mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
a9619f6e06
commit
1771543f74
@ -52,20 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20061009 [ECHO_ADV_54$2006]vtiger CRM <=4.2 (calpath) Multiple Remote File Inclusion Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/448092/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://advisories.echo.or.id/adv/adv54-theday-2006.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://advisories.echo.or.id/adv/adv54-theday-2006.txt"
|
||||
},
|
||||
{
|
||||
"name" : "2508",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/2508"
|
||||
"name": "vtiger-update-file-include(29416)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29416"
|
||||
},
|
||||
{
|
||||
"name": "20435",
|
||||
@ -78,9 +73,14 @@
|
||||
"url": "http://securityreason.com/securityalert/1722"
|
||||
},
|
||||
{
|
||||
"name" : "vtiger-update-file-include(29416)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29416"
|
||||
"name": "2508",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/2508"
|
||||
},
|
||||
{
|
||||
"name": "20061009 [ECHO_ADV_54$2006]vtiger CRM <=4.2 (calpath) Multiple Remote File Inclusion Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/448092/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20061023 D-Link DSL-G624T several vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/449486/100/0/threaded"
|
||||
"name": "ADV-2006-4191",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/4191"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.eazel.es/advisory005-D-Link-DSL-G624T-directoy-transversal-xss-cross-site-scripting-directory-listing-vulnerabilities.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.eazel.es/advisory005-D-Link-DSL-G624T-directoy-transversal-xss-cross-site-scripting-directory-listing-vulnerabilities.html"
|
||||
"name": "1781",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1781"
|
||||
},
|
||||
{
|
||||
"name": "20689",
|
||||
@ -68,19 +68,19 @@
|
||||
"url": "http://www.securityfocus.com/bid/20689"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-4191",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/4191"
|
||||
"name": "http://www.eazel.es/advisory005-D-Link-DSL-G624T-directoy-transversal-xss-cross-site-scripting-directory-listing-vulnerabilities.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.eazel.es/advisory005-D-Link-DSL-G624T-directoy-transversal-xss-cross-site-scripting-directory-listing-vulnerabilities.html"
|
||||
},
|
||||
{
|
||||
"name": "20061023 D-Link DSL-G624T several vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/449486/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "22524",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22524"
|
||||
},
|
||||
{
|
||||
"name" : "1781",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/1781"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,25 +57,25 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/3828"
|
||||
},
|
||||
{
|
||||
"name" : "http://alexrabe.boelinger.com/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://alexrabe.boelinger.com/"
|
||||
},
|
||||
{
|
||||
"name": "23749",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/23749"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-1616",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1616"
|
||||
},
|
||||
{
|
||||
"name": "34359",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/34359"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-1616",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/1616"
|
||||
"name": "http://alexrabe.boelinger.com/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://alexrabe.boelinger.com/"
|
||||
},
|
||||
{
|
||||
"name": "myflash-myflashbutton-file-include(34000)",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.symantec.com/avcenter/security/Content/2007.06.05.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.symantec.com/avcenter/security/Content/2007.06.05.html"
|
||||
"name": "symantec-reporting-information-disclosure(34740)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34740"
|
||||
},
|
||||
{
|
||||
"name": "24312",
|
||||
@ -68,24 +68,24 @@
|
||||
"url": "http://osvdb.org/36108"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-2074",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/2074"
|
||||
"name": "http://www.symantec.com/avcenter/security/Content/2007.06.05.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.symantec.com/avcenter/security/Content/2007.06.05.html"
|
||||
},
|
||||
{
|
||||
"name": "1018196",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1018196"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-2074",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2074"
|
||||
},
|
||||
{
|
||||
"name": "25543",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25543"
|
||||
},
|
||||
{
|
||||
"name" : "symantec-reporting-information-disclosure(34740)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34740"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "4623",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/4623"
|
||||
"name": "ADV-2007-3906",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3906"
|
||||
},
|
||||
{
|
||||
"name": "26433",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/26433"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-3906",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/3906"
|
||||
"name": "4623",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/4623"
|
||||
},
|
||||
{
|
||||
"name": "tokoinstan-index-sql-injection(38449)",
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20071205 [ECHO_ADV_86$2007] Mambo/Joomla Component rsgallery <= 2.0 beta 5 (catid) Remote SQL Injection Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/484606/100/100/threaded"
|
||||
"name": "http://advisories.echo.or.id/adv/adv86-K-159-2007.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://advisories.echo.or.id/adv/adv86-K-159-2007.txt"
|
||||
},
|
||||
{
|
||||
"name": "4691",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/4691"
|
||||
},
|
||||
{
|
||||
"name" : "http://advisories.echo.or.id/adv/adv86-K-159-2007.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://advisories.echo.or.id/adv/adv86-K-159-2007.txt"
|
||||
},
|
||||
{
|
||||
"name": "26704",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26704"
|
||||
},
|
||||
{
|
||||
"name": "20071205 [ECHO_ADV_86$2007] Mambo/Joomla Component rsgallery <= 2.0 beta 5 (catid) Remote SQL Injection Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/484606/100/100/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,40 +52,40 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20071230 Instant Softwares DatingSite SQL Injection",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/485655/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://aria-security.net/forum/showthread.php?p=1189",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://aria-security.net/forum/showthread.php?p=1189"
|
||||
},
|
||||
{
|
||||
"name" : "27080",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/27080"
|
||||
},
|
||||
{
|
||||
"name": "39766",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/39766"
|
||||
},
|
||||
{
|
||||
"name" : "28283",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28283"
|
||||
"name": "20071230 Instant Softwares DatingSite SQL Injection",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/485655/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "3518",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3518"
|
||||
},
|
||||
{
|
||||
"name": "http://aria-security.net/forum/showthread.php?p=1189",
|
||||
"refsource": "MISC",
|
||||
"url": "http://aria-security.net/forum/showthread.php?p=1189"
|
||||
},
|
||||
{
|
||||
"name": "dating-site-loginform-sql-injection(39326)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39326"
|
||||
},
|
||||
{
|
||||
"name": "27080",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/27080"
|
||||
},
|
||||
{
|
||||
"name": "28283",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28283"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2010-0044",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,26 +52,26 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT4070",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT4070"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2010-03-11-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2010/Mar/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name" : "38671",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/38671"
|
||||
},
|
||||
{
|
||||
"name": "38675",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/38675"
|
||||
},
|
||||
{
|
||||
"name": "safari-pubsub-security-bypass(56830)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56830"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT4070",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT4070"
|
||||
},
|
||||
{
|
||||
"name": "62937",
|
||||
"refsource": "OSVDB",
|
||||
@ -83,9 +83,9 @@
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7051"
|
||||
},
|
||||
{
|
||||
"name" : "safari-pubsub-security-bypass(56830)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/56830"
|
||||
"name": "38671",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/38671"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.xerox.com/downloads/usa/en/c/cert_XRX10-001_v1.0.pdf",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.xerox.com/downloads/usa/en/c/cert_XRX10-001_v1.0.pdf"
|
||||
},
|
||||
{
|
||||
"name": "1023500",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1023500"
|
||||
},
|
||||
{
|
||||
"name": "http://www.xerox.com/downloads/usa/en/c/cert_XRX10-001_v1.0.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX10-001_v1.0.pdf"
|
||||
},
|
||||
{
|
||||
"name": "38339",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -53,25 +53,25 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://zeroscience.mk/codes/wamp_xss.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://zeroscience.mk/codes/wamp_xss.txt"
|
||||
"name": "62481",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/62481"
|
||||
},
|
||||
{
|
||||
"name": "http://zeroscience.mk/en/vulnerabilities/ZSL-2010-4926.php",
|
||||
"refsource": "MISC",
|
||||
"url": "http://zeroscience.mk/en/vulnerabilities/ZSL-2010-4926.php"
|
||||
},
|
||||
{
|
||||
"name": "http://zeroscience.mk/codes/wamp_xss.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://zeroscience.mk/codes/wamp_xss.txt"
|
||||
},
|
||||
{
|
||||
"name": "38357",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/38357"
|
||||
},
|
||||
{
|
||||
"name" : "62481",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/62481"
|
||||
},
|
||||
{
|
||||
"name": "38706",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "11549",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/11549"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.packetstormsecurity.com/1002-exploits/joomlasqlreport-sql.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.packetstormsecurity.com/1002-exploits/joomlasqlreport-sql.txt"
|
||||
"name": "sqlreport-userid-sql-injection(56476)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56476"
|
||||
},
|
||||
{
|
||||
"name": "38361",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/38361"
|
||||
},
|
||||
{
|
||||
"name" : "62534",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/62534"
|
||||
},
|
||||
{
|
||||
"name": "38678",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/38678"
|
||||
},
|
||||
{
|
||||
"name" : "sqlreport-userid-sql-injection(56476)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/56476"
|
||||
"name": "62534",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/62534"
|
||||
},
|
||||
{
|
||||
"name": "http://www.packetstormsecurity.com/1002-exploits/joomlasqlreport-sql.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.packetstormsecurity.com/1002-exploits/joomlasqlreport-sql.txt"
|
||||
},
|
||||
{
|
||||
"name": "11549",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/11549"
|
||||
},
|
||||
{
|
||||
"name": "sql-reports-print-sql-injection(56541)",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@ubuntu.com",
|
||||
"ID": "CVE-2010-0831",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -58,19 +58,9 @@
|
||||
"url": "http://marc.info/?l=oss-security&m=127602731712034&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20100608 Re: jar, fastjar directory traversal vulnerabilities",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://marc.info/?l=oss-security&m=127603032617644&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20100608 jar, fastjar directory traversal vulnerabilities",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://marc.info/?l=oss-security&m=127602564508766&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "http://packages.debian.org/changelogs/pool/main/f/fastjar/fastjar_0.98-3/changelog",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://packages.debian.org/changelogs/pool/main/f/fastjar/fastjar_0.98-3/changelog"
|
||||
"name": "GLSA-201209-21",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201209-21.xml"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=594497",
|
||||
@ -78,24 +68,9 @@
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=594497"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=601823",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=601823"
|
||||
},
|
||||
{
|
||||
"name" : "https://launchpad.net/bugs/540575",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://launchpad.net/bugs/540575"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201209-21",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-201209-21.xml"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2010:122",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:122"
|
||||
"name": "[oss-security] 20100608 jar, fastjar directory traversal vulnerabilities",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=oss-security&m=127602564508766&w=2"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:0025",
|
||||
@ -103,14 +78,34 @@
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2011-0025.html"
|
||||
},
|
||||
{
|
||||
"name" : "41006",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/41006"
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=601823",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=601823"
|
||||
},
|
||||
{
|
||||
"name" : "65467",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/65467"
|
||||
"name": "MDVSA-2010:122",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:122"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-1553",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/1553"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0121",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0121"
|
||||
},
|
||||
{
|
||||
"name": "http://packages.debian.org/changelogs/pool/main/f/fastjar/fastjar_0.98-3/changelog",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://packages.debian.org/changelogs/pool/main/f/fastjar/fastjar_0.98-3/changelog"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20100608 Re: jar, fastjar directory traversal vulnerabilities",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=oss-security&m=127603032617644&w=2"
|
||||
},
|
||||
{
|
||||
"name": "42892",
|
||||
@ -123,14 +118,19 @@
|
||||
"url": "http://secunia.com/advisories/50786"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-1553",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/1553"
|
||||
"name": "https://launchpad.net/bugs/540575",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://launchpad.net/bugs/540575"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2011-0121",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2011/0121"
|
||||
"name": "65467",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/65467"
|
||||
},
|
||||
{
|
||||
"name": "41006",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/41006"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "hp-security-alert@hp.com",
|
||||
"ID": "CVE-2010-1552",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20100511 ZDI-10-083: HP OpenView NNM snmpviewer.exe CGI Multiple Variable Remote Code Execution Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/511248/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://zerodayinitiative.com/advisories/ZDI-10-083/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://zerodayinitiative.com/advisories/ZDI-10-083/"
|
||||
"name": "SSRT010098",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=127360750704351&w=2"
|
||||
},
|
||||
{
|
||||
"name": "HPSBMA02527",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "http://marc.info/?l=bugtraq&m=127360750704351&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT010098",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=127360750704351&w=2"
|
||||
"name": "8157",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/8157"
|
||||
},
|
||||
{
|
||||
"name": "20100511 ZDI-10-083: HP OpenView NNM snmpviewer.exe CGI Multiple Variable Remote Code Execution Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/511248/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "SSRT090227",
|
||||
@ -78,9 +78,9 @@
|
||||
"url": "http://marc.info/?l=bugtraq&m=127360750704351&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "8157",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/8157"
|
||||
"name": "http://zerodayinitiative.com/advisories/ZDI-10-083/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://zerodayinitiative.com/advisories/ZDI-10-083/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security-info@sgi.com",
|
||||
"ID": "CVE-2010-1693",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[ewg] 20101021 [PATCH] security fix in openibd script",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://lists.openfabrics.org/pipermail/ewg/2010-October/015886.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20101022 CVE-2010-1693: OFED openibd startup script uses predictable tmpfile",
|
||||
"refsource": "MLIST",
|
||||
@ -68,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/44332"
|
||||
},
|
||||
{
|
||||
"name" : "68856",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/68856"
|
||||
"name": "ofed-openibd-symlink(62753)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62753"
|
||||
},
|
||||
{
|
||||
"name": "41937",
|
||||
@ -78,9 +73,14 @@
|
||||
"url": "http://secunia.com/advisories/41937"
|
||||
},
|
||||
{
|
||||
"name" : "ofed-openibd-symlink(62753)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/62753"
|
||||
"name": "68856",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/68856"
|
||||
},
|
||||
{
|
||||
"name": "[ewg] 20101021 [PATCH] security fix in openibd script",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.openfabrics.org/pipermail/ewg/2010-October/015886.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "socialnetworking-user-sql-injection(58583)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58583"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.org/1005-exploits/web20snfcs-sql.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/1005-exploits/web20snfcs-sql.txt"
|
||||
},
|
||||
{
|
||||
"name" : "64513",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/64513"
|
||||
},
|
||||
{
|
||||
"name": "39761",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/39761"
|
||||
},
|
||||
{
|
||||
"name" : "socialnetworking-user-sql-injection(58583)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/58583"
|
||||
"name": "64513",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/64513"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "ADV-2010-3193",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/3193"
|
||||
},
|
||||
{
|
||||
"name": "http://www-10.lotus.com/ldd/dominowiki.nsf/dx/Lotus_Notes_Traveler_851_FP3_Release_Notes",
|
||||
"refsource": "CONFIRM",
|
||||
@ -62,11 +67,6 @@
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1LO52324"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-3193",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/3193"
|
||||
},
|
||||
{
|
||||
"name": "lotus-notes-traveler-servlet-xss(63977)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,60 +52,60 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "[oss-security] 20101220 CVE request: kernel: CAN information leak, 2nd attempt",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2010/12/20/2"
|
||||
},
|
||||
{
|
||||
"name": "[netdev] 20101102 Re: [SECURITY] CAN info leak/minor heap overflow",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.spinics.net/lists/netdev/msg145796.html"
|
||||
},
|
||||
{
|
||||
"name" : "[netdev] 20101102 [SECURITY] CAN info leak/minor heap overflow",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.spinics.net/lists/netdev/msg145791.html"
|
||||
},
|
||||
{
|
||||
"name": "[netdev] 20101109 Re: [PATCH] Fix CAN info leak/minor heap overflow",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.spinics.net/lists/netdev/msg146270.html"
|
||||
},
|
||||
{
|
||||
"name" : "[netdev] 20101110 Re: [PATCH] Fix CAN info leak/minor heap overflow",
|
||||
"name": "[oss-security] 20101220 Re: CVE request: kernel: CAN information leak, 2nd attempt",
|
||||
"refsource": "MLIST",
|
||||
"url" : "http://www.spinics.net/lists/netdev/msg146468.html"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20101103 CVE request: kernel: CAN information leak",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2010/11/03/3"
|
||||
"url": "http://openwall.com/lists/oss-security/2010/12/21/1"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20101104 Re: CVE request: kernel: CAN information leak",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2010/11/04/4"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20101220 CVE request: kernel: CAN information leak, 2nd attempt",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2010/12/20/2"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20101220 Re: CVE request: kernel: CAN information leak, 2nd attempt",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2010/12/21/1"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=664544",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=664544"
|
||||
},
|
||||
{
|
||||
"name": "[netdev] 20101110 Re: [PATCH] Fix CAN info leak/minor heap overflow",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.spinics.net/lists/netdev/msg146468.html"
|
||||
},
|
||||
{
|
||||
"name": "[netdev] 20101102 [SECURITY] CAN info leak/minor heap overflow",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.spinics.net/lists/netdev/msg145791.html"
|
||||
},
|
||||
{
|
||||
"name": "44661",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/44661"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2011:029",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"
|
||||
},
|
||||
{
|
||||
"name" : "44661",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/44661"
|
||||
"name": "[oss-security] 20101103 CVE request: kernel: CAN information leak",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2010/11/03/3"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://xenuser.org/documents/security/joomla_com_bfquiz_sqli.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://xenuser.org/documents/security/joomla_com_bfquiz_sqli.txt"
|
||||
},
|
||||
{
|
||||
"name": "39960",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/39960"
|
||||
},
|
||||
{
|
||||
"name": "bfquiz-index-sql-injection(58979)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58979"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.org/1005-exploits/joomla_com_bfquiz_sploit.py.txt",
|
||||
"refsource": "MISC",
|
||||
@ -62,40 +77,25 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.packetstormsecurity.org/1005-exploits/joomlabfquiz-sql.txt"
|
||||
},
|
||||
{
|
||||
"name" : "http://xenuser.org/documents/security/joomla_com_bfquiz_sqli.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://xenuser.org/documents/security/joomla_com_bfquiz_sqli.txt"
|
||||
},
|
||||
{
|
||||
"name": "http://www.tamlyncreative.com.au/software/forum/index.php?topic=729.0",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.tamlyncreative.com.au/software/forum/index.php?topic=729.0"
|
||||
},
|
||||
{
|
||||
"name" : "40435",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/40435"
|
||||
},
|
||||
{
|
||||
"name" : "65001",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/65001"
|
||||
},
|
||||
{
|
||||
"name" : "39960",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/39960"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-1272",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/1272"
|
||||
},
|
||||
{
|
||||
"name" : "bfquiz-index-sql-injection(58979)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/58979"
|
||||
"name": "65001",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/65001"
|
||||
},
|
||||
{
|
||||
"name": "40435",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/40435"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://apps.gehealthcare.com/servlet/ClientServlet/MR360+operator+manual+paper.pdf?REQ=RAA&DIRECTION=5339461-1EN&FILENAME=MR360%2Boperator%2Bmanual%2Bpaper.pdf&FILEREV=4&DOCREV_ORG=4",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://apps.gehealthcare.com/servlet/ClientServlet/MR360+operator+manual+paper.pdf?REQ=RAA&DIRECTION=5339461-1EN&FILENAME=MR360%2Boperator%2Bmanual%2Bpaper.pdf&FILEREV=4&DOCREV_ORG=4"
|
||||
},
|
||||
{
|
||||
"name": "http://www.forbes.com/sites/thomasbrewster/2015/07/10/vulnerable-breasts/",
|
||||
"refsource": "MISC",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02",
|
||||
"refsource": "MISC",
|
||||
"url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02"
|
||||
},
|
||||
{
|
||||
"name" : "http://apps.gehealthcare.com/servlet/ClientServlet/MR360+operator+manual+paper.pdf?REQ=RAA&DIRECTION=5339461-1EN&FILENAME=MR360%2Boperator%2Bmanual%2Bpaper.pdf&FILEREV=4&DOCREV_ORG=4",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://apps.gehealthcare.com/servlet/ClientServlet/MR360+operator+manual+paper.pdf?REQ=RAA&DIRECTION=5339461-1EN&FILENAME=MR360%2Boperator%2Bmanual%2Bpaper.pdf&FILEREV=4&DOCREV_ORG=4"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@suse.de",
|
||||
"ASSIGNER": "security@suse.com",
|
||||
"DATE_PUBLIC": "2014-03-26T00:00:00.000Z",
|
||||
"ID": "CVE-2014-0594",
|
||||
"STATE": "PUBLIC",
|
||||
@ -71,15 +71,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://bugzilla.suse.com/show_bug.cgi?id=870606",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.suse.com/show_bug.cgi?id=870606"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/openSUSE/open-build-service/commit/2188c059b67b82171d0e28ef59f77e62d22a09d8",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/openSUSE/open-build-service/commit/2188c059b67b82171d0e28ef59f77e62d22a09d8"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.suse.com/show_bug.cgi?id=870606",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.suse.com/show_bug.cgi?id=870606"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2014-0863",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -62,15 +62,15 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/69594"
|
||||
},
|
||||
{
|
||||
"name" : "1030805",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1030805"
|
||||
},
|
||||
{
|
||||
"name": "ibm-cognos-cve20140863-info-disc(90937)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90937"
|
||||
},
|
||||
{
|
||||
"name": "1030805",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030805"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2014-1137",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@mozilla.org",
|
||||
"ID": "CVE-2014-1522",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,26 +57,6 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2014/mfsa2014-36.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=995289",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=995289"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2014-5829",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132437.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201504-01",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201504-01"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2014:0599",
|
||||
"refsource": "SUSE",
|
||||
@ -87,25 +67,45 @@
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2014-05/msg00033.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201504-01",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201504-01"
|
||||
},
|
||||
{
|
||||
"name": "59866",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59866"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=995289",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=995289"
|
||||
},
|
||||
{
|
||||
"name": "USN-2185-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2185-1"
|
||||
},
|
||||
{
|
||||
"name" : "1030163",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1030163"
|
||||
},
|
||||
{
|
||||
"name": "1030164",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030164"
|
||||
},
|
||||
{
|
||||
"name" : "59866",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59866"
|
||||
"name": "1030163",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030163"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2014-5829",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132437.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,9 +58,9 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/530871/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/124931/Mediatrix-4402-Cross-Site-Scripting.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/124931/Mediatrix-4402-Cross-Site-Scripting.html"
|
||||
"name": "mediatrixwebmanagement-cve20141612-xss(90656)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90656"
|
||||
},
|
||||
{
|
||||
"name": "VU#252294",
|
||||
@ -68,24 +68,24 @@
|
||||
"url": "http://www.kb.cert.org/vuls/id/252294"
|
||||
},
|
||||
{
|
||||
"name" : "65108",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/65108"
|
||||
"name": "http://packetstormsecurity.com/files/124931/Mediatrix-4402-Cross-Site-Scripting.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/124931/Mediatrix-4402-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"name": "102415",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/102415"
|
||||
},
|
||||
{
|
||||
"name": "65108",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/65108"
|
||||
},
|
||||
{
|
||||
"name": "56638",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/56638"
|
||||
},
|
||||
{
|
||||
"name" : "mediatrixwebmanagement-cve20141612-xss(90656)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/90656"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2014-1749",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,21 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=374649",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=374649"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2939",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2014/dsa-2939"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201408-16",
|
||||
"refsource": "GENTOO",
|
||||
@ -78,9 +73,9 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html"
|
||||
},
|
||||
{
|
||||
"name" : "1030270",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1030270"
|
||||
"name": "59155",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59155"
|
||||
},
|
||||
{
|
||||
"name": "58920",
|
||||
@ -88,9 +83,14 @@
|
||||
"url": "http://secunia.com/advisories/58920"
|
||||
},
|
||||
{
|
||||
"name" : "59155",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59155"
|
||||
"name": "https://code.google.com/p/chromium/issues/detail?id=374649",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://code.google.com/p/chromium/issues/detail?id=374649"
|
||||
},
|
||||
{
|
||||
"name": "1030270",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030270"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/127287/WordPress-Construction-Mode-1.8-Cross-Site-Scripting.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/127287/WordPress-Construction-Mode-1.8-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"name": "68287",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/68287"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/127287/WordPress-Construction-Mode-1.8-Cross-Site-Scripting.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/127287/WordPress-Construction-Mode-1.8-Cross-Site-Scripting.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-4906",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
"name": "VU#825289",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/825289"
|
||||
},
|
||||
{
|
||||
"name": "VU#582497",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name" : "VU#825289",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/825289"
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-5600",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
},
|
||||
{
|
||||
"name": "VU#334425",
|
||||
"refsource": "CERT-VN",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "VU#582497",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-5725",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
},
|
||||
{
|
||||
"name": "VU#535417",
|
||||
"refsource": "CERT-VN",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "VU#582497",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-5850",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
},
|
||||
{
|
||||
"name": "VU#582497",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
},
|
||||
{
|
||||
"name": "VU#854241",
|
||||
"refsource": "CERT-VN",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@suse.com",
|
||||
"ID": "CVE-2016-3137",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,109 +53,49 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20160314 Re: CVE request -- linux kernel: crash on invalid USB device descriptors (cypress_m8 driver)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2016/03/14/3"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1316996",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1316996"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/torvalds/linux/commit/c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/torvalds/linux/commit/c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3607",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2016/dsa-3607"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:1672",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html"
|
||||
"name": "USN-2971-2",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2971-2"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:1690",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20160314 Re: CVE request -- linux kernel: crash on invalid USB device descriptors (cypress_m8 driver)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/03/14/3"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1316996",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1316996"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:1696",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:1707",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:1764",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:2074",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1382",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2996-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2996-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2997-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2997-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3000-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-3000-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2968-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2968-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2968-2",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2968-2"
|
||||
},
|
||||
{
|
||||
"name": "USN-2970-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2970-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2971-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2971-1"
|
||||
"name": "https://github.com/torvalds/linux/commit/c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/torvalds/linux/commit/c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2971-2",
|
||||
"name": "84300",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/84300"
|
||||
},
|
||||
{
|
||||
"name": "USN-2968-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2971-2"
|
||||
"url": "http://www.ubuntu.com/usn/USN-2968-1"
|
||||
},
|
||||
{
|
||||
"name": "USN-2971-3",
|
||||
@ -163,9 +103,69 @@
|
||||
"url": "http://www.ubuntu.com/usn/USN-2971-3"
|
||||
},
|
||||
{
|
||||
"name" : "84300",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/84300"
|
||||
"name": "USN-2997-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2997-1"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:1764",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-3000-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3000-1"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3607",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3607"
|
||||
},
|
||||
{
|
||||
"name": "USN-2971-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2971-1"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:1707",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-2996-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2996-1"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:1672",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-2968-2",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2968-2"
|
||||
},
|
||||
{
|
||||
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1382",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:2074",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2016-3911",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://source.android.com/security/bulletin/2016-10-01.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://android.googlesource.com/platform/frameworks/base/+/2c7008421cb67f5d89f16911bdbe36f6c35311ad",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://android.googlesource.com/platform/frameworks/base/+/2c7008421cb67f5d89f16911bdbe36f6c35311ad"
|
||||
},
|
||||
{
|
||||
"name": "93303",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/93303"
|
||||
},
|
||||
{
|
||||
"name": "https://android.googlesource.com/platform/frameworks/base/+/2c7008421cb67f5d89f16911bdbe36f6c35311ad",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/2c7008421cb67f5d89f16911bdbe36f6c35311ad"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/8.7.0"
|
||||
},
|
||||
{
|
||||
"name" : "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories"
|
||||
},
|
||||
{
|
||||
"name": "95921",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/95921"
|
||||
},
|
||||
{
|
||||
"name": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@debian.org",
|
||||
"ID": "CVE-2016-7513",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "93121",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/93121"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20160922 Re: CVE Requests: Various ImageMagick issues (as reported in the Debian BTS)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/09/22/2"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/ImageMagick/ImageMagick/commit/a54fe0e8600eaf3dc6fe717d3c0398001507f723",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/ImageMagick/ImageMagick/commit/a54fe0e8600eaf3dc6fe717d3c0398001507f723"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832455",
|
||||
"refsource": "CONFIRM",
|
||||
@ -66,16 +76,6 @@
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1378733",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378733"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/ImageMagick/ImageMagick/commit/a54fe0e8600eaf3dc6fe717d3c0398001507f723",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/ImageMagick/ImageMagick/commit/a54fe0e8600eaf3dc6fe717d3c0398001507f723"
|
||||
},
|
||||
{
|
||||
"name" : "93121",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/93121"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@suse.com",
|
||||
"ID": "CVE-2016-7943",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,31 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1036945",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036945"
|
||||
},
|
||||
{
|
||||
"name": "USN-3758-2",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3758-2/"
|
||||
},
|
||||
{
|
||||
"name": "https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8c29f1607a31dac0911e45a0dd3d74173822b3c9",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8c29f1607a31dac0911e45a0dd3d74173822b3c9"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201704-03",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201704-03"
|
||||
},
|
||||
{
|
||||
"name": "[xorg-announce] 20161004 X.Org security advisory: Protocol handling issues in X Window System client libraries",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.x.org/archives/xorg-announce/2016-October/002720.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20161004 Re: X.Org security advisory: Protocol handling issues in X Window System client libraries",
|
||||
"refsource": "MLIST",
|
||||
@ -63,29 +88,9 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/10/04/2"
|
||||
},
|
||||
{
|
||||
"name" : "[xorg-announce] 20161004 X.Org security advisory: Protocol handling issues in X Window System client libraries",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.x.org/archives/xorg-announce/2016-October/002720.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8c29f1607a31dac0911e45a0dd3d74173822b3c9",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8c29f1607a31dac0911e45a0dd3d74173822b3c9"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2016-0df69ab477",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201704-03",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201704-03"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3758-2",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3758-2/"
|
||||
"name": "93362",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/93362"
|
||||
},
|
||||
{
|
||||
"name": "USN-3758-1",
|
||||
@ -93,14 +98,9 @@
|
||||
"url": "https://usn.ubuntu.com/3758-1/"
|
||||
},
|
||||
{
|
||||
"name" : "93362",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/93362"
|
||||
},
|
||||
{
|
||||
"name" : "1036945",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1036945"
|
||||
"name": "FEDORA-2016-0df69ab477",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "94938",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94938"
|
||||
},
|
||||
{
|
||||
"name": "42700",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-350-01",
|
||||
"refsource": "MISC",
|
||||
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-350-01"
|
||||
},
|
||||
{
|
||||
"name" : "94938",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/94938"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,45 +52,45 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20161122 CVE-2016-8630 kernel: kvm: x86: NULL pointer dereference duringinstruction decode",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2016/11/22/3"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d9092f52d7e61dd1557f2db2400ddb430e85937e",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d9092f52d7e61dd1557f2db2400ddb430e85937e"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.7",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.7"
|
||||
},
|
||||
{
|
||||
"name": "94459",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94459"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1393350",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393350"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/torvalds/linux/commit/d9092f52d7e61dd1557f2db2400ddb430e85937e",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/torvalds/linux/commit/d9092f52d7e61dd1557f2db2400ddb430e85937e"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:0386",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0386.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:0387",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2017-0387.html"
|
||||
},
|
||||
{
|
||||
"name" : "94459",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/94459"
|
||||
"name": "https://github.com/torvalds/linux/commit/d9092f52d7e61dd1557f2db2400ddb430e85937e",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/torvalds/linux/commit/d9092f52d7e61dd1557f2db2400ddb430e85937e"
|
||||
},
|
||||
{
|
||||
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d9092f52d7e61dd1557f2db2400ddb430e85937e",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d9092f52d7e61dd1557f2db2400ddb430e85937e"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20161122 CVE-2016-8630 kernel: kvm: x86: NULL pointer dereference duringinstruction decode",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/11/22/3"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:0386",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2017-0386.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20160818 potrace: multiple crashes",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2016/08/18/11"
|
||||
"name": "93778",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/93778"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20161015 Re: potrace: multiple crashes",
|
||||
@ -67,15 +67,15 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://blogs.gentoo.org/ago/2016/08/08/potrace-multiple-three-null-pointer-dereference-in-bm_readbody_bmp-bitmap_io-c/"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20160818 potrace: multiple crashes",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/08/18/11"
|
||||
},
|
||||
{
|
||||
"name": "http://potrace.sourceforge.net/ChangeLog",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://potrace.sourceforge.net/ChangeLog"
|
||||
},
|
||||
{
|
||||
"name" : "93778",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/93778"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -54,34 +54,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1400644",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1400644"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:1253",
|
||||
"name": "RHSA-2017:1411",
|
||||
"refsource": "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:1253"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:1254",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:1254"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:1255",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2017-1255.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:1256",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:1256"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:1260",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:1260"
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1411"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:1409",
|
||||
@ -89,19 +64,14 @@
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2017-1409.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:1410",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:1410"
|
||||
"name": "94940",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94940"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:1411",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:1411"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:1412",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:1412"
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1400644",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400644"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:1675",
|
||||
@ -109,29 +79,59 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1675"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:1676",
|
||||
"name": "1038524",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038524"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:1254",
|
||||
"refsource": "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:1676"
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1254"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:1410",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1410"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:1255",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2017-1255.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:1412",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1412"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:2909",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:2909"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:1256",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1256"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:1253",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1253"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:1260",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1260"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:1676",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1676"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:2913",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:2913"
|
||||
},
|
||||
{
|
||||
"name" : "94940",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/94940"
|
||||
},
|
||||
{
|
||||
"name" : "1038524",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1038524"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-9607",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -75,11 +75,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1312272",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1312272"
|
||||
},
|
||||
{
|
||||
"name": "https://www.mozilla.org/security/advisories/mfsa2016-94/",
|
||||
"refsource": "CONFIRM",
|
||||
@ -90,31 +85,6 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2016-95/"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.mozilla.org/security/advisories/mfsa2016-96/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.mozilla.org/security/advisories/mfsa2016-96/"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3757",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "https://www.debian.org/security/2017/dsa-3757"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201701-15",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201701-15"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:2946",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2946.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:2973",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2973.html"
|
||||
},
|
||||
{
|
||||
"name": "94885",
|
||||
"refsource": "BID",
|
||||
@ -124,6 +94,36 @@
|
||||
"name": "1037461",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037461"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201701-15",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201701-15"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3757",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2017/dsa-3757"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1312272",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1312272"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2016:2973",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2973.html"
|
||||
},
|
||||
{
|
||||
"name": "https://www.mozilla.org/security/advisories/mfsa2016-96/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2016-96/"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2016:2946",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2946.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user