"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 02:07:21 +00:00
parent 39c2e0eb0e
commit 1c42df9c34
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
51 changed files with 3572 additions and 3572 deletions

View File

@ -57,11 +57,6 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/421312/100/0/threaded"
},
{
"name" : "16199",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16199"
},
{
"name": "22387",
"refsource": "OSVDB",
@ -71,6 +66,11 @@
"name": "orjinweb-url-file-include(24097)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24097"
},
{
"name": "16199",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16199"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2006-0301",
"STATE": "PUBLIC"
},
@ -53,119 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=179046",
"refsource" : "MISC",
"url" : "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=179046"
},
{
"name" : "https://bugzilla.novell.com/show_bug.cgi?id=141242",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.novell.com/show_bug.cgi?id=141242"
},
{
"name" : "20060202 [KDE Security Advisory] kpdf/xpdf heap based buffer overflow",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/423899/100/0/threaded"
},
{
"name" : "http://www.kde.org/info/security/advisory-20060202-1.txt",
"refsource" : "MISC",
"url" : "http://www.kde.org/info/security/advisory-20060202-1.txt"
},
{
"name" : "DSA-971",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-971"
},
{
"name" : "DSA-974",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-974"
},
{
"name" : "DSA-972",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-972"
},
{
"name" : "FLSA:175404",
"refsource" : "FEDORA",
"url" : "http://www.securityfocus.com/archive/1/427990/100/0/threaded"
},
{
"name" : "FEDORA-2006-103",
"refsource" : "FEDORA",
"url" : "http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00039.html"
},
{
"name" : "GLSA-200602-04",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200602-04.xml"
},
{
"name" : "GLSA-200602-05",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200602-05.xml"
},
{
"name" : "GLSA-200602-12",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200602-12.xml"
},
{
"name" : "MDKSA-2006:030",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:030"
},
{
"name" : "MDKSA-2006:031",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:031"
},
{
"name" : "MDKSA-2006:032",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:032"
},
{
"name" : "RHSA-2006:0201",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0201.html"
},
{
"name" : "RHSA-2006:0206",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2006-0206.html"
},
{
"name" : "SCOSA-2006.15",
"refsource" : "SCO",
"url" : "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt"
},
{
"name" : "SSA:2006-045-04",
"refsource" : "SLACKWARE",
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747"
},
{
"name" : "SSA:2006-045-09",
"refsource" : "SLACKWARE",
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683"
},
{
"name" : "USN-249-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-249-1"
},
{
"name" : "oval:org.mitre.oval:def:10850",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10850"
},
{
"name" : "ADV-2006-0389",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0389"
"name": "18707",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18707"
},
{
"name": "ADV-2006-0422",
@ -178,39 +68,9 @@
"url": "http://securitytracker.com/id?1015576"
},
{
"name" : "18677",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18677"
},
{
"name" : "18707",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18707"
},
{
"name" : "18834",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18834"
},
{
"name" : "18875",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18875"
},
{
"name" : "18274",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18274"
},
{
"name" : "18825",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18825"
},
{
"name" : "18826",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18826"
"name": "SCOSA-2006.15",
"refsource": "SCO",
"url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt"
},
{
"name": "18837",
@ -218,39 +78,19 @@
"url": "http://secunia.com/advisories/18837"
},
{
"name" : "18838",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18838"
"name": "xpdf-splash-bo(24391)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24391"
},
{
"name" : "18860",
"name": "18834",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/18860"
"url": "http://secunia.com/advisories/18834"
},
{
"name" : "18862",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18862"
},
{
"name" : "18864",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18864"
},
{
"name" : "18882",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18882"
},
{
"name" : "18908",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18908"
},
{
"name" : "18913",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18913"
"name": "MDKSA-2006:031",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:031"
},
{
"name": "18983",
@ -258,14 +98,99 @@
"url": "http://secunia.com/advisories/18983"
},
{
"name" : "19377",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19377"
"name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=179046",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=179046"
},
{
"name" : "18839",
"name": "MDKSA-2006:030",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:030"
},
{
"name": "20060202 [KDE Security Advisory] kpdf/xpdf heap based buffer overflow",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/423899/100/0/threaded"
},
{
"name": "18864",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/18839"
"url": "http://secunia.com/advisories/18864"
},
{
"name": "ADV-2006-0389",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0389"
},
{
"name": "18677",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18677"
},
{
"name": "GLSA-200602-12",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200602-12.xml"
},
{
"name": "FEDORA-2006-103",
"refsource": "FEDORA",
"url": "http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00039.html"
},
{
"name": "RHSA-2006:0201",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0201.html"
},
{
"name": "MDKSA-2006:032",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:032"
},
{
"name": "GLSA-200602-05",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200602-05.xml"
},
{
"name": "18882",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18882"
},
{
"name": "18274",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18274"
},
{
"name": "oval:org.mitre.oval:def:10850",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10850"
},
{
"name": "DSA-974",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-974"
},
{
"name": "DSA-971",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-971"
},
{
"name": "18825",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18825"
},
{
"name": "RHSA-2006:0206",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2006-0206.html"
},
{
"name": "http://www.kde.org/info/security/advisory-20060202-1.txt",
"refsource": "MISC",
"url": "http://www.kde.org/info/security/advisory-20060202-1.txt"
},
{
"name": "470",
@ -273,9 +198,84 @@
"url": "http://securityreason.com/securityalert/470"
},
{
"name" : "xpdf-splash-bo(24391)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24391"
"name": "SSA:2006-045-09",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683"
},
{
"name": "18875",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18875"
},
{
"name": "GLSA-200602-04",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200602-04.xml"
},
{
"name": "18860",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18860"
},
{
"name": "18908",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18908"
},
{
"name": "18839",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18839"
},
{
"name": "USN-249-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-249-1"
},
{
"name": "18862",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18862"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=141242",
"refsource": "CONFIRM",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=141242"
},
{
"name": "SSA:2006-045-04",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747"
},
{
"name": "19377",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19377"
},
{
"name": "FLSA:175404",
"refsource": "FEDORA",
"url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded"
},
{
"name": "DSA-972",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-972"
},
{
"name": "18913",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18913"
},
{
"name": "18838",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18838"
},
{
"name": "18826",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18826"
}
]
}

View File

@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20060614 APBoard 2.2-r3 <= SQL Injections",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/437271/100/0/threaded"
},
{
"name" : "18447",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18447"
},
{
"name" : "ADV-2006-2401",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2401"
},
{
"name" : "26582",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/26582"
"name": "20682",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20682"
},
{
"name": "26583",
@ -78,9 +63,24 @@
"url": "http://www.osvdb.org/26583"
},
{
"name" : "20682",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20682"
"name": "26582",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26582"
},
{
"name": "ADV-2006-2401",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2401"
},
{
"name": "18447",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18447"
},
{
"name": "apboard-multiple-sql-injection(27163)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27163"
},
{
"name": "1117",
@ -88,9 +88,9 @@
"url": "http://securityreason.com/securityalert/1117"
},
{
"name" : "apboard-multiple-sql-injection(27163)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27163"
"name": "20060614 APBoard 2.2-r3 <= SQL Injections",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/437271/100/0/threaded"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2006-3318",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "20060629 Secunia Research: phpRaid SQL Injection and File InclusionVulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/438706/100/0/threaded"
},
{
"name": "http://secunia.com/secunia_research/2006-47/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2006-47/advisory/"
},
{
"name": "phpraid-register-sql-injection(27459)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27459"
},
{
"name": "ADV-2006-2593",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2593"
},
{
"name" : "20865",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20865"
"name": "20060629 Secunia Research: phpRaid SQL Injection and File InclusionVulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/438706/100/0/threaded"
},
{
"name": "1173",
@ -78,9 +78,9 @@
"url": "http://securityreason.com/securityalert/1173"
},
{
"name" : "phpraid-register-sql-injection(27459)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27459"
"name": "20865",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20865"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2641"
},
{
"name" : "20932",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20932"
},
{
"name": "mads-index-search-xss(27510)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27510"
},
{
"name": "20932",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20932"
}
]
}

View File

@ -53,15 +53,35 @@
"references": {
"reference_data": [
{
"name" : "20060912 Apple QuickTime H.264 Integer Overflow Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/445830/100/0/threaded"
"name": "1016830",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016830"
},
{
"name": "21893",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21893"
},
{
"name": "http://secway.org/advisory/AD20060912.txt",
"refsource": "MISC",
"url": "http://secway.org/advisory/AD20060912.txt"
},
{
"name": "19976",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19976"
},
{
"name": "1551",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1551"
},
{
"name": "28774",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/28774"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=304357",
"refsource": "CONFIRM",
@ -72,40 +92,20 @@
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html"
},
{
"name" : "19976",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19976"
},
{
"name": "ADV-2006-3577",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3577"
},
{
"name" : "28774",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/28774"
},
{
"name" : "1016830",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016830"
},
{
"name" : "21893",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21893"
},
{
"name" : "1551",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1551"
},
{
"name": "quicktime-h264-integer-overflow(28928)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28928"
},
{
"name": "20060912 Apple QuickTime H.264 Integer Overflow Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/445830/100/0/threaded"
}
]
}

View File

@ -53,29 +53,29 @@
"references": {
"reference_data": [
{
"name" : "20060904 AnywhereUSB/5 1.80.00 Drivers Integer Overflow",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/445088/100/0/threaded"
},
{
"name" : "http://www.safend.com/advisories/digi_anywhereusb5_intoverflow.txt",
"refsource" : "MISC",
"url" : "http://www.safend.com/advisories/digi_anywhereusb5_intoverflow.txt"
"name": "1500",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1500"
},
{
"name": "19833",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19833"
},
{
"name": "http://www.safend.com/advisories/digi_anywhereusb5_intoverflow.txt",
"refsource": "MISC",
"url": "http://www.safend.com/advisories/digi_anywhereusb5_intoverflow.txt"
},
{
"name": "20060904 AnywhereUSB/5 1.80.00 Drivers Integer Overflow",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/445088/100/0/threaded"
},
{
"name": "21739",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21739"
},
{
"name" : "1500",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1500"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2006-4702",
"STATE": "PUBLIC"
},
@ -57,36 +57,36 @@
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-274.htm"
},
{
"name" : "HPSBST02180",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/454969/100/200/threaded"
},
{
"name" : "SSRT061288",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/454969/100/200/threaded"
},
{
"name": "MS06-078",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-078"
},
{
"name" : "TA06-346A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-346A.html"
},
{
"name": "21505",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21505"
},
{
"name": "TA06-346A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA06-346A.html"
},
{
"name": "oval:org.mitre.oval:def:536",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A536"
},
{
"name": "SSRT061288",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/454969/100/200/threaded"
},
{
"name": "HPSBST02180",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/454969/100/200/threaded"
},
{
"name": "1017372",
"refsource": "SECTRACK",

View File

@ -53,20 +53,15 @@
"references": {
"reference_data": [
{
"name" : "20060915 SolpotCrew Advisory #11 - ReviewPost 2.5 (RP_PATH) Remote File Inclusion",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/446106/100/0/threaded"
"name": "ADV-2006-3658",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3658"
},
{
"name": "http://www.nyubicrew.org/adv/home_edition2001-adv-01.txt",
"refsource": "MISC",
"url": "http://www.nyubicrew.org/adv/home_edition2001-adv-01.txt"
},
{
"name" : "ADV-2006-3658",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3658"
},
{
"name": "21971",
"refsource": "SECUNIA",
@ -81,6 +76,11 @@
"name": "reviewpostphppro-rppath-file-include(28992)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28992"
},
{
"name": "20060915 SolpotCrew Advisory #11 - ReviewPost 2.5 (RP_PATH) Remote File Inclusion",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/446106/100/0/threaded"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/459265/100/0/threaded"
},
{
"name" : "http://kaneda.bohater.net/security/20061220-opera_9.10_final_bypass_fraud_protection.php",
"refsource" : "MISC",
"url" : "http://kaneda.bohater.net/security/20061220-opera_9.10_final_bypass_fraud_protection.php"
},
{
"name": "34927",
"refsource": "OSVDB",
"url": "http://osvdb.org/34927"
},
{
"name": "http://kaneda.bohater.net/security/20061220-opera_9.10_final_bypass_fraud_protection.php",
"refsource": "MISC",
"url": "http://kaneda.bohater.net/security/20061220-opera_9.10_final_bypass_fraud_protection.php"
}
]
}

View File

@ -52,11 +52,26 @@
},
"references": {
"reference_data": [
{
"name": "nakidcms-uploadphoto-file-include(59453)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59453"
},
{
"name": "13889",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/13889"
},
{
"name": "ADV-2010-1498",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1498"
},
{
"name": "40174",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40174"
},
{
"name": "http://packetstormsecurity.org/1006-exploits/nakid-rfi.txt",
"refsource": "MISC",
@ -66,21 +81,6 @@
"name": "40882",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/40882"
},
{
"name" : "40174",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/40174"
},
{
"name" : "ADV-2010-1498",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1498"
},
{
"name" : "nakidcms-uploadphoto-file-include(59453)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/59453"
}
]
}

View File

@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20100721 ZDI-10-133: Mozilla Firefox CSS font-face Remote Code Execution Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/512514"
},
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-10-133/",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-10-133/"
},
{
"name" : "http://www.mozilla.org/security/announce/2010/mfsa2010-39.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2010/mfsa2010-39.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=574059",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=574059"
"name": "oval:org.mitre.oval:def:11680",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11680"
},
{
"name": "41852",
@ -78,9 +63,24 @@
"url": "http://www.securityfocus.com/bid/41852"
},
{
"name" : "oval:org.mitre.oval:def:11680",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11680"
"name": "http://www.zerodayinitiative.com/advisories/ZDI-10-133/",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-133/"
},
{
"name": "20100721 ZDI-10-133: Mozilla Firefox CSS font-face Remote Code Execution Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/512514"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=574059",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=574059"
},
{
"name": "http://www.mozilla.org/security/announce/2010/mfsa2010-39.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2010/mfsa2010-39.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2010-2873",
"STATE": "PUBLIC"
},
@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "1024361",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024361"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html"
},
{
"name": "oval:org.mitre.oval:def:12042",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12042"
},
{
"name": "20100824 ZDI-10-162: Adobe Shockwave Director rcsL Chunk Remote Code Execution Vulnerability",
"refsource": "BUGTRAQ",
@ -62,26 +77,11 @@
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-162"
},
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb10-20.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb10-20.html"
},
{
"name": "42682",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/42682"
},
{
"name" : "oval:org.mitre.oval:def:12042",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12042"
},
{
"name" : "1024361",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1024361"
},
{
"name": "ADV-2010-2176",
"refsource": "VUPEN",

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "MDVSA-2011:039",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:039"
},
{
"name": "ADV-2010-2722",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2722"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=49964",
"refsource": "CONFIRM",
@ -62,51 +72,41 @@
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2010/08/stable-channel-update_19.html"
},
{
"name" : "MDVSA-2011:039",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:039"
},
{
"name" : "RHSA-2011:0177",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0177.html"
},
{
"name": "USN-1006-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1006-1"
},
{
"name" : "44203",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/44203"
},
{
"name" : "oval:org.mitre.oval:def:11953",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11953"
},
{
"name": "41856",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41856"
},
{
"name" : "43086",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43086"
},
{
"name" : "ADV-2010-2722",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/2722"
"name": "oval:org.mitre.oval:def:11953",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11953"
},
{
"name": "ADV-2011-0216",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0216"
},
{
"name": "43086",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43086"
},
{
"name": "44203",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/44203"
},
{
"name": "RHSA-2011:0177",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0177.html"
},
{
"name": "ADV-2011-0552",
"refsource": "VUPEN",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2011-0034",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-032"
},
{
"name" : "TA11-102A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA11-102A.html"
},
{
"name": "oval:org.mitre.oval:def:11860",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11860"
},
{
"name": "TA11-102A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA11-102A.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-0231",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT5002",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5002"
},
{
"name": "APPLE-SA-2011-10-12-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"name": "http://support.apple.com/kb/HT5002",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5002"
},
{
"name": "50085",
"refsource": "BID",

View File

@ -62,15 +62,15 @@
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg27014224"
},
{
"name" : "IZ92813",
"refsource" : "AIXAPAR",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg1IZ92813"
},
{
"name": "websphere-mq-cdb-security-bypass(68229)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68229"
},
{
"name": "IZ92813",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=swg1IZ92813"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.primothemes.com/forums/viewtopic.php?f=4&t=16173#p56982",
"refsource" : "CONFIRM",
"url" : "http://www.primothemes.com/forums/viewtopic.php?f=4&t=16173#p56982"
"name": "47954",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/47954"
},
{
"name": "51997",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/51997"
},
{
"name" : "47954",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/47954"
"name": "http://www.primothemes.com/forums/viewtopic.php?f=4&t=16173#p56982",
"refsource": "CONFIRM",
"url": "http://www.primothemes.com/forums/viewtopic.php?f=4&t=16173#p56982"
},
{
"name": "s2memberpro-couponcode-xss(73202)",

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://puppetlabs.com/security/cve/cve-2014-3251",
"refsource" : "CONFIRM",
"url" : "http://puppetlabs.com/security/cve/cve-2014-3251"
},
{
"name": "109257",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/109257"
},
{
"name" : "59356",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59356"
"name": "http://puppetlabs.com/security/cve/cve-2014-3251",
"refsource": "CONFIRM",
"url": "http://puppetlabs.com/security/cve/cve-2014-3251"
},
{
"name": "60066",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60066"
},
{
"name": "59356",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59356"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-3489",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "RHSA-2014:0816",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0816.html"
},
{
"name": "68299",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/68299"
},
{
"name": "RHSA-2014:0816",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0816.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-6154",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21696000",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21696000"
},
{
"name": "ibm-optim-cve20146154-directory-traversal(97677)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97677"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21696000",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21696000"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2014-6350",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1031185",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031185"
},
{
"name": "MS14-065",
"refsource": "MS",
@ -61,11 +66,6 @@
"name": "70940",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/70940"
},
{
"name" : "1031185",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1031185"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7452",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
@ -61,11 +66,6 @@
"name": "VU#211489",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/211489"
},
{
"name" : "VU#582497",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/582497"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7603",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#715993",
"refsource": "CERT-VN",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7629",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
"name": "VU#953505",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/953505"
},
{
"name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name" : "VU#953505",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/953505"
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-7989",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20141106 Cisco Unified Computing System B-Series Servers Privilege Escalation Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7989"
},
{
"name": "70969",
"refsource": "BID",
@ -71,6 +66,11 @@
"name": "cisco-ucs-cve20147989-priv-esc(98530)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98530"
},
{
"name": "20141106 Cisco Unified Computing System B-Series Servers Privilege Escalation Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7989"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-14-350-01",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-14-350-01"
},
{
"name": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-344-01",
"refsource": "CONFIRM",
"url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-344-01"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-14-350-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-350-01"
}
]
}

View File

@ -52,185 +52,105 @@
},
"references": {
"reference_data": [
{
"name" : "http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html"
},
{
"name" : "https://git.openssl.org/?p=openssl.git;a=commit;h=c62981390d6cf9e3d612c489b8b77c2913b25807",
"refsource" : "CONFIRM",
"url" : "https://git.openssl.org/?p=openssl.git;a=commit;h=c62981390d6cf9e3d612c489b8b77c2913b25807"
},
{
"name" : "https://www.openssl.org/news/secadv/20160503.txt",
"refsource" : "CONFIRM",
"url" : "https://www.openssl.org/news/secadv/20160503.txt"
},
{
"name" : "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202",
"refsource" : "CONFIRM",
"url" : "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202"
},
{
"name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10160",
"refsource" : "CONFIRM",
"url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10160"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
},
{
"name" : "https://support.apple.com/HT206903",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206903"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149"
},
{
"name" : "https://bto.bluecoat.com/security-advisory/sa123",
"refsource" : "CONFIRM",
"url" : "https://bto.bluecoat.com/security-advisory/sa123"
},
{
"name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
"refsource" : "CONFIRM",
"url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
},
{
"name" : "https://www.tenable.com/security/tns-2016-18",
"refsource" : "CONFIRM",
"url" : "https://www.tenable.com/security/tns-2016-18"
},
{
"name" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us"
},
{
"name" : "https://source.android.com/security/bulletin/2017-07-01",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2017-07-01"
},
{
"name" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
},
{
"name" : "https://security.netapp.com/advisory/ntap-20160504-0001/",
"refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20160504-0001/"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name" : "APPLE-SA-2016-07-18-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html"
},
{
"name" : "20160504 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: May 2016",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl"
},
{
"name" : "DSA-3566",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3566"
},
{
"name" : "FreeBSD-SA-16:17",
"refsource" : "FREEBSD",
"url" : "https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc"
},
{
"name" : "GLSA-201612-16",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201612-16"
},
{
"name" : "RHSA-2016:0722",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0722.html"
},
{
"name" : "RHSA-2016:0996",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0996.html"
"name": "SSA:2016-124-01",
"refsource": "SLACKWARE",
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103"
},
{
"name": "RHSA-2016:2056",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2056.html"
},
{
"name": "openSUSE-SU-2016:1238",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html"
},
{
"name": "openSUSE-SU-2016:1242",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name": "SUSE-SU-2016:1267",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html"
},
{
"name": "RHSA-2016:2073",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2073.html"
},
{
"name" : "RHSA-2016:2957",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2957.html"
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us"
},
{
"name" : "SSA:2016-124-01",
"refsource" : "SLACKWARE",
"url" : "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103"
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
},
{
"name" : "SUSE-SU-2016:1206",
"name": "DSA-3566",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3566"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
},
{
"name": "http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10160",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10160"
},
{
"name": "openSUSE-SU-2016:1243",
"refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html"
},
{
"name": "https://source.android.com/security/bulletin/2017-07-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-07-01"
},
{
"name": "GLSA-201612-16",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201612-16"
},
{
"name": "SUSE-SU-2016:1228",
@ -238,30 +158,45 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html"
},
{
"name" : "SUSE-SU-2016:1231",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html"
},
{
"name" : "SUSE-SU-2016:1233",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html"
},
{
"name" : "openSUSE-SU-2016:1237",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html"
},
{
"name" : "openSUSE-SU-2016:1238",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html"
"name": "1035721",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035721"
},
{
"name": "openSUSE-SU-2016:1239",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html"
},
{
"name": "SUSE-SU-2016:1206",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html"
},
{
"name": "20160504 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: May 2016",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name": "SUSE-SU-2016:1231",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html"
},
{
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name": "openSUSE-SU-2016:1240",
"refsource": "SUSE",
@ -273,29 +208,9 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html"
},
{
"name" : "SUSE-SU-2016:1267",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html"
},
{
"name" : "openSUSE-SU-2016:1242",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html"
},
{
"name" : "openSUSE-SU-2016:1243",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html"
},
{
"name" : "openSUSE-SU-2016:1273",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html"
},
{
"name" : "SUSE-SU-2016:1290",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html"
"name": "APPLE-SA-2016-07-18-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html"
},
{
"name": "SUSE-SU-2016:1360",
@ -303,24 +218,109 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html"
},
{
"name" : "USN-2959-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2959-1"
"name": "https://www.tenable.com/security/tns-2016-18",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2016-18"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
},
{
"name": "SUSE-SU-2016:1233",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html"
},
{
"name": "openSUSE-SU-2016:1237",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html"
},
{
"name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202",
"refsource": "CONFIRM",
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202"
},
{
"name": "RHSA-2016:0996",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0996.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20160504-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20160504-0001/"
},
{
"name": "https://git.openssl.org/?p=openssl.git;a=commit;h=c62981390d6cf9e3d612c489b8b77c2913b25807",
"refsource": "CONFIRM",
"url": "https://git.openssl.org/?p=openssl.git;a=commit;h=c62981390d6cf9e3d612c489b8b77c2913b25807"
},
{
"name": "91787",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91787"
},
{
"name": "SUSE-SU-2016:1290",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html"
},
{
"name": "openSUSE-SU-2016:1273",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html"
},
{
"name": "RHSA-2016:2957",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html"
},
{
"name": "USN-2959-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2959-1"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
},
{
"name": "87940",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/87940"
},
{
"name" : "1035721",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035721"
"name": "RHSA-2016:0722",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0722.html"
},
{
"name": "FreeBSD-SA-16:17",
"refsource": "FREEBSD",
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc"
},
{
"name": "https://www.openssl.org/news/secadv/20160503.txt",
"refsource": "CONFIRM",
"url": "https://www.openssl.org/news/secadv/20160503.txt"
},
{
"name": "https://support.apple.com/HT206903",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206903"
},
{
"name": "https://bto.bluecoat.com/security-advisory/sa123",
"refsource": "CONFIRM",
"url": "https://bto.bluecoat.com/security-advisory/sa123"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20160913 Open-Xchange Security Advisory 2016-09-13 (2)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/539395/100/0/threaded"
},
{
"name" : "40377",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/40377/"
"name": "92920",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92920"
},
{
"name": "http://packetstormsecurity.com/files/138701/Open-Xchange-Guard-2.4.2-Cross-Site-Scripting.html",
@ -68,9 +63,14 @@
"url": "http://packetstormsecurity.com/files/138701/Open-Xchange-Guard-2.4.2-Cross-Site-Scripting.html"
},
{
"name" : "92920",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/92920"
"name": "40377",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40377/"
},
{
"name": "20160913 Open-Xchange Security Advisory 2016-09-13 (2)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/539395/100/0/threaded"
}
]
}

View File

@ -52,21 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "95792",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95792"
},
{
"name": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html",
"refsource": "CONFIRM",
"url": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html"
},
{
"name" : "https://crbug.com/677716",
"refsource" : "CONFIRM",
"url" : "https://crbug.com/677716"
},
{
"name" : "DSA-3776",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2017/dsa-3776"
},
{
"name": "GLSA-201701-66",
"refsource": "GENTOO",
@ -78,14 +73,19 @@
"url": "http://rhn.redhat.com/errata/RHSA-2017-0206.html"
},
{
"name" : "95792",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/95792"
"name": "https://crbug.com/677716",
"refsource": "CONFIRM",
"url": "https://crbug.com/677716"
},
{
"name": "1037718",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037718"
},
{
"name": "DSA-3776",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3776"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://security.netapp.com/advisory/ntap-20170809-0001/",
"refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20170809-0001/"
},
{
"name": "101776",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101776"
},
{
"name": "https://security.netapp.com/advisory/ntap-20170809-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20170809-0001/"
}
]
}