"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 03:35:12 +00:00
parent a9619f6e06
commit 1771543f74
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
53 changed files with 3962 additions and 3962 deletions

View File

@ -52,20 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20061009 [ECHO_ADV_54$2006]vtiger CRM <=4.2 (calpath) Multiple Remote File Inclusion Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/448092/100/0/threaded"
},
{
"name": "http://advisories.echo.or.id/adv/adv54-theday-2006.txt",
"refsource": "MISC",
"url": "http://advisories.echo.or.id/adv/adv54-theday-2006.txt"
},
{
"name" : "2508",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/2508"
"name": "vtiger-update-file-include(29416)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29416"
},
{
"name": "20435",
@ -78,9 +73,14 @@
"url": "http://securityreason.com/securityalert/1722"
},
{
"name" : "vtiger-update-file-include(29416)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29416"
"name": "2508",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2508"
},
{
"name": "20061009 [ECHO_ADV_54$2006]vtiger CRM <=4.2 (calpath) Multiple Remote File Inclusion Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/448092/100/0/threaded"
}
]
}

View File

@ -53,14 +53,14 @@
"references": {
"reference_data": [
{
"name" : "20061023 D-Link DSL-G624T several vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/449486/100/0/threaded"
"name": "ADV-2006-4191",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4191"
},
{
"name" : "http://www.eazel.es/advisory005-D-Link-DSL-G624T-directoy-transversal-xss-cross-site-scripting-directory-listing-vulnerabilities.html",
"refsource" : "MISC",
"url" : "http://www.eazel.es/advisory005-D-Link-DSL-G624T-directoy-transversal-xss-cross-site-scripting-directory-listing-vulnerabilities.html"
"name": "1781",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1781"
},
{
"name": "20689",
@ -68,19 +68,19 @@
"url": "http://www.securityfocus.com/bid/20689"
},
{
"name" : "ADV-2006-4191",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4191"
"name": "http://www.eazel.es/advisory005-D-Link-DSL-G624T-directoy-transversal-xss-cross-site-scripting-directory-listing-vulnerabilities.html",
"refsource": "MISC",
"url": "http://www.eazel.es/advisory005-D-Link-DSL-G624T-directoy-transversal-xss-cross-site-scripting-directory-listing-vulnerabilities.html"
},
{
"name": "20061023 D-Link DSL-G624T several vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/449486/100/0/threaded"
},
{
"name": "22524",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22524"
},
{
"name" : "1781",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1781"
}
]
}

View File

@ -57,25 +57,25 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3828"
},
{
"name" : "http://alexrabe.boelinger.com/",
"refsource" : "CONFIRM",
"url" : "http://alexrabe.boelinger.com/"
},
{
"name": "23749",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23749"
},
{
"name": "ADV-2007-1616",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1616"
},
{
"name": "34359",
"refsource": "OSVDB",
"url": "http://osvdb.org/34359"
},
{
"name" : "ADV-2007-1616",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1616"
"name": "http://alexrabe.boelinger.com/",
"refsource": "CONFIRM",
"url": "http://alexrabe.boelinger.com/"
},
{
"name": "myflash-myflashbutton-file-include(34000)",

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.symantec.com/avcenter/security/Content/2007.06.05.html",
"refsource" : "CONFIRM",
"url" : "http://www.symantec.com/avcenter/security/Content/2007.06.05.html"
"name": "symantec-reporting-information-disclosure(34740)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34740"
},
{
"name": "24312",
@ -68,24 +68,24 @@
"url": "http://osvdb.org/36108"
},
{
"name" : "ADV-2007-2074",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2074"
"name": "http://www.symantec.com/avcenter/security/Content/2007.06.05.html",
"refsource": "CONFIRM",
"url": "http://www.symantec.com/avcenter/security/Content/2007.06.05.html"
},
{
"name": "1018196",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018196"
},
{
"name": "ADV-2007-2074",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2074"
},
{
"name": "25543",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25543"
},
{
"name" : "symantec-reporting-information-disclosure(34740)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34740"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "4623",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4623"
"name": "ADV-2007-3906",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3906"
},
{
"name": "26433",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/26433"
},
{
"name" : "ADV-2007-3906",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3906"
"name": "4623",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4623"
},
{
"name": "tokoinstan-index-sql-injection(38449)",

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "20071205 [ECHO_ADV_86$2007] Mambo/Joomla Component rsgallery <= 2.0 beta 5 (catid) Remote SQL Injection Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/484606/100/100/threaded"
"name": "http://advisories.echo.or.id/adv/adv86-K-159-2007.txt",
"refsource": "MISC",
"url": "http://advisories.echo.or.id/adv/adv86-K-159-2007.txt"
},
{
"name": "4691",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4691"
},
{
"name" : "http://advisories.echo.or.id/adv/adv86-K-159-2007.txt",
"refsource" : "MISC",
"url" : "http://advisories.echo.or.id/adv/adv86-K-159-2007.txt"
},
{
"name": "26704",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26704"
},
{
"name": "20071205 [ECHO_ADV_86$2007] Mambo/Joomla Component rsgallery <= 2.0 beta 5 (catid) Remote SQL Injection Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/484606/100/100/threaded"
}
]
}

View File

@ -52,40 +52,40 @@
},
"references": {
"reference_data": [
{
"name" : "20071230 Instant Softwares DatingSite SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/485655/100/0/threaded"
},
{
"name" : "http://aria-security.net/forum/showthread.php?p=1189",
"refsource" : "MISC",
"url" : "http://aria-security.net/forum/showthread.php?p=1189"
},
{
"name" : "27080",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/27080"
},
{
"name": "39766",
"refsource": "OSVDB",
"url": "http://osvdb.org/39766"
},
{
"name" : "28283",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28283"
"name": "20071230 Instant Softwares DatingSite SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/485655/100/0/threaded"
},
{
"name": "3518",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3518"
},
{
"name": "http://aria-security.net/forum/showthread.php?p=1189",
"refsource": "MISC",
"url": "http://aria-security.net/forum/showthread.php?p=1189"
},
{
"name": "dating-site-loginform-sql-injection(39326)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39326"
},
{
"name": "27080",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27080"
},
{
"name": "28283",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28283"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2010-0044",
"STATE": "PUBLIC"
},
@ -52,26 +52,26 @@
},
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT4070",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4070"
},
{
"name": "APPLE-SA-2010-03-11-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010/Mar/msg00000.html"
},
{
"name" : "38671",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/38671"
},
{
"name": "38675",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/38675"
},
{
"name": "safari-pubsub-security-bypass(56830)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56830"
},
{
"name": "http://support.apple.com/kb/HT4070",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4070"
},
{
"name": "62937",
"refsource": "OSVDB",
@ -83,9 +83,9 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7051"
},
{
"name" : "safari-pubsub-security-bypass(56830)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/56830"
"name": "38671",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/38671"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.xerox.com/downloads/usa/en/c/cert_XRX10-001_v1.0.pdf",
"refsource" : "CONFIRM",
"url" : "http://www.xerox.com/downloads/usa/en/c/cert_XRX10-001_v1.0.pdf"
},
{
"name": "1023500",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1023500"
},
{
"name": "http://www.xerox.com/downloads/usa/en/c/cert_XRX10-001_v1.0.pdf",
"refsource": "CONFIRM",
"url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX10-001_v1.0.pdf"
},
{
"name": "38339",
"refsource": "SECUNIA",

View File

@ -53,25 +53,25 @@
"references": {
"reference_data": [
{
"name" : "http://zeroscience.mk/codes/wamp_xss.txt",
"refsource" : "MISC",
"url" : "http://zeroscience.mk/codes/wamp_xss.txt"
"name": "62481",
"refsource": "OSVDB",
"url": "http://osvdb.org/62481"
},
{
"name": "http://zeroscience.mk/en/vulnerabilities/ZSL-2010-4926.php",
"refsource": "MISC",
"url": "http://zeroscience.mk/en/vulnerabilities/ZSL-2010-4926.php"
},
{
"name": "http://zeroscience.mk/codes/wamp_xss.txt",
"refsource": "MISC",
"url": "http://zeroscience.mk/codes/wamp_xss.txt"
},
{
"name": "38357",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/38357"
},
{
"name" : "62481",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/62481"
},
{
"name": "38706",
"refsource": "SECUNIA",

View File

@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "11549",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/11549"
},
{
"name" : "http://www.packetstormsecurity.com/1002-exploits/joomlasqlreport-sql.txt",
"refsource" : "MISC",
"url" : "http://www.packetstormsecurity.com/1002-exploits/joomlasqlreport-sql.txt"
"name": "sqlreport-userid-sql-injection(56476)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56476"
},
{
"name": "38361",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/38361"
},
{
"name" : "62534",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/62534"
},
{
"name": "38678",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38678"
},
{
"name" : "sqlreport-userid-sql-injection(56476)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/56476"
"name": "62534",
"refsource": "OSVDB",
"url": "http://osvdb.org/62534"
},
{
"name": "http://www.packetstormsecurity.com/1002-exploits/joomlasqlreport-sql.txt",
"refsource": "MISC",
"url": "http://www.packetstormsecurity.com/1002-exploits/joomlasqlreport-sql.txt"
},
{
"name": "11549",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/11549"
},
{
"name": "sql-reports-print-sql-injection(56541)",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@ubuntu.com",
"ID": "CVE-2010-0831",
"STATE": "PUBLIC"
},
@ -58,19 +58,9 @@
"url": "http://marc.info/?l=oss-security&m=127602731712034&w=2"
},
{
"name" : "[oss-security] 20100608 Re: jar, fastjar directory traversal vulnerabilities",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=oss-security&m=127603032617644&w=2"
},
{
"name" : "[oss-security] 20100608 jar, fastjar directory traversal vulnerabilities",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=oss-security&m=127602564508766&w=2"
},
{
"name" : "http://packages.debian.org/changelogs/pool/main/f/fastjar/fastjar_0.98-3/changelog",
"refsource" : "CONFIRM",
"url" : "http://packages.debian.org/changelogs/pool/main/f/fastjar/fastjar_0.98-3/changelog"
"name": "GLSA-201209-21",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201209-21.xml"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=594497",
@ -78,24 +68,9 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=594497"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=601823",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=601823"
},
{
"name" : "https://launchpad.net/bugs/540575",
"refsource" : "CONFIRM",
"url" : "https://launchpad.net/bugs/540575"
},
{
"name" : "GLSA-201209-21",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201209-21.xml"
},
{
"name" : "MDVSA-2010:122",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:122"
"name": "[oss-security] 20100608 jar, fastjar directory traversal vulnerabilities",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127602564508766&w=2"
},
{
"name": "RHSA-2011:0025",
@ -103,14 +78,34 @@
"url": "http://www.redhat.com/support/errata/RHSA-2011-0025.html"
},
{
"name" : "41006",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/41006"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=601823",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=601823"
},
{
"name" : "65467",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/65467"
"name": "MDVSA-2010:122",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:122"
},
{
"name": "ADV-2010-1553",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1553"
},
{
"name": "ADV-2011-0121",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0121"
},
{
"name": "http://packages.debian.org/changelogs/pool/main/f/fastjar/fastjar_0.98-3/changelog",
"refsource": "CONFIRM",
"url": "http://packages.debian.org/changelogs/pool/main/f/fastjar/fastjar_0.98-3/changelog"
},
{
"name": "[oss-security] 20100608 Re: jar, fastjar directory traversal vulnerabilities",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127603032617644&w=2"
},
{
"name": "42892",
@ -123,14 +118,19 @@
"url": "http://secunia.com/advisories/50786"
},
{
"name" : "ADV-2010-1553",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1553"
"name": "https://launchpad.net/bugs/540575",
"refsource": "CONFIRM",
"url": "https://launchpad.net/bugs/540575"
},
{
"name" : "ADV-2011-0121",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0121"
"name": "65467",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/65467"
},
{
"name": "41006",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/41006"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2010-1552",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20100511 ZDI-10-083: HP OpenView NNM snmpviewer.exe CGI Multiple Variable Remote Code Execution Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/511248/100/0/threaded"
},
{
"name" : "http://zerodayinitiative.com/advisories/ZDI-10-083/",
"refsource" : "MISC",
"url" : "http://zerodayinitiative.com/advisories/ZDI-10-083/"
"name": "SSRT010098",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=127360750704351&w=2"
},
{
"name": "HPSBMA02527",
@ -68,9 +63,14 @@
"url": "http://marc.info/?l=bugtraq&m=127360750704351&w=2"
},
{
"name" : "SSRT010098",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=127360750704351&w=2"
"name": "8157",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8157"
},
{
"name": "20100511 ZDI-10-083: HP OpenView NNM snmpviewer.exe CGI Multiple Variable Remote Code Execution Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/511248/100/0/threaded"
},
{
"name": "SSRT090227",
@ -78,9 +78,9 @@
"url": "http://marc.info/?l=bugtraq&m=127360750704351&w=2"
},
{
"name" : "8157",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/8157"
"name": "http://zerodayinitiative.com/advisories/ZDI-10-083/",
"refsource": "MISC",
"url": "http://zerodayinitiative.com/advisories/ZDI-10-083/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security-info@sgi.com",
"ID": "CVE-2010-1693",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[ewg] 20101021 [PATCH] security fix in openibd script",
"refsource" : "MLIST",
"url" : "http://lists.openfabrics.org/pipermail/ewg/2010-October/015886.html"
},
{
"name": "[oss-security] 20101022 CVE-2010-1693: OFED openibd startup script uses predictable tmpfile",
"refsource": "MLIST",
@ -68,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/44332"
},
{
"name" : "68856",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/68856"
"name": "ofed-openibd-symlink(62753)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62753"
},
{
"name": "41937",
@ -78,9 +73,14 @@
"url": "http://secunia.com/advisories/41937"
},
{
"name" : "ofed-openibd-symlink(62753)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/62753"
"name": "68856",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/68856"
},
{
"name": "[ewg] 20101021 [PATCH] security fix in openibd script",
"refsource": "MLIST",
"url": "http://lists.openfabrics.org/pipermail/ewg/2010-October/015886.html"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "socialnetworking-user-sql-injection(58583)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58583"
},
{
"name": "http://packetstormsecurity.org/1005-exploits/web20snfcs-sql.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/1005-exploits/web20snfcs-sql.txt"
},
{
"name" : "64513",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/64513"
},
{
"name": "39761",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39761"
},
{
"name" : "socialnetworking-user-sql-injection(58583)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/58583"
"name": "64513",
"refsource": "OSVDB",
"url": "http://osvdb.org/64513"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "ADV-2010-3193",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3193"
},
{
"name": "http://www-10.lotus.com/ldd/dominowiki.nsf/dx/Lotus_Notes_Traveler_851_FP3_Release_Notes",
"refsource": "CONFIRM",
@ -62,11 +67,6 @@
"refsource": "AIXAPAR",
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1LO52324"
},
{
"name" : "ADV-2010-3193",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/3193"
},
{
"name": "lotus-notes-traveler-servlet-xss(63977)",
"refsource": "XF",

View File

@ -52,60 +52,60 @@
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20101220 CVE request: kernel: CAN information leak, 2nd attempt",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/20/2"
},
{
"name": "[netdev] 20101102 Re: [SECURITY] CAN info leak/minor heap overflow",
"refsource": "MLIST",
"url": "http://www.spinics.net/lists/netdev/msg145796.html"
},
{
"name" : "[netdev] 20101102 [SECURITY] CAN info leak/minor heap overflow",
"refsource" : "MLIST",
"url" : "http://www.spinics.net/lists/netdev/msg145791.html"
},
{
"name": "[netdev] 20101109 Re: [PATCH] Fix CAN info leak/minor heap overflow",
"refsource": "MLIST",
"url": "http://www.spinics.net/lists/netdev/msg146270.html"
},
{
"name" : "[netdev] 20101110 Re: [PATCH] Fix CAN info leak/minor heap overflow",
"name": "[oss-security] 20101220 Re: CVE request: kernel: CAN information leak, 2nd attempt",
"refsource": "MLIST",
"url" : "http://www.spinics.net/lists/netdev/msg146468.html"
},
{
"name" : "[oss-security] 20101103 CVE request: kernel: CAN information leak",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2010/11/03/3"
"url": "http://openwall.com/lists/oss-security/2010/12/21/1"
},
{
"name": "[oss-security] 20101104 Re: CVE request: kernel: CAN information leak",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/11/04/4"
},
{
"name" : "[oss-security] 20101220 CVE request: kernel: CAN information leak, 2nd attempt",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2010/12/20/2"
},
{
"name" : "[oss-security] 20101220 Re: CVE request: kernel: CAN information leak, 2nd attempt",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2010/12/21/1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=664544",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=664544"
},
{
"name": "[netdev] 20101110 Re: [PATCH] Fix CAN info leak/minor heap overflow",
"refsource": "MLIST",
"url": "http://www.spinics.net/lists/netdev/msg146468.html"
},
{
"name": "[netdev] 20101102 [SECURITY] CAN info leak/minor heap overflow",
"refsource": "MLIST",
"url": "http://www.spinics.net/lists/netdev/msg145791.html"
},
{
"name": "44661",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/44661"
},
{
"name": "MDVSA-2011:029",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"
},
{
"name" : "44661",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/44661"
"name": "[oss-security] 20101103 CVE request: kernel: CAN information leak",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/11/03/3"
}
]
}

View File

@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "http://xenuser.org/documents/security/joomla_com_bfquiz_sqli.txt",
"refsource": "MISC",
"url": "http://xenuser.org/documents/security/joomla_com_bfquiz_sqli.txt"
},
{
"name": "39960",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39960"
},
{
"name": "bfquiz-index-sql-injection(58979)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58979"
},
{
"name": "http://packetstormsecurity.org/1005-exploits/joomla_com_bfquiz_sploit.py.txt",
"refsource": "MISC",
@ -62,40 +77,25 @@
"refsource": "MISC",
"url": "http://www.packetstormsecurity.org/1005-exploits/joomlabfquiz-sql.txt"
},
{
"name" : "http://xenuser.org/documents/security/joomla_com_bfquiz_sqli.txt",
"refsource" : "MISC",
"url" : "http://xenuser.org/documents/security/joomla_com_bfquiz_sqli.txt"
},
{
"name": "http://www.tamlyncreative.com.au/software/forum/index.php?topic=729.0",
"refsource": "CONFIRM",
"url": "http://www.tamlyncreative.com.au/software/forum/index.php?topic=729.0"
},
{
"name" : "40435",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/40435"
},
{
"name" : "65001",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/65001"
},
{
"name" : "39960",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/39960"
},
{
"name": "ADV-2010-1272",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1272"
},
{
"name" : "bfquiz-index-sql-injection(58979)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/58979"
"name": "65001",
"refsource": "OSVDB",
"url": "http://osvdb.org/65001"
},
{
"name": "40435",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/40435"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "http://apps.gehealthcare.com/servlet/ClientServlet/MR360+operator+manual+paper.pdf?REQ=RAA&DIRECTION=5339461-1EN&FILENAME=MR360%2Boperator%2Bmanual%2Bpaper.pdf&FILEREV=4&DOCREV_ORG=4",
"refsource": "CONFIRM",
"url": "http://apps.gehealthcare.com/servlet/ClientServlet/MR360+operator+manual+paper.pdf?REQ=RAA&DIRECTION=5339461-1EN&FILENAME=MR360%2Boperator%2Bmanual%2Bpaper.pdf&FILEREV=4&DOCREV_ORG=4"
},
{
"name": "http://www.forbes.com/sites/thomasbrewster/2015/07/10/vulnerable-breasts/",
"refsource": "MISC",
@ -66,11 +71,6 @@
"name": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02"
},
{
"name" : "http://apps.gehealthcare.com/servlet/ClientServlet/MR360+operator+manual+paper.pdf?REQ=RAA&DIRECTION=5339461-1EN&FILENAME=MR360%2Boperator%2Bmanual%2Bpaper.pdf&FILEREV=4&DOCREV_ORG=4",
"refsource" : "CONFIRM",
"url" : "http://apps.gehealthcare.com/servlet/ClientServlet/MR360+operator+manual+paper.pdf?REQ=RAA&DIRECTION=5339461-1EN&FILENAME=MR360%2Boperator%2Bmanual%2Bpaper.pdf&FILEREV=4&DOCREV_ORG=4"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@suse.de",
"ASSIGNER": "security@suse.com",
"DATE_PUBLIC": "2014-03-26T00:00:00.000Z",
"ID": "CVE-2014-0594",
"STATE": "PUBLIC",
@ -71,15 +71,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://bugzilla.suse.com/show_bug.cgi?id=870606",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.suse.com/show_bug.cgi?id=870606"
},
{
"name": "https://github.com/openSUSE/open-build-service/commit/2188c059b67b82171d0e28ef59f77e62d22a09d8",
"refsource": "CONFIRM",
"url": "https://github.com/openSUSE/open-build-service/commit/2188c059b67b82171d0e28ef59f77e62d22a09d8"
},
{
"name": "https://bugzilla.suse.com/show_bug.cgi?id=870606",
"refsource": "CONFIRM",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=870606"
}
]
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-0863",
"STATE": "PUBLIC"
},
@ -62,15 +62,15 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/69594"
},
{
"name" : "1030805",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030805"
},
{
"name": "ibm-cognos-cve20140863-info-disc(90937)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90937"
},
{
"name": "1030805",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030805"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-1137",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2014-1522",
"STATE": "PUBLIC"
},
@ -57,26 +57,6 @@
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2014/mfsa2014-36.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=995289",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=995289"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name" : "FEDORA-2014-5829",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132437.html"
},
{
"name" : "GLSA-201504-01",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201504-01"
},
{
"name": "openSUSE-SU-2014:0599",
"refsource": "SUSE",
@ -87,25 +67,45 @@
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-05/msg00033.html"
},
{
"name": "GLSA-201504-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201504-01"
},
{
"name": "59866",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59866"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=995289",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=995289"
},
{
"name": "USN-2185-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2185-1"
},
{
"name" : "1030163",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030163"
},
{
"name": "1030164",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030164"
},
{
"name" : "59866",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59866"
"name": "1030163",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030163"
},
{
"name": "FEDORA-2014-5829",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132437.html"
}
]
}

View File

@ -58,9 +58,9 @@
"url": "http://www.securityfocus.com/archive/1/530871/100/0/threaded"
},
{
"name" : "http://packetstormsecurity.com/files/124931/Mediatrix-4402-Cross-Site-Scripting.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/124931/Mediatrix-4402-Cross-Site-Scripting.html"
"name": "mediatrixwebmanagement-cve20141612-xss(90656)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90656"
},
{
"name": "VU#252294",
@ -68,24 +68,24 @@
"url": "http://www.kb.cert.org/vuls/id/252294"
},
{
"name" : "65108",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/65108"
"name": "http://packetstormsecurity.com/files/124931/Mediatrix-4402-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/124931/Mediatrix-4402-Cross-Site-Scripting.html"
},
{
"name": "102415",
"refsource": "OSVDB",
"url": "http://osvdb.org/102415"
},
{
"name": "65108",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/65108"
},
{
"name": "56638",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56638"
},
{
"name" : "mediatrixwebmanagement-cve20141612-xss(90656)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/90656"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2014-1749",
"STATE": "PUBLIC"
},
@ -52,21 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=374649",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=374649"
},
{
"name": "DSA-2939",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2939"
},
{
"name": "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html"
},
{
"name": "GLSA-201408-16",
"refsource": "GENTOO",
@ -78,9 +73,9 @@
"url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html"
},
{
"name" : "1030270",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030270"
"name": "59155",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59155"
},
{
"name": "58920",
@ -88,9 +83,14 @@
"url": "http://secunia.com/advisories/58920"
},
{
"name" : "59155",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59155"
"name": "https://code.google.com/p/chromium/issues/detail?id=374649",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=374649"
},
{
"name": "1030270",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030270"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://packetstormsecurity.com/files/127287/WordPress-Construction-Mode-1.8-Cross-Site-Scripting.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/127287/WordPress-Construction-Mode-1.8-Cross-Site-Scripting.html"
},
{
"name": "68287",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/68287"
},
{
"name": "http://packetstormsecurity.com/files/127287/WordPress-Construction-Mode-1.8-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/127287/WordPress-Construction-Mode-1.8-Cross-Site-Scripting.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-4906",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
"name": "VU#825289",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/825289"
},
{
"name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name" : "VU#825289",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/825289"
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5600",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#334425",
"refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5725",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#535417",
"refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5850",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#854241",
"refsource": "CERT-VN",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@suse.com",
"ID": "CVE-2016-3137",
"STATE": "PUBLIC"
},
@ -53,109 +53,49 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20160314 Re: CVE request -- linux kernel: crash on invalid USB device descriptors (cypress_m8 driver)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/03/14/3"
},
{
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1316996",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1316996"
},
{
"name" : "https://github.com/torvalds/linux/commit/c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754"
},
{
"name" : "DSA-3607",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3607"
},
{
"name" : "SUSE-SU-2016:1672",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html"
"name": "USN-2971-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2971-2"
},
{
"name": "SUSE-SU-2016:1690",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html"
},
{
"name": "[oss-security] 20160314 Re: CVE request -- linux kernel: crash on invalid USB device descriptors (cypress_m8 driver)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/03/14/3"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1316996",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1316996"
},
{
"name": "SUSE-SU-2016:1696",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html"
},
{
"name" : "SUSE-SU-2016:1707",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html"
},
{
"name" : "SUSE-SU-2016:1764",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html"
},
{
"name" : "SUSE-SU-2016:2074",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html"
},
{
"name" : "openSUSE-SU-2016:1382",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html"
},
{
"name" : "USN-2996-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2996-1"
},
{
"name" : "USN-2997-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2997-1"
},
{
"name" : "USN-3000-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3000-1"
},
{
"name" : "USN-2968-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2968-1"
},
{
"name" : "USN-2968-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2968-2"
},
{
"name": "USN-2970-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2970-1"
},
{
"name" : "USN-2971-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2971-1"
"name": "https://github.com/torvalds/linux/commit/c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754"
},
{
"name" : "USN-2971-2",
"name": "84300",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/84300"
},
{
"name": "USN-2968-1",
"refsource": "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2971-2"
"url": "http://www.ubuntu.com/usn/USN-2968-1"
},
{
"name": "USN-2971-3",
@ -163,9 +103,69 @@
"url": "http://www.ubuntu.com/usn/USN-2971-3"
},
{
"name" : "84300",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/84300"
"name": "USN-2997-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2997-1"
},
{
"name": "SUSE-SU-2016:1764",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html"
},
{
"name": "USN-3000-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3000-1"
},
{
"name": "DSA-3607",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3607"
},
{
"name": "USN-2971-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2971-1"
},
{
"name": "SUSE-SU-2016:1707",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html"
},
{
"name": "USN-2996-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2996-1"
},
{
"name": "SUSE-SU-2016:1672",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html"
},
{
"name": "USN-2968-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2968-2"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754"
},
{
"name": "openSUSE-SU-2016:1382",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html"
},
{
"name": "SUSE-SU-2016:2074",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2016-3911",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-10-01.html"
},
{
"name" : "https://android.googlesource.com/platform/frameworks/base/+/2c7008421cb67f5d89f16911bdbe36f6c35311ad",
"refsource" : "CONFIRM",
"url" : "https://android.googlesource.com/platform/frameworks/base/+/2c7008421cb67f5d89f16911bdbe36f6c35311ad"
},
{
"name": "93303",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93303"
},
{
"name": "https://android.googlesource.com/platform/frameworks/base/+/2c7008421cb67f5d89f16911bdbe36f6c35311ad",
"refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/frameworks/base/+/2c7008421cb67f5d89f16911bdbe36f6c35311ad"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/8.7.0"
},
{
"name" : "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories",
"refsource" : "CONFIRM",
"url" : "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories"
},
{
"name": "95921",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95921"
},
{
"name": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories",
"refsource": "CONFIRM",
"url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@debian.org",
"ID": "CVE-2016-7513",
"STATE": "PUBLIC"
},
@ -52,11 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "93121",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93121"
},
{
"name": "[oss-security] 20160922 Re: CVE Requests: Various ImageMagick issues (as reported in the Debian BTS)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/09/22/2"
},
{
"name": "https://github.com/ImageMagick/ImageMagick/commit/a54fe0e8600eaf3dc6fe717d3c0398001507f723",
"refsource": "CONFIRM",
"url": "https://github.com/ImageMagick/ImageMagick/commit/a54fe0e8600eaf3dc6fe717d3c0398001507f723"
},
{
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832455",
"refsource": "CONFIRM",
@ -66,16 +76,6 @@
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1378733",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378733"
},
{
"name" : "https://github.com/ImageMagick/ImageMagick/commit/a54fe0e8600eaf3dc6fe717d3c0398001507f723",
"refsource" : "CONFIRM",
"url" : "https://github.com/ImageMagick/ImageMagick/commit/a54fe0e8600eaf3dc6fe717d3c0398001507f723"
},
{
"name" : "93121",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/93121"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@suse.com",
"ID": "CVE-2016-7943",
"STATE": "PUBLIC"
},
@ -52,6 +52,31 @@
},
"references": {
"reference_data": [
{
"name": "1036945",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036945"
},
{
"name": "USN-3758-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3758-2/"
},
{
"name": "https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8c29f1607a31dac0911e45a0dd3d74173822b3c9",
"refsource": "CONFIRM",
"url": "https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8c29f1607a31dac0911e45a0dd3d74173822b3c9"
},
{
"name": "GLSA-201704-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201704-03"
},
{
"name": "[xorg-announce] 20161004 X.Org security advisory: Protocol handling issues in X Window System client libraries",
"refsource": "MLIST",
"url": "https://lists.x.org/archives/xorg-announce/2016-October/002720.html"
},
{
"name": "[oss-security] 20161004 Re: X.Org security advisory: Protocol handling issues in X Window System client libraries",
"refsource": "MLIST",
@ -63,29 +88,9 @@
"url": "http://www.openwall.com/lists/oss-security/2016/10/04/2"
},
{
"name" : "[xorg-announce] 20161004 X.Org security advisory: Protocol handling issues in X Window System client libraries",
"refsource" : "MLIST",
"url" : "https://lists.x.org/archives/xorg-announce/2016-October/002720.html"
},
{
"name" : "https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8c29f1607a31dac0911e45a0dd3d74173822b3c9",
"refsource" : "CONFIRM",
"url" : "https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8c29f1607a31dac0911e45a0dd3d74173822b3c9"
},
{
"name" : "FEDORA-2016-0df69ab477",
"refsource" : "FEDORA",
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/"
},
{
"name" : "GLSA-201704-03",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201704-03"
},
{
"name" : "USN-3758-2",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3758-2/"
"name": "93362",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93362"
},
{
"name": "USN-3758-1",
@ -93,14 +98,9 @@
"url": "https://usn.ubuntu.com/3758-1/"
},
{
"name" : "93362",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/93362"
},
{
"name" : "1036945",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036945"
"name": "FEDORA-2016-0df69ab477",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "94938",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94938"
},
{
"name": "42700",
"refsource": "EXPLOIT-DB",
@ -61,11 +66,6 @@
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-350-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-350-01"
},
{
"name" : "94938",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/94938"
}
]
}

View File

@ -52,45 +52,45 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20161122 CVE-2016-8630 kernel: kvm: x86: NULL pointer dereference duringinstruction decode",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/11/22/3"
},
{
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d9092f52d7e61dd1557f2db2400ddb430e85937e",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d9092f52d7e61dd1557f2db2400ddb430e85937e"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.7",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.7"
},
{
"name": "94459",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94459"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1393350",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393350"
},
{
"name" : "https://github.com/torvalds/linux/commit/d9092f52d7e61dd1557f2db2400ddb430e85937e",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/d9092f52d7e61dd1557f2db2400ddb430e85937e"
},
{
"name" : "RHSA-2017:0386",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0386.html"
},
{
"name": "RHSA-2017:0387",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0387.html"
},
{
"name" : "94459",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/94459"
"name": "https://github.com/torvalds/linux/commit/d9092f52d7e61dd1557f2db2400ddb430e85937e",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/d9092f52d7e61dd1557f2db2400ddb430e85937e"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d9092f52d7e61dd1557f2db2400ddb430e85937e",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d9092f52d7e61dd1557f2db2400ddb430e85937e"
},
{
"name": "[oss-security] 20161122 CVE-2016-8630 kernel: kvm: x86: NULL pointer dereference duringinstruction decode",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/11/22/3"
},
{
"name": "RHSA-2017:0386",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0386.html"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20160818 potrace: multiple crashes",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/08/18/11"
"name": "93778",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93778"
},
{
"name": "[oss-security] 20161015 Re: potrace: multiple crashes",
@ -67,15 +67,15 @@
"refsource": "MISC",
"url": "https://blogs.gentoo.org/ago/2016/08/08/potrace-multiple-three-null-pointer-dereference-in-bm_readbody_bmp-bitmap_io-c/"
},
{
"name": "[oss-security] 20160818 potrace: multiple crashes",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/08/18/11"
},
{
"name": "http://potrace.sourceforge.net/ChangeLog",
"refsource": "CONFIRM",
"url": "http://potrace.sourceforge.net/ChangeLog"
},
{
"name" : "93778",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/93778"
}
]
}

View File

@ -54,34 +54,9 @@
"references": {
"reference_data": [
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1400644",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1400644"
},
{
"name" : "RHSA-2017:1253",
"name": "RHSA-2017:1411",
"refsource": "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1253"
},
{
"name" : "RHSA-2017:1254",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1254"
},
{
"name" : "RHSA-2017:1255",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2017-1255.html"
},
{
"name" : "RHSA-2017:1256",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1256"
},
{
"name" : "RHSA-2017:1260",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1260"
"url": "https://access.redhat.com/errata/RHSA-2017:1411"
},
{
"name": "RHSA-2017:1409",
@ -89,19 +64,14 @@
"url": "http://rhn.redhat.com/errata/RHSA-2017-1409.html"
},
{
"name" : "RHSA-2017:1410",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1410"
"name": "94940",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94940"
},
{
"name" : "RHSA-2017:1411",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1411"
},
{
"name" : "RHSA-2017:1412",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1412"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1400644",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400644"
},
{
"name": "RHSA-2017:1675",
@ -109,29 +79,59 @@
"url": "https://access.redhat.com/errata/RHSA-2017:1675"
},
{
"name" : "RHSA-2017:1676",
"name": "1038524",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038524"
},
{
"name": "RHSA-2017:1254",
"refsource": "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1676"
"url": "https://access.redhat.com/errata/RHSA-2017:1254"
},
{
"name": "RHSA-2017:1410",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1410"
},
{
"name": "RHSA-2017:1255",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-1255.html"
},
{
"name": "RHSA-2017:1412",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1412"
},
{
"name": "RHSA-2018:2909",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2909"
},
{
"name": "RHSA-2017:1256",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1256"
},
{
"name": "RHSA-2017:1253",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1253"
},
{
"name": "RHSA-2017:1260",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1260"
},
{
"name": "RHSA-2017:1676",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1676"
},
{
"name": "RHSA-2018:2913",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2913"
},
{
"name" : "94940",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/94940"
},
{
"name" : "1038524",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038524"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-9607",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -75,11 +75,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1312272",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1312272"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2016-94/",
"refsource": "CONFIRM",
@ -90,31 +85,6 @@
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2016-95/"
},
{
"name" : "https://www.mozilla.org/security/advisories/mfsa2016-96/",
"refsource" : "CONFIRM",
"url" : "https://www.mozilla.org/security/advisories/mfsa2016-96/"
},
{
"name" : "DSA-3757",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2017/dsa-3757"
},
{
"name" : "GLSA-201701-15",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201701-15"
},
{
"name" : "RHSA-2016:2946",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2946.html"
},
{
"name" : "RHSA-2016:2973",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2973.html"
},
{
"name": "94885",
"refsource": "BID",
@ -124,6 +94,36 @@
"name": "1037461",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037461"
},
{
"name": "GLSA-201701-15",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-15"
},
{
"name": "DSA-3757",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-3757"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1312272",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1312272"
},
{
"name": "RHSA-2016:2973",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2973.html"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2016-96/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2016-96/"
},
{
"name": "RHSA-2016:2946",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2946.html"
}
]
}