"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 04:54:59 +00:00
parent 67bea184e8
commit 1274c1b3d2
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
48 changed files with 3875 additions and 3875 deletions

View File

@ -52,45 +52,45 @@
},
"references": {
"reference_data": [
{
"name" : "20060112 [eVuln] Wordcircle Multiple SQL Injection & XSS Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/421746/100/0/threaded"
},
{
"name" : "http://evuln.com/vulns/28/summary.html",
"refsource" : "MISC",
"url" : "http://evuln.com/vulns/28/summary.html"
},
{
"name" : "16227",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16227"
},
{
"name": "ADV-2006-0185",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0185"
},
{
"name": "wordcircle-index-xss(24106)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24106"
},
{
"name": "22359",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22359"
},
{
"name" : "18440",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18440"
},
{
"name": "345",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/345"
},
{
"name" : "wordcircle-index-xss(24106)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24106"
"name": "18440",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18440"
},
{
"name": "16227",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16227"
},
{
"name": "http://evuln.com/vulns/28/summary.html",
"refsource": "MISC",
"url": "http://evuln.com/vulns/28/summary.html"
},
{
"name": "20060112 [eVuln] Wordcircle Multiple SQL Injection & XSS Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/421746/100/0/threaded"
}
]
}

View File

@ -58,39 +58,9 @@
"url": "http://www.f-secure.com/security/fsc-2006-1.shtml"
},
{
"name" : "Q-103",
"refsource" : "CIAC",
"url" : "http://www.ciac.org/ciac/bulletins/q-103.shtml"
},
{
"name" : "16309",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16309"
},
{
"name" : "ADV-2006-0257",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0257"
},
{
"name" : "22633",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/22633"
},
{
"name" : "1015507",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015507"
},
{
"name" : "1015508",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015508"
},
{
"name" : "1015509",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015509"
"name": "fsecure-rar-zip-scan-bypass(24199)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24199"
},
{
"name": "1015510",
@ -103,9 +73,39 @@
"url": "http://secunia.com/advisories/18529"
},
{
"name" : "fsecure-rar-zip-scan-bypass(24199)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24199"
"name": "22633",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22633"
},
{
"name": "1015509",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015509"
},
{
"name": "16309",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16309"
},
{
"name": "Q-103",
"refsource": "CIAC",
"url": "http://www.ciac.org/ciac/bulletins/q-103.shtml"
},
{
"name": "1015508",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015508"
},
{
"name": "1015507",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015507"
},
{
"name": "ADV-2006-0257",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0257"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "16762",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16762"
},
{
"name": "20060219 [TZO-062006] Safe'nVulnerable",
"refsource": "BUGTRAQ",
@ -61,11 +66,6 @@
"name": "http://secdev.zoller.lu/research/safnsec.htm",
"refsource": "MISC",
"url": "http://secdev.zoller.lu/research/safnsec.htm"
},
{
"name" : "16762",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16762"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.nufw.org/+NuFW-1-21-minor-security-fix+.html",
"refsource" : "CONFIRM",
"url" : "http://www.nufw.org/+NuFW-1-21-minor-security-fix+.html"
},
{
"name" : "16868",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16868"
},
{
"name": "ADV-2006-0762",
"refsource": "VUPEN",
@ -71,6 +61,16 @@
"name": "19046",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19046"
},
{
"name": "http://www.nufw.org/+NuFW-1-21-minor-security-fix+.html",
"refsource": "CONFIRM",
"url": "http://www.nufw.org/+NuFW-1-21-minor-security-fix+.html"
},
{
"name": "16868",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16868"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/426538/100/0/threaded"
},
{
"name" : "http://www.joomla.org/content/view/938/78/",
"refsource" : "MISC",
"url" : "http://www.joomla.org/content/view/938/78/"
},
{
"name": "23816",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/23816"
},
{
"name": "http://www.joomla.org/content/view/938/78/",
"refsource": "MISC",
"url": "http://www.joomla.org/content/view/938/78/"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20060412 QuickBlogger v1.4 Cross-Site Scripting",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/430878/100/0/threaded"
"name": "quickblogger-acc-xss(25795)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25795"
},
{
"name": "20060414 Re: QuickBlogger v1.4 Cross-Site Scripting",
@ -68,9 +68,9 @@
"url": "http://secunia.com/advisories/15942"
},
{
"name" : "quickblogger-acc-xss(25795)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25795"
"name": "20060412 QuickBlogger v1.4 Cross-Site Scripting",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/430878/100/0/threaded"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2006-3115",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2006-47/advisory/"
},
{
"name" : "20200",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20200"
},
{
"name": "phpraid-view-sql-injection(27457)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27457"
},
{
"name": "20200",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20200"
}
]
}

View File

@ -58,14 +58,14 @@
"url": "http://archives.neohapsis.com/archives/bugtraq/2006-07/0180.html"
},
{
"name" : "http://advisories.echo.or.id/adv/adv38-matdhule-2006.txt",
"refsource" : "MISC",
"url" : "http://advisories.echo.or.id/adv/adv38-matdhule-2006.txt"
"name": "21055",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21055"
},
{
"name" : "2028",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/2028"
"name": "sitemap-sitemapxml-file-include(27723)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27723"
},
{
"name": "18991",
@ -77,25 +77,25 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24592"
},
{
"name" : "ADV-2006-2803",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2803"
},
{
"name" : "21055",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21055"
},
{
"name": "1249",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1249"
},
{
"name" : "sitemap-sitemapxml-file-include(27723)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27723"
"name": "2028",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2028"
},
{
"name": "http://advisories.echo.or.id/adv/adv38-matdhule-2006.txt",
"refsource": "MISC",
"url": "http://advisories.echo.or.id/adv/adv38-matdhule-2006.txt"
},
{
"name": "ADV-2006-2803",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2803"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.soft3304.net/04WebServer/Security.html",
"refsource" : "CONFIRM",
"url" : "http://www.soft3304.net/04WebServer/Security.html"
},
{
"name": "19496",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19496"
},
{
"name" : "21504",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21504"
"name": "http://www.soft3304.net/04WebServer/Security.html",
"refsource": "CONFIRM",
"url": "http://www.soft3304.net/04WebServer/Security.html"
},
{
"name": "04webserver-error-page-xss(28354)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28354"
},
{
"name": "21504",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21504"
}
]
}

View File

@ -53,99 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070709 Multiple Vendor GIMP Multiple Integer Overflow Vulnerabilities",
"refsource" : "IDEFENSE",
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=551"
},
{
"name" : "20070801 FLEA-2007-0038-1 gimp",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/475257/100/0/threaded"
},
{
"name" : "http://bugzilla.gnome.org/show_bug.cgi?id=451379",
"refsource" : "CONFIRM",
"url" : "http://bugzilla.gnome.org/show_bug.cgi?id=451379"
},
{
"name" : "http://developer.gimp.org/NEWS-2.2",
"refsource" : "CONFIRM",
"url" : "http://developer.gimp.org/NEWS-2.2"
},
{
"name" : "http://issues.foresightlinux.org/browse/FL-457",
"refsource" : "CONFIRM",
"url" : "http://issues.foresightlinux.org/browse/FL-457"
},
{
"name" : "DSA-1335",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1335"
},
{
"name" : "GLSA-200707-09",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200707-09.xml"
},
{
"name" : "MDKSA-2007:170",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:170"
},
{
"name" : "RHSA-2007:0513",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0513.html"
},
{
"name" : "USN-494-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-494-1"
},
{
"name" : "24835",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24835"
},
{
"name" : "42139",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/42139"
},
{
"name" : "42140",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/42140"
},
{
"name" : "42141",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/42141"
},
{
"name" : "42142",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/42142"
},
{
"name" : "42143",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/42143"
},
{
"name" : "42144",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/42144"
},
{
"name" : "42145",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/42145"
},
{
"name" : "oval:org.mitre.oval:def:10842",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10842"
"name": "26132",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26132"
},
{
"name": "ADV-2007-2471",
@ -153,19 +63,29 @@
"url": "http://www.vupen.com/english/advisories/2007/2471"
},
{
"name" : "1018349",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018349"
"name": "20070801 FLEA-2007-0038-1 gimp",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/475257/100/0/threaded"
},
{
"name" : "26132",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26132"
"name": "gimp-plugins-code-execution(35308)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35308"
},
{
"name" : "26215",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26215"
"name": "42139",
"refsource": "OSVDB",
"url": "http://osvdb.org/42139"
},
{
"name": "GLSA-200707-09",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200707-09.xml"
},
{
"name": "oval:org.mitre.oval:def:10842",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10842"
},
{
"name": "26240",
@ -177,15 +97,95 @@
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26575"
},
{
"name": "42140",
"refsource": "OSVDB",
"url": "http://osvdb.org/42140"
},
{
"name": "USN-494-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-494-1"
},
{
"name": "http://bugzilla.gnome.org/show_bug.cgi?id=451379",
"refsource": "CONFIRM",
"url": "http://bugzilla.gnome.org/show_bug.cgi?id=451379"
},
{
"name": "http://developer.gimp.org/NEWS-2.2",
"refsource": "CONFIRM",
"url": "http://developer.gimp.org/NEWS-2.2"
},
{
"name": "RHSA-2007:0513",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0513.html"
},
{
"name": "20070709 Multiple Vendor GIMP Multiple Integer Overflow Vulnerabilities",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=551"
},
{
"name": "42143",
"refsource": "OSVDB",
"url": "http://osvdb.org/42143"
},
{
"name": "42145",
"refsource": "OSVDB",
"url": "http://osvdb.org/42145"
},
{
"name": "24835",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24835"
},
{
"name": "26215",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26215"
},
{
"name": "1018349",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018349"
},
{
"name": "42144",
"refsource": "OSVDB",
"url": "http://osvdb.org/42144"
},
{
"name": "MDKSA-2007:170",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:170"
},
{
"name": "42141",
"refsource": "OSVDB",
"url": "http://osvdb.org/42141"
},
{
"name": "DSA-1335",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1335"
},
{
"name": "26939",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26939"
},
{
"name" : "gimp-plugins-code-execution(35308)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35308"
"name": "42142",
"refsource": "OSVDB",
"url": "http://osvdb.org/42142"
},
{
"name": "http://issues.foresightlinux.org/browse/FL-457",
"refsource": "CONFIRM",
"url": "http://issues.foresightlinux.org/browse/FL-457"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2006-4808",
"STATE": "PUBLIC"
},
@ -53,50 +53,65 @@
"references": {
"reference_data": [
{
"name" : "http://www.discontinuity.info/~rowan/pocs/libimlib2_pocs-1.2.0-2.2.tar.gz",
"refsource" : "MISC",
"url" : "http://www.discontinuity.info/~rowan/pocs/libimlib2_pocs-1.2.0-2.2.tar.gz"
"name": "imlib2-loadertgac-bo(30068)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30068"
},
{
"name" : "GLSA-200612-20",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200612-20.xml"
},
{
"name" : "MDKSA-2006:198",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:198"
"name": "22932",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22932"
},
{
"name": "MDKSA-2007:156",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:156"
},
{
"name": "22752",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22752"
},
{
"name": "MDKSA-2006:198",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:198"
},
{
"name": "SUSE-SR:2006:026",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2006_26_sr.html"
},
{
"name" : "USN-376-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-376-1"
},
{
"name" : "USN-376-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-376-2"
},
{
"name": "20903",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20903"
},
{
"name": "http://www.discontinuity.info/~rowan/pocs/libimlib2_pocs-1.2.0-2.2.tar.gz",
"refsource": "MISC",
"url": "http://www.discontinuity.info/~rowan/pocs/libimlib2_pocs-1.2.0-2.2.tar.gz"
},
{
"name": "USN-376-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-376-2"
},
{
"name": "GLSA-200612-20",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200612-20.xml"
},
{
"name": "ADV-2006-4349",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4349"
},
{
"name": "23441",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23441"
},
{
"name": "30103",
"refsource": "OSVDB",
@ -113,24 +128,9 @@
"url": "http://secunia.com/advisories/22744"
},
{
"name" : "22752",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22752"
},
{
"name" : "23441",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23441"
},
{
"name" : "22932",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22932"
},
{
"name" : "imlib2-loadertgac-bo(30068)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30068"
"name": "USN-376-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-376-1"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2238",
"STATE": "PUBLIC"
},
@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name" : "http://libvirt.org/news.html",
"refsource" : "MISC",
"url" : "http://libvirt.org/news.html"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=607811",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=607811"
},
{
"name": "FEDORA-2010-10960",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044520.html"
},
{
"name": "USN-1008-2",
"refsource": "UBUNTU",
"url": "http://ubuntu.com/usn/usn-1008-2"
},
{
"name": "FEDORA-2010-11021",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044579.html"
},
{
"name" : "SUSE-SR:2010:017",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=607811",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=607811"
},
{
"name": "http://libvirt.org/news.html",
"refsource": "MISC",
"url": "http://libvirt.org/news.html"
},
{
"name": "USN-1008-1",
@ -83,9 +83,9 @@
"url": "http://ubuntu.com/usn/usn-1008-1"
},
{
"name" : "USN-1008-2",
"refsource" : "UBUNTU",
"url" : "http://ubuntu.com/usn/usn-1008-2"
"name": "SUSE-SR:2010:017",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"
},
{
"name": "USN-1008-3",

View File

@ -52,30 +52,20 @@
},
"references": {
"reference_data": [
{
"name": "43068",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43068"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=43902",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=43902"
},
{
"name" : "http://googlechromereleases.blogspot.com/2010/06/stable-channel-update.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2010/06/stable-channel-update.html"
},
{
"name" : "https://bugs.webkit.org/show_bug.cgi?id=38922",
"refsource" : "CONFIRM",
"url" : "https://bugs.webkit.org/show_bug.cgi?id=38922"
},
{
"name" : "SUSE-SR:2011:002",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name" : "oval:org.mitre.oval:def:11861",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11861"
"name": "ADV-2011-0212",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0212"
},
{
"name": "40072",
@ -83,14 +73,24 @@
"url": "http://secunia.com/advisories/40072"
},
{
"name" : "43068",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43068"
"name": "SUSE-SR:2011:002",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name" : "ADV-2011-0212",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0212"
"name": "https://bugs.webkit.org/show_bug.cgi?id=38922",
"refsource": "CONFIRM",
"url": "https://bugs.webkit.org/show_bug.cgi?id=38922"
},
{
"name": "oval:org.mitre.oval:def:11861",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11861"
},
{
"name": "http://googlechromereleases.blogspot.com/2010/06/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2010/06/stable-channel-update.html"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2010/mfsa2010-59.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2010/mfsa2010-59.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=584180",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=584180"
},
{
"name": "SUSE-SA:2010:049",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html"
},
{
"name": "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox",
"refsource": "CONFIRM",
@ -72,15 +72,35 @@
"refsource": "CONFIRM",
"url": "http://support.avaya.com/css/P8/documents/100112690"
},
{
"name": "42867",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42867"
},
{
"name": "ADV-2011-0061",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0061"
},
{
"name": "http://www.mozilla.org/security/announce/2010/mfsa2010-59.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2010/mfsa2010-59.html"
},
{
"name": "MDVSA-2010:173",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:173"
},
{
"name" : "SUSE-SA:2010:049",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html"
"name": "ADV-2010-2323",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2323"
},
{
"name": "firefox-sjow-code-exec(61656)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61656"
},
{
"name": "43092",
@ -91,26 +111,6 @@
"name": "oval:org.mitre.oval:def:11492",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11492"
},
{
"name" : "42867",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42867"
},
{
"name" : "ADV-2010-2323",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/2323"
},
{
"name" : "ADV-2011-0061",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0061"
},
{
"name" : "firefox-sjow-code-exec(61656)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/61656"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2786",
"STATE": "PUBLIC"
},
@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20100728 CVE Request: Piwik < 0.6.4 Arbitrary file inclusion",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=oss-security&m=128032989120346&w=2"
},
{
"name" : "[oss-security] 20100729 Re: CVE Request: Piwik < 0.6.4 Arbitrary file inclusion",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=oss-security&m=128041221832498&w=2"
},
{
"name": "http://piwik.org/blog/2010/07/piwik-0-6-4-security-advisory/",
"refsource": "CONFIRM",
@ -73,29 +63,39 @@
"url": "http://piwik.org/changelog/"
},
{
"name" : "42031",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/42031"
"name": "[oss-security] 20100729 Re: CVE Request: Piwik < 0.6.4 Arbitrary file inclusion",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=128041221832498&w=2"
},
{
"name": "66759",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/66759"
},
{
"name" : "40703",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/40703"
},
{
"name": "ADV-2010-1971",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1971"
},
{
"name": "[oss-security] 20100728 CVE Request: Piwik < 0.6.4 Arbitrary file inclusion",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=128032989120346&w=2"
},
{
"name": "42031",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/42031"
},
{
"name": "piwik-data-renderer-file-include(60808)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60808"
},
{
"name": "40703",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40703"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2010-2864",
"STATE": "PUBLIC"
},
@ -53,25 +53,25 @@
"references": {
"reference_data": [
{
"name" : "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2864",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/513334/100/0/threaded"
"name": "1024361",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024361"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html"
},
{
"name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2864",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/513334/100/0/threaded"
},
{
"name": "oval:org.mitre.oval:def:11913",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11913"
},
{
"name" : "1024361",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1024361"
},
{
"name": "ADV-2010-2176",
"refsource": "VUPEN",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3089",
"STATE": "PUBLIC"
},
@ -52,65 +52,45 @@
},
"references": {
"reference_data": [
{
"name" : "[mailman-announce] 20100905 Mailman security patch.",
"refsource" : "MLIST",
"url" : "http://mail.python.org/pipermail/mailman-announce/2010-September/000150.html"
},
{
"name" : "[mailman-announce] 20100909 Mailman security patch.",
"refsource" : "MLIST",
"url" : "http://mail.python.org/pipermail/mailman-announce/2010-September/000151.html"
},
{
"name": "[oss-security] 20100913 CVE Request: mailman",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=128438736513097&w=2"
},
{
"name": "RHSA-2011:0307",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0307.html"
},
{
"name": "[oss-security] 20100913 Re: CVE Request: mailman",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=128441369020123&w=2"
},
{
"name" : "[oss-security] 20100913 Re: CVE Request: mailman",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=oss-security&m=128441237618793&w=2"
"name": "FEDORA-2010-14877",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052297.html"
},
{
"name" : "[oss-security] 20100913 Re: CVE Request: mailman",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=oss-security&m=128441135117819&w=2"
"name": "43294",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43294"
},
{
"name" : "[oss-security] 20100913 Re: CVE Request: mailman",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=oss-security&m=128440851513718&w=2"
"name": "SUSE-SR:2011:009",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=631859",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=631859"
"name": "ADV-2011-0460",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0460"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=631881",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=631881"
},
{
"name" : "https://launchpad.net/mailman/+milestone/2.1.14rc1",
"refsource" : "CONFIRM",
"url" : "https://launchpad.net/mailman/+milestone/2.1.14rc1"
},
{
"name" : "http://support.apple.com/kb/HT4581",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4581"
},
{
"name" : "APPLE-SA-2011-03-21-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
"name": "openSUSE-SU-2011:0424",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2011-05/msg00000.html"
},
{
"name": "DSA-2170",
@ -123,84 +103,104 @@
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052312.html"
},
{
"name" : "FEDORA-2010-14877",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052297.html"
"name": "42502",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42502"
},
{
"name" : "RHSA-2011:0307",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0307.html"
"name": "[oss-security] 20100913 Re: CVE Request: mailman",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=128441135117819&w=2"
},
{
"name" : "RHSA-2011:0308",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0308.html"
},
{
"name" : "SUSE-SR:2011:009",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
},
{
"name" : "openSUSE-SU-2011:0424",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2011-05/msg00000.html"
"name": "https://launchpad.net/mailman/+milestone/2.1.14rc1",
"refsource": "CONFIRM",
"url": "https://launchpad.net/mailman/+milestone/2.1.14rc1"
},
{
"name": "USN-1069-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1069-1"
},
{
"name": "RHSA-2011:0308",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0308.html"
},
{
"name": "APPLE-SA-2011-03-21-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
},
{
"name": "[oss-security] 20100913 Re: CVE Request: mailman",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=128440851513718&w=2"
},
{
"name": "41265",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41265"
},
{
"name" : "42502",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42502"
},
{
"name" : "43294",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43294"
},
{
"name" : "43425",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43425"
},
{
"name" : "43549",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43549"
},
{
"name" : "43580",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43580"
},
{
"name" : "ADV-2010-3271",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/3271"
},
{
"name": "ADV-2011-0436",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0436"
},
{
"name" : "ADV-2011-0460",
"name": "[mailman-announce] 20100909 Mailman security patch.",
"refsource": "MLIST",
"url": "http://mail.python.org/pipermail/mailman-announce/2010-September/000151.html"
},
{
"name": "ADV-2010-3271",
"refsource": "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0460"
"url": "http://www.vupen.com/english/advisories/2010/3271"
},
{
"name": "[oss-security] 20100913 Re: CVE Request: mailman",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=128441237618793&w=2"
},
{
"name": "43425",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43425"
},
{
"name": "ADV-2011-0542",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0542"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=631881",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=631881"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=631859",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=631859"
},
{
"name": "43580",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43580"
},
{
"name": "[mailman-announce] 20100905 Mailman security patch.",
"refsource": "MLIST",
"url": "http://mail.python.org/pipermail/mailman-announce/2010-September/000150.html"
},
{
"name": "43549",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43549"
},
{
"name": "http://support.apple.com/kb/HT4581",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4581"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2010-3798",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1024723",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024723"
},
{
"name": "http://support.apple.com/kb/HT4435",
"refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "APPLE-SA-2010-11-10-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
},
{
"name" : "1024723",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1024723"
}
]
}

View File

@ -52,30 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://bugs.mysql.com/bug.php?id=55568",
"refsource" : "MISC",
"url" : "http://bugs.mysql.com/bug.php?id=55568"
},
{
"name" : "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
"refsource" : "CONFIRM",
"url" : "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
},
{
"name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html",
"refsource": "CONFIRM",
"url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
},
{
"name": "mysql-derived-table-dos(64844)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64844"
},
{
"name": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html",
"refsource": "CONFIRM",
"url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=640808",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=640808"
"name": "USN-1397-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1397-1"
},
{
"name": "http://support.apple.com/kb/HT4723",
@ -83,29 +78,14 @@
"url": "http://support.apple.com/kb/HT4723"
},
{
"name" : "APPLE-SA-2011-06-23-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
"name": "42875",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42875"
},
{
"name" : "DSA-2143",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2011/dsa-2143"
},
{
"name" : "MDVSA-2010:222",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
},
{
"name" : "MDVSA-2010:223",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
},
{
"name" : "TLSA-2011-3",
"refsource" : "TURBO",
"url" : "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=640808",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=640808"
},
{
"name": "USN-1017-1",
@ -113,34 +93,54 @@
"url": "http://www.ubuntu.com/usn/USN-1017-1"
},
{
"name" : "USN-1397-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1397-1"
"name": "APPLE-SA-2011-06-23-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
},
{
"name" : "43676",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/43676"
},
{
"name" : "42875",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42875"
"name": "TLSA-2011-3",
"refsource": "TURBO",
"url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
},
{
"name": "ADV-2011-0105",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0105"
},
{
"name": "MDVSA-2010:222",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
},
{
"name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
"refsource": "CONFIRM",
"url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
},
{
"name": "DSA-2143",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2143"
},
{
"name": "43676",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/43676"
},
{
"name": "ADV-2011-0345",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0345"
},
{
"name" : "mysql-derived-table-dos(64844)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/64844"
"name": "http://bugs.mysql.com/bug.php?id=55568",
"refsource": "MISC",
"url": "http://bugs.mysql.com/bug.php?id=55568"
},
{
"name": "MDVSA-2010:223",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4243",
"STATE": "PUBLIC"
},
@ -52,60 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"name" : "15619",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/15619"
},
{
"name" : "[linux-kernel] 20100827 [PATCH] exec argument expansion can inappropriately trigger OOM-killer",
"refsource" : "MLIST",
"url" : "http://lkml.org/lkml/2010/8/27/429"
},
{
"name" : "[linux-kernel] 20100830 Re: [PATCH] exec argument expansion can inappropriately trigger OOM-killer",
"refsource" : "MLIST",
"url" : "http://lkml.org/lkml/2010/8/29/206"
},
{
"name" : "[linux-kernel] 20100830 Re: [PATCH] exec argument expansion can inappropriately trigger OOM-killer",
"refsource" : "MLIST",
"url" : "http://lkml.org/lkml/2010/8/30/138"
},
{
"name" : "[linux-kernel] 20100830 Re: [PATCH] exec argument expansion can inappropriately trigger OOM-killer",
"refsource" : "MLIST",
"url" : "http://lkml.org/lkml/2010/8/30/378"
},
{
"name" : "[linux-kernel] 20101130 [PATCH 1/2] exec: make argv/envp memory visible to oom-killer",
"refsource" : "MLIST",
"url" : "http://linux.derkeiler.com/Mailing-Lists/Kernel/2010-11/msg13278.html"
},
{
"name": "[oss-security] 20101122 CVE request: kernel: mm: mem allocated invisible to oom_kill() when not attached to any threads",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/11/22/6"
},
{
"name" : "[oss-security] 20101122 Re: CVE request: kernel: mm: mem allocated invisible to oom_kill() when not attached to any threads",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2010/11/22/15"
"name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"name" : "http://grsecurity.net/~spender/64bit_dos.c",
"refsource" : "MISC",
"url" : "http://grsecurity.net/~spender/64bit_dos.c"
"name": "RHSA-2011:0017",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0017.html"
},
{
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3c77f845722158206a7209c45ccddc264d19319c",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3c77f845722158206a7209c45ccddc264d19319c"
"name": "46397",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46397"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37",
@ -117,35 +82,70 @@
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=625688"
},
{
"name": "linux-kernel-execve-dos(64700)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64700"
},
{
"name": "[linux-kernel] 20100830 Re: [PATCH] exec argument expansion can inappropriately trigger OOM-killer",
"refsource": "MLIST",
"url": "http://lkml.org/lkml/2010/8/30/378"
},
{
"name": "15619",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/15619"
},
{
"name": "[linux-kernel] 20101130 [PATCH 1/2] exec: make argv/envp memory visible to oom-killer",
"refsource": "MLIST",
"url": "http://linux.derkeiler.com/Mailing-Lists/Kernel/2010-11/msg13278.html"
},
{
"name": "[oss-security] 20101122 Re: CVE request: kernel: mm: mem allocated invisible to oom_kill() when not attached to any threads",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/11/22/15"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"name" : "RHSA-2011:0017",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0017.html"
},
{
"name" : "45004",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/45004"
},
{
"name": "42884",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42884"
},
{
"name" : "46397",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/46397"
"name": "[linux-kernel] 20100827 [PATCH] exec argument expansion can inappropriately trigger OOM-killer",
"refsource": "MLIST",
"url": "http://lkml.org/lkml/2010/8/27/429"
},
{
"name" : "linux-kernel-execve-dos(64700)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/64700"
"name": "[linux-kernel] 20100830 Re: [PATCH] exec argument expansion can inappropriately trigger OOM-killer",
"refsource": "MLIST",
"url": "http://lkml.org/lkml/2010/8/30/138"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3c77f845722158206a7209c45ccddc264d19319c",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3c77f845722158206a7209c45ccddc264d19319c"
},
{
"name": "http://grsecurity.net/~spender/64bit_dos.c",
"refsource": "MISC",
"url": "http://grsecurity.net/~spender/64bit_dos.c"
},
{
"name": "[linux-kernel] 20100830 Re: [PATCH] exec argument expansion can inappropriately trigger OOM-killer",
"refsource": "MLIST",
"url": "http://lkml.org/lkml/2010/8/29/206"
},
{
"name": "45004",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45004"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "14810",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/14810"
},
{
"name": "http://packetstormsecurity.org/1008-exploits/hinnendahlgb-rfi.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/1008-exploits/hinnendahlgb-rfi.txt"
},
{
"name": "14810",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/14810"
},
{
"name": "8436",
"refsource": "SREASON",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1571",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20110329 CVE requests : Liferay 6.0.6",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/29/1"
"name": "http://issues.liferay.com/browse/LPS-14726",
"refsource": "CONFIRM",
"url": "http://issues.liferay.com/browse/LPS-14726"
},
{
"name": "[oss-security] 20110408 Re: CVE requests : Liferay 6.0.6",
@ -68,9 +68,9 @@
"url": "http://openwall.com/lists/oss-security/2011/04/11/9"
},
{
"name" : "http://issues.liferay.com/browse/LPS-14726",
"refsource" : "CONFIRM",
"url" : "http://issues.liferay.com/browse/LPS-14726"
"name": "[oss-security] 20110329 CVE requests : Liferay 6.0.6",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/29/1"
},
{
"name": "http://issues.liferay.com/secure/ReleaseNote.jspa?version=10656&styleName=Html&projectId=10952",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-3487",
"STATE": "PUBLIC"
},
@ -52,55 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "[file] 20140612 file-5.19 is now available",
"refsource" : "MLIST",
"url" : "http://mx.gw.com/pipermail/file/2014/001553.html"
},
{
"name" : "http://www.php.net/ChangeLog-5.php",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/ChangeLog-5.php"
},
{
"name" : "https://bugs.php.net/bug.php?id=67413",
"refsource" : "CONFIRM",
"url" : "https://bugs.php.net/bug.php?id=67413"
},
{
"name" : "https://github.com/file/file/commit/93e063ee374b6a75729df9e7201fb511e47e259d",
"refsource" : "CONFIRM",
"url" : "https://github.com/file/file/commit/93e063ee374b6a75729df9e7201fb511e47e259d"
},
{
"name" : "http://support.apple.com/kb/HT6443",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT6443"
},
{
"name": "https://support.apple.com/HT204659",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT204659"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
},
{
"name" : "APPLE-SA-2015-04-08-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html"
},
{
"name" : "DSA-2974",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-2974"
"name": "RHSA-2014:1766",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1766.html"
},
{
"name": "DSA-3021",
@ -113,39 +73,79 @@
"url": "http://marc.info/?l=bugtraq&m=141017844705317&w=2"
},
{
"name" : "SSRT101681",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=141017844705317&w=2"
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"name" : "RHSA-2014:1765",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1765.html"
},
{
"name" : "RHSA-2014:1766",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1766.html"
},
{
"name" : "openSUSE-SU-2014:1236",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html"
},
{
"name" : "68120",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/68120"
"name": "DSA-2974",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2974"
},
{
"name": "59794",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59794"
},
{
"name": "http://www.php.net/ChangeLog-5.php",
"refsource": "CONFIRM",
"url": "http://www.php.net/ChangeLog-5.php"
},
{
"name": "[file] 20140612 file-5.19 is now available",
"refsource": "MLIST",
"url": "http://mx.gw.com/pipermail/file/2014/001553.html"
},
{
"name": "APPLE-SA-2015-04-08-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html"
},
{
"name": "http://support.apple.com/kb/HT6443",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6443"
},
{
"name": "https://github.com/file/file/commit/93e063ee374b6a75729df9e7201fb511e47e259d",
"refsource": "CONFIRM",
"url": "https://github.com/file/file/commit/93e063ee374b6a75729df9e7201fb511e47e259d"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
},
{
"name": "RHSA-2014:1765",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1765.html"
},
{
"name": "SSRT101681",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=141017844705317&w=2"
},
{
"name": "https://bugs.php.net/bug.php?id=67413",
"refsource": "CONFIRM",
"url": "https://bugs.php.net/bug.php?id=67413"
},
{
"name": "59831",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59831"
},
{
"name": "68120",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/68120"
},
{
"name": "openSUSE-SU-2014:1236",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-3881",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7595",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
"name": "VU#717489",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/717489"
},
{
"name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name" : "VU#717489",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/717489"
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2014-7906",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://googlechromereleases.blogspot.com/2014/11/stable-channel-update_18.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2014/11/stable-channel-update_18.html"
},
{
"name" : "https://chromium.googlesource.com/chromium/src/+/3a2cf7d1376ae33054b878232fb38b8fbed29e31",
"refsource" : "CONFIRM",
"url" : "https://chromium.googlesource.com/chromium/src/+/3a2cf7d1376ae33054b878232fb38b8fbed29e31"
"name": "1031241",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031241"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=423030",
@ -72,25 +67,30 @@
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1894.html"
},
{
"name" : "71159",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/71159"
},
{
"name" : "1031241",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1031241"
},
{
"name": "60194",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60194"
},
{
"name": "https://chromium.googlesource.com/chromium/src/+/3a2cf7d1376ae33054b878232fb38b8fbed29e31",
"refsource": "CONFIRM",
"url": "https://chromium.googlesource.com/chromium/src/+/3a2cf7d1376ae33054b878232fb38b8fbed29e31"
},
{
"name": "google-chrome-cve20147906-code-exec(98794)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98794"
},
{
"name": "71159",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/71159"
},
{
"name": "http://googlechromereleases.blogspot.com/2014/11/stable-channel-update_18.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2014/11/stable-channel-update_18.html"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-8818",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://www.drupal.org/node/2344389",
"refsource" : "MISC",
"url" : "https://www.drupal.org/node/2344389"
},
{
"name": "https://www.drupal.org/node/2344423",
"refsource": "CONFIRM",
"url": "https://www.drupal.org/node/2344423"
},
{
"name": "https://www.drupal.org/node/2344389",
"refsource": "MISC",
"url": "https://www.drupal.org/node/2344389"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2014-9879",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-08-01.html"
},
{
"name" : "https://source.codeaurora.org/quic/la/kernel/msm/commit/?id=ecc8116e1befb3a764109f47ba0389434ddabbe4",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/kernel/msm/commit/?id=ecc8116e1befb3a764109f47ba0389434ddabbe4"
},
{
"name": "92219",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92219"
},
{
"name": "https://source.codeaurora.org/quic/la/kernel/msm/commit/?id=ecc8116e1befb3a764109f47ba0389434ddabbe4",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/kernel/msm/commit/?id=ecc8116e1befb3a764109f47ba0389434ddabbe4"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2014-9952",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://source.android.com/security/bulletin/2017-05-01",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2017-05-01"
},
{
"name": "98253",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/98253"
},
{
"name": "https://source.android.com/security/bulletin/2017-05-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-05-01"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2016-2245",
"STATE": "PUBLIC"
},

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-2595",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2016-2861",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21983036",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21983036"
},
{
"name": "PI60897",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI60897"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21983036",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21983036"
},
{
"name": "PI60898",
"refsource": "AIXAPAR",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-6953",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-33.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-33.html"
"name": "1036986",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036986"
},
{
"name": "93491",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/93491"
},
{
"name" : "1036986",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036986"
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-33.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-33.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160824-01-uma-en",
"refsource" : "CONFIRM",
"url" : "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160824-01-uma-en"
},
{
"name": "92617",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92617"
},
{
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160824-01-uma-en",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160824-01-uma-en"
}
]
}

View File

@ -52,40 +52,40 @@
},
"references": {
"reference_data": [
{
"name": "https://support.apple.com/HT207427",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207427"
},
{
"name": "https://support.apple.com/HT207421",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207421"
},
{
"name": "1037459",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037459"
},
{
"name": "https://support.apple.com/HT207422",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207422"
},
{
"name" : "https://support.apple.com/HT207424",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT207424"
},
{
"name" : "https://support.apple.com/HT207427",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT207427"
},
{
"name": "GLSA-201706-15",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201706-15"
},
{
"name": "https://support.apple.com/HT207424",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207424"
},
{
"name": "94909",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94909"
},
{
"name" : "1037459",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1037459"
}
]
}