb.org/31655"
},
{
"name": "1017560",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017560"
},
{
"name": "http://updates.checkpoint.com/fileserver/ID/7126/FILE/VPN-1_Hotfix1.pdf",
"refsource": "MISC",
"url": "http://updates.checkpoint.com/fileserver/ID/7126/FILE/VPN-1_Hotfix1.pdf"
},
{
"name": "ADV-2007-0276",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0276"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "22460",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22460"
},
{ {
"name": "33122", "name": "33122",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -66,6 +61,11 @@
"name": "23217", "name": "23217",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23217" "url": "http://secunia.com/advisories/23217"
},
{
"name": "22460",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22460"
} }
] ]
} }

View File

@ -53,39 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "3409", "name": "ajdating-userid-sql-injection(42326)",
"refsource" : "EXPLOIT-DB", "refsource": "XF",
"url" : "https://www.exploit-db.com/exploits/3409" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42326"
},
{
"name" : "5593",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/5593"
},
{
"name" : "22808",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22808"
},
{
"name" : "29154",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/29154"
},
{
"name" : "ADV-2007-0821",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0821"
},
{
"name" : "33828",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33828"
},
{
"name" : "24376",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24376"
}, },
{ {
"name": "ajdating-viewprofile-sql-injection(32788)", "name": "ajdating-viewprofile-sql-injection(32788)",
@ -93,9 +63,39 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32788" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32788"
}, },
{ {
"name" : "ajdating-userid-sql-injection(42326)", "name": "29154",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42326" "url": "http://www.securityfocus.com/bid/29154"
},
{
"name": "3409",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3409"
},
{
"name": "33828",
"refsource": "OSVDB",
"url": "http://osvdb.org/33828"
},
{
"name": "22808",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22808"
},
{
"name": "5593",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5593"
},
{
"name": "ADV-2007-0821",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0821"
},
{
"name": "24376",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24376"
} }
] ]
} }

View File

@ -57,6 +57,31 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/462263/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/462263/100/0/threaded"
}, },
{
"name": "20070314 Re: Re: [Full-disclosure] PHP import_request_variables() arbitrary variable overwrite",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/462800/100/0/threaded"
},
{
"name": "26048",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26048"
},
{
"name": "22886",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22886"
},
{
"name": "http://us2.php.net/releases/4_4_7.php",
"refsource": "CONFIRM",
"url": "http://us2.php.net/releases/4_4_7.php"
},
{
"name": "2406",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2406"
},
{ {
"name": "20070310 Re: [Full-disclosure] PHP import_request_variables() arbitrary variable overwrite", "name": "20070310 Re: [Full-disclosure] PHP import_request_variables() arbitrary variable overwrite",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -67,16 +92,6 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/462658/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/462658/100/0/threaded"
}, },
{
"name" : "20070314 Re: Re: [Full-disclosure] PHP import_request_variables() arbitrary variable overwrite",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/462800/100/0/threaded"
},
{
"name" : "http://us2.php.net/releases/4_4_7.php",
"refsource" : "CONFIRM",
"url" : "http://us2.php.net/releases/4_4_7.php"
},
{ {
"name": "http://us2.php.net/releases/5_2_2.php", "name": "http://us2.php.net/releases/5_2_2.php",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -86,21 +101,6 @@
"name": "SUSE-SA:2007:044", "name": "SUSE-SA:2007:044",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html"
},
{
"name" : "22886",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22886"
},
{
"name" : "26048",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26048"
},
{
"name" : "2406",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2406"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "3568",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3568"
},
{ {
"name": "37179", "name": "37179",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -66,6 +61,11 @@
"name": "freeimagehosting-adbodytemp-file-include(33196)", "name": "freeimagehosting-adbodytemp-file-include(33196)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33196" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33196"
},
{
"name": "3568",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3568"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2007-1755", "ID": "CVE-2007-1755",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "wengophone-sip-invite-dos(35967)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35967"
},
{ {
"name": "20070812 WengoPhone SIP phone Remote Denial of Service vulnerability", "name": "20070812 WengoPhone SIP phone Remote Denial of Service vulnerability",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -71,11 +76,6 @@
"name": "3015", "name": "3015",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3015" "url": "http://securityreason.com/securityalert/3015"
},
{
"name" : "wengophone-sip-invite-dos(35967)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35967"
} }
] ]
} }

View File

@ -58,9 +58,14 @@
"url": "http://www.securityfocus.com/archive/1/478720/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/478720/100/0/threaded"
}, },
{ {
"name" : "http://blog.hispasec.com/lab/advisories/adv_TotalCommander_7_01_Remote_Traversal.txt", "name": "26734",
"refsource" : "MISC", "refsource": "SECUNIA",
"url" : "http://blog.hispasec.com/lab/advisories/adv_TotalCommander_7_01_Remote_Traversal.txt" "url": "http://secunia.com/advisories/26734"
},
{
"name": "39838",
"refsource": "OSVDB",
"url": "http://osvdb.org/39838"
}, },
{ {
"name": "http://www.ghisler.com/whatsnew.htm", "name": "http://www.ghisler.com/whatsnew.htm",
@ -72,36 +77,31 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/25581" "url": "http://www.securityfocus.com/bid/25581"
}, },
{
"name" : "ADV-2007-3102",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3102"
},
{
"name" : "39838",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/39838"
},
{
"name" : "1018662",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018662"
},
{
"name" : "26734",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26734"
},
{ {
"name": "3106", "name": "3106",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3106" "url": "http://securityreason.com/securityalert/3106"
}, },
{
"name": "http://blog.hispasec.com/lab/advisories/adv_TotalCommander_7_01_Remote_Traversal.txt",
"refsource": "MISC",
"url": "http://blog.hispasec.com/lab/advisories/adv_TotalCommander_7_01_Remote_Traversal.txt"
},
{ {
"name": "totalcommander-ftp-weak-security(36487)", "name": "totalcommander-ftp-weak-security(36487)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36487" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36487"
}, },
{
"name": "ADV-2007-3102",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3102"
},
{
"name": "1018662",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018662"
},
{ {
"name": "totalcommander-ftp-directory-traversal(36486)", "name": "totalcommander-ftp-directory-traversal(36486)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070906 [HISPASEC] 2K7SEPT6 Magellan Explorer 3.32 build 2305 Remote FTP Client Directory Traversal",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/478755/100/0/threaded"
},
{
"name" : "http://blog.hispasec.com/lab/advisories/adv_MagellanExplorer_3_32_Remote_Traversal.txt",
"refsource" : "MISC",
"url" : "http://blog.hispasec.com/lab/advisories/adv_MagellanExplorer_3_32_Remote_Traversal.txt"
},
{
"name" : "ADV-2007-3103",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3103"
},
{ {
"name": "40501", "name": "40501",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -78,9 +63,19 @@
"url": "http://www.securitytracker.com/id?1018661" "url": "http://www.securitytracker.com/id?1018661"
}, },
{ {
"name" : "26737", "name": "ADV-2007-3103",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/26737" "url": "http://www.vupen.com/english/advisories/2007/3103"
},
{
"name": "20070906 [HISPASEC] 2K7SEPT6 Magellan Explorer 3.32 build 2305 Remote FTP Client Directory Traversal",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/478755/100/0/threaded"
},
{
"name": "magellan-ftp-directory-traversal(36499)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36499"
}, },
{ {
"name": "3123", "name": "3123",
@ -88,9 +83,14 @@
"url": "http://securityreason.com/securityalert/3123" "url": "http://securityreason.com/securityalert/3123"
}, },
{ {
"name" : "magellan-ftp-directory-traversal(36499)", "name": "http://blog.hispasec.com/lab/advisories/adv_MagellanExplorer_3_32_Remote_Traversal.txt",
"refsource" : "XF", "refsource": "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36499" "url": "http://blog.hispasec.com/lab/advisories/adv_MagellanExplorer_3_32_Remote_Traversal.txt"
},
{
"name": "26737",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26737"
} }
] ]
} }

View File

@ -52,16 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.mwrinfosecurity.com/publications/mwri_merak-webmail-xss-advisory_2008-09-17.pdf",
"refsource" : "MISC",
"url" : "http://www.mwrinfosecurity.com/publications/mwri_merak-webmail-xss-advisory_2008-09-17.pdf"
},
{ {
"name": "25708", "name": "25708",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/25708" "url": "http://www.securityfocus.com/bid/25708"
}, },
{
"name": "26877",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26877"
},
{
"name": "http://www.mwrinfosecurity.com/publications/mwri_merak-webmail-xss-advisory_2008-09-17.pdf",
"refsource": "MISC",
"url": "http://www.mwrinfosecurity.com/publications/mwri_merak-webmail-xss-advisory_2008-09-17.pdf"
},
{ {
"name": "ADV-2007-3225", "name": "ADV-2007-3225",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -71,11 +76,6 @@
"name": "37428", "name": "37428",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/37428" "url": "http://osvdb.org/37428"
},
{
"name" : "26877",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26877"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20150316 Moodle security issues are now public",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2015/03/16/1"
},
{ {
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-49087", "name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-49087",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "https://moodle.org/mod/forum/discuss.php?d=307381", "name": "https://moodle.org/mod/forum/discuss.php?d=307381",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://moodle.org/mod/forum/discuss.php?d=307381" "url": "https://moodle.org/mod/forum/discuss.php?d=307381"
},
{
"name": "[oss-security] 20150316 Moodle security issues are now public",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2015/03/16/1"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20150316 Moodle security issues are now public",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2015/03/16/1"
},
{ {
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-49364", "name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-49364",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "https://moodle.org/mod/forum/discuss.php?d=307387", "name": "https://moodle.org/mod/forum/discuss.php?d=307387",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://moodle.org/mod/forum/discuss.php?d=307387" "url": "https://moodle.org/mod/forum/discuss.php?d=307387"
},
{
"name": "[oss-security] 20150316 Moodle security issues are now public",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2015/03/16/1"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-2643", "ID": "CVE-2015-2643",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,25 +58,60 @@
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "name": "1032911",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" "url": "http://www.securitytracker.com/id/1032911"
},
{
"name": "RHSA-2015:1646",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1646.html"
}, },
{ {
"name": "DSA-3308", "name": "DSA-3308",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3308" "url": "http://www.debian.org/security/2015/dsa-3308"
}, },
{
"name": "openSUSE-SU-2015:1629",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html"
},
{ {
"name": "DSA-3311", "name": "DSA-3311",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3311" "url": "http://www.debian.org/security/2015/dsa-3311"
}, },
{
"name": "RHSA-2015:1647",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1647.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name": "RHSA-2015:1628",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1628.html"
},
{
"name": "USN-2674-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2674-1"
},
{ {
"name": "GLSA-201610-06", "name": "GLSA-201610-06",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201610-06" "url": "https://security.gentoo.org/glsa/201610-06"
}, },
{
"name": "75830",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/75830"
},
{ {
"name": "RHSA-2015:1630", "name": "RHSA-2015:1630",
"refsource": "REDHAT", "refsource": "REDHAT",
@ -87,45 +122,10 @@
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1629.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-1629.html"
}, },
{
"name" : "RHSA-2015:1628",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1628.html"
},
{
"name" : "RHSA-2015:1646",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1646.html"
},
{
"name" : "RHSA-2015:1647",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1647.html"
},
{ {
"name": "RHSA-2015:1665", "name": "RHSA-2015:1665",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1665.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-1665.html"
},
{
"name" : "openSUSE-SU-2015:1629",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html"
},
{
"name" : "USN-2674-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2674-1"
},
{
"name" : "75830",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/75830"
},
{
"name" : "1032911",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1032911"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-6230", "ID": "CVE-2015-6230",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-6297", "ID": "CVE-2015-6297",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-6424", "ID": "CVE-2015-6424",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2015-6600", "ID": "CVE-2015-6600",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-6978", "ID": "CVE-2015-6978",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,24 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-15-533", "name": "APPLE-SA-2015-10-21-4",
"refsource" : "MISC", "refsource": "APPLE",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-533" "url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html"
},
{
"name" : "https://support.apple.com/HT205370",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205370"
},
{
"name" : "https://support.apple.com/HT205375",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205375"
},
{
"name" : "https://support.apple.com/HT205641",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205641"
}, },
{ {
"name": "APPLE-SA-2015-10-21-1", "name": "APPLE-SA-2015-10-21-1",
@ -78,20 +63,35 @@
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html" "url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html"
}, },
{ {
"name" : "APPLE-SA-2015-10-21-4", "name": "https://support.apple.com/HT205375",
"refsource" : "APPLE", "refsource": "CONFIRM",
"url" : "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html" "url": "https://support.apple.com/HT205375"
}, },
{ {
"name": "APPLE-SA-2015-12-08-4", "name": "APPLE-SA-2015-12-08-4",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00002.html" "url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00002.html"
}, },
{
"name": "https://support.apple.com/HT205370",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205370"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-533",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-533"
},
{ {
"name": "77263", "name": "77263",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/77263" "url": "http://www.securityfocus.com/bid/77263"
}, },
{
"name": "https://support.apple.com/HT205641",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205641"
},
{ {
"name": "1033929", "name": "1033929",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-7550", "ID": "CVE-2015-7550",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,15 +53,30 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b4a1b4f5047e4f54e194681125c74c0aa64d637d", "name": "79903",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b4a1b4f5047e4f54e194681125c74c0aa64d637d" "url": "http://www.securityfocus.com/bid/79903"
}, },
{ {
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.4", "name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.4",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.4" "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.4"
}, },
{
"name": "USN-2911-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2911-1"
},
{
"name": "USN-2890-3",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2890-3"
},
{
"name": "SUSE-SU-2016:1102",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html"
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1291197", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1291197",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -73,14 +88,9 @@
"url": "https://github.com/torvalds/linux/commit/b4a1b4f5047e4f54e194681125c74c0aa64d637d" "url": "https://github.com/torvalds/linux/commit/b4a1b4f5047e4f54e194681125c74c0aa64d637d"
}, },
{ {
"name" : "https://security-tracker.debian.org/tracker/CVE-2015-7550", "name": "USN-2911-2",
"refsource" : "CONFIRM", "refsource": "UBUNTU",
"url" : "https://security-tracker.debian.org/tracker/CVE-2015-7550" "url": "http://www.ubuntu.com/usn/USN-2911-2"
},
{
"name" : "DSA-3434",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3434"
}, },
{ {
"name": "SUSE-SU-2016:2074", "name": "SUSE-SU-2016:2074",
@ -88,19 +98,19 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html"
}, },
{ {
"name" : "SUSE-SU-2016:0911", "name": "USN-2890-2",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html"
},
{
"name" : "SUSE-SU-2016:1102",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html"
},
{
"name" : "USN-2888-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2888-1" "url": "http://www.ubuntu.com/usn/USN-2890-2"
},
{
"name": "https://security-tracker.debian.org/tracker/CVE-2015-7550",
"refsource": "CONFIRM",
"url": "https://security-tracker.debian.org/tracker/CVE-2015-7550"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b4a1b4f5047e4f54e194681125c74c0aa64d637d",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b4a1b4f5047e4f54e194681125c74c0aa64d637d"
}, },
{ {
"name": "USN-2890-1", "name": "USN-2890-1",
@ -108,29 +118,19 @@
"url": "http://www.ubuntu.com/usn/USN-2890-1" "url": "http://www.ubuntu.com/usn/USN-2890-1"
}, },
{ {
"name" : "USN-2890-2", "name": "DSA-3434",
"refsource" : "UBUNTU", "refsource": "DEBIAN",
"url" : "http://www.ubuntu.com/usn/USN-2890-2" "url": "http://www.debian.org/security/2016/dsa-3434"
}, },
{ {
"name" : "USN-2890-3", "name": "USN-2888-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2890-3" "url": "http://www.ubuntu.com/usn/USN-2888-1"
}, },
{ {
"name" : "USN-2911-1", "name": "SUSE-SU-2016:0911",
"refsource" : "UBUNTU", "refsource": "SUSE",
"url" : "http://www.ubuntu.com/usn/USN-2911-1" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html"
},
{
"name" : "USN-2911-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2911-2"
},
{
"name" : "79903",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/79903"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.citrix.com/article/CTX202482",
"refsource" : "CONFIRM",
"url" : "http://support.citrix.com/article/CTX202482"
},
{ {
"name": "1034167", "name": "1034167",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034167" "url": "http://www.securitytracker.com/id/1034167"
},
{
"name": "http://support.citrix.com/article/CTX202482",
"refsource": "CONFIRM",
"url": "http://support.citrix.com/article/CTX202482"
} }
] ]
} }

View File

@ -79,15 +79,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21997687",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21997687"
},
{ {
"name": "ibm-openpages-cve20160234-info-disc(110303)", "name": "ibm-openpages-cve20160234-info-disc(110303)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/110303" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/110303"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21997687",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21997687"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21983137",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21983137"
},
{ {
"name": "92475", "name": "92475",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/92475" "url": "http://www.securityfocus.com/bid/92475"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21983137",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21983137"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@debian.org",
"ID": "CVE-2016-1242", "ID": "CVE-2016-1242",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.tryton.org/posts/security-release-for-issue5795-and-issue5808.html" "url": "http://www.tryton.org/posts/security-release-for-issue5795-and-issue5808.html"
}, },
{
"name" : "https://bugs.tryton.org/issue5808",
"refsource" : "CONFIRM",
"url" : "https://bugs.tryton.org/issue5808"
},
{ {
"name": "DSA-3656", "name": "DSA-3656",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3656" "url": "http://www.debian.org/security/2016/dsa-3656"
},
{
"name": "https://bugs.tryton.org/issue5808",
"refsource": "CONFIRM",
"url": "https://bugs.tryton.org/issue5808"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1396", "ID": "CVE-2016-1396",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://xenbits.xen.org/xsa/advisory-168.html",
"refsource" : "CONFIRM",
"url" : "http://xenbits.xen.org/xsa/advisory-168.html"
},
{
"name" : "http://support.citrix.com/article/CTX205496",
"refsource" : "CONFIRM",
"url" : "http://support.citrix.com/article/CTX205496"
},
{ {
"name": "DSA-3519", "name": "DSA-3519",
"refsource": "DEBIAN", "refsource": "DEBIAN",
@ -71,6 +61,16 @@
"name": "1034745", "name": "1034745",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034745" "url": "http://www.securitytracker.com/id/1034745"
},
{
"name": "http://support.citrix.com/article/CTX205496",
"refsource": "CONFIRM",
"url": "http://support.citrix.com/article/CTX205496"
},
{
"name": "http://xenbits.xen.org/xsa/advisory-168.html",
"refsource": "CONFIRM",
"url": "http://xenbits.xen.org/xsa/advisory-168.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2016-1779", "ID": "CVE-2016-1779",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,26 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20160331 WebKitGTK+ Security Advisory WSA-2016-0003",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/537948/100/0/threaded"
},
{
"name" : "https://support.apple.com/HT206166",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206166"
},
{
"name" : "https://support.apple.com/HT206171",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206171"
},
{
"name" : "APPLE-SA-2016-03-21-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html"
},
{ {
"name": "APPLE-SA-2016-03-21-6", "name": "APPLE-SA-2016-03-21-6",
"refsource": "APPLE", "refsource": "APPLE",
@ -81,6 +61,26 @@
"name": "1035353", "name": "1035353",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035353" "url": "http://www.securitytracker.com/id/1035353"
},
{
"name": "APPLE-SA-2016-03-21-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html"
},
{
"name": "20160331 WebKitGTK+ Security Advisory WSA-2016-0003",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/537948/100/0/threaded"
},
{
"name": "https://support.apple.com/HT206171",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206171"
},
{
"name": "https://support.apple.com/HT206166",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206166"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2016-1964", "ID": "CVE-2016-1964",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.mozilla.org/security/announce/2016/mfsa2016-27.html", "name": "openSUSE-SU-2016:0894",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "http://www.mozilla.org/security/announce/2016/mfsa2016-27.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html"
}, },
{ {
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1243335", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1243335",
@ -63,80 +63,95 @@
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1243335" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1243335"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "name": "http://www.mozilla.org/security/announce/2016/mfsa2016-27.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-27.html"
},
{
"name" : "DSA-3510",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3510"
},
{
"name" : "DSA-3520",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3520"
},
{
"name" : "GLSA-201605-06",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201605-06"
},
{
"name" : "openSUSE-SU-2016:0894",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html"
},
{
"name" : "openSUSE-SU-2016:1767",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html"
},
{
"name" : "openSUSE-SU-2016:1769",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html"
},
{
"name" : "openSUSE-SU-2016:1778",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html"
},
{
"name" : "SUSE-SU-2016:0909",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html"
},
{
"name" : "SUSE-SU-2016:0727",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html"
},
{
"name" : "SUSE-SU-2016:0777",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html"
},
{
"name" : "openSUSE-SU-2016:0731",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html"
},
{
"name" : "openSUSE-SU-2016:0733",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html"
}, },
{ {
"name": "SUSE-SU-2016:0820", "name": "SUSE-SU-2016:0820",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00068.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00068.html"
}, },
{
"name": "openSUSE-SU-2016:1767",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
},
{
"name": "openSUSE-SU-2016:0731",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html"
},
{
"name": "SUSE-SU-2016:0727",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html"
},
{
"name": "openSUSE-SU-2016:1778",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html"
},
{ {
"name": "openSUSE-SU-2016:0876", "name": "openSUSE-SU-2016:0876",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html"
}, },
{
"name": "USN-2917-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2917-1"
},
{
"name": "DSA-3520",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3520"
},
{
"name": "openSUSE-SU-2016:1769",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html"
},
{
"name": "SUSE-SU-2016:0909",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html"
},
{
"name": "DSA-3510",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3510"
},
{
"name": "openSUSE-SU-2016:0733",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html"
},
{
"name": "1035215",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035215"
},
{
"name": "SUSE-SU-2016:0777",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html"
},
{
"name": "GLSA-201605-06",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201605-06"
},
{
"name": "USN-2934-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2934-1"
},
{ {
"name": "USN-2917-2", "name": "USN-2917-2",
"refsource": "UBUNTU", "refsource": "UBUNTU",
@ -146,21 +161,6 @@
"name": "USN-2917-3", "name": "USN-2917-3",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2917-3" "url": "http://www.ubuntu.com/usn/USN-2917-3"
},
{
"name" : "USN-2934-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2934-1"
},
{
"name" : "USN-2917-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2917-1"
},
{
"name" : "1035215",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035215"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-4347", "ID": "CVE-2016-4347",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -58,19 +58,9 @@
"url": "https://support.apple.com/HT207141" "url": "https://support.apple.com/HT207141"
}, },
{ {
"name" : "https://support.apple.com/HT207142", "name": "1036858",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://support.apple.com/HT207142" "url": "http://www.securitytracker.com/id/1036858"
},
{
"name" : "https://support.apple.com/HT207143",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT207143"
},
{
"name" : "https://support.apple.com/HT207170",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT207170"
}, },
{ {
"name": "APPLE-SA-2016-09-20", "name": "APPLE-SA-2016-09-20",
@ -98,9 +88,19 @@
"url": "http://www.securityfocus.com/bid/93054" "url": "http://www.securityfocus.com/bid/93054"
}, },
{ {
"name" : "1036858", "name": "https://support.apple.com/HT207170",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1036858" "url": "https://support.apple.com/HT207170"
},
{
"name": "https://support.apple.com/HT207142",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207142"
},
{
"name": "https://support.apple.com/HT207143",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207143"
} }
] ]
} }

View File

@ -100,15 +100,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0645",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0645"
},
{ {
"name": "106896", "name": "106896",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/106896" "url": "http://www.securityfocus.com/bid/106896"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0645",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0645"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2019-1000047", "ID": "CVE-2019-1000047",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "lpardo@redhat.com", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2019-3833", "ID": "CVE-2019-3833",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -67,15 +67,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://bugzilla.suse.com/show_bug.cgi?id=1122623" "url": "http://bugzilla.suse.com/show_bug.cgi?id=1122623"
}, },
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3833",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3833"
},
{ {
"name": "107367", "name": "107367",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/107367" "url": "http://www.securityfocus.com/bid/107367"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3833",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3833"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html"
},
{ {
"name": "[debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update", "name": "[debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update",
"refsource": "MLIST", "refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html" "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html"
}, },
{
"name": "[debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html"
},
{ {
"name": "https://bugzilla.libsdl.org/show_bug.cgi?id=4494", "name": "https://bugzilla.libsdl.org/show_bug.cgi?id=4494",
"refsource": "MISC", "refsource": "MISC",