"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 00:30:44 +00:00
parent bc70974a75
commit 2c245ee107
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
49 changed files with 3924 additions and 3924 deletions

View File

@ -53,29 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://docs.info.apple.com/article.html?artnum=303382", "name": "macosx-syndication-xss(25040)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://docs.info.apple.com/article.html?artnum=303382" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25040"
},
{
"name" : "APPLE-SA-2006-03-01",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2006/Mar/msg00000.html"
},
{
"name" : "TA06-062A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-062A.html"
},
{
"name" : "16907",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16907"
},
{
"name" : "ADV-2006-0791",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0791"
}, },
{ {
"name": "23649", "name": "23649",
@ -88,9 +68,29 @@
"url": "http://secunia.com/advisories/19064" "url": "http://secunia.com/advisories/19064"
}, },
{ {
"name" : "macosx-syndication-xss(25040)", "name": "16907",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25040" "url": "http://www.securityfocus.com/bid/16907"
},
{
"name": "ADV-2006-0791",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0791"
},
{
"name": "APPLE-SA-2006-03-01",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2006/Mar/msg00000.html"
},
{
"name": "TA06-062A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA06-062A.html"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=303382",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=303382"
} }
] ]
} }

View File

@ -58,19 +58,9 @@
"url": "http://www.securityfocus.com/archive/1/425180/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/425180/100/0/threaded"
}, },
{ {
"name" : "16695", "name": "siteframe-comment-xss(24836)",
"refsource" : "BID", "refsource": "XF",
"url" : "http://www.securityfocus.com/bid/16695" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24836"
},
{
"name" : "23267",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/23267"
},
{
"name" : "18892",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18892"
}, },
{ {
"name": "443", "name": "443",
@ -78,9 +68,19 @@
"url": "http://securityreason.com/securityalert/443" "url": "http://securityreason.com/securityalert/443"
}, },
{ {
"name" : "siteframe-comment-xss(24836)", "name": "18892",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24836" "url": "http://secunia.com/advisories/18892"
},
{
"name": "23267",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/23267"
},
{
"name": "16695",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16695"
} }
] ]
} }

View File

@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://sourceforge.net/project/shownotes.php?release_id=394690&group_id=127754", "name": "18938",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://sourceforge.net/project/shownotes.php?release_id=394690&group_id=127754" "url": "http://secunia.com/advisories/18938"
}, },
{ {
"name": "16733", "name": "16733",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/16733" "url": "http://www.securityfocus.com/bid/16733"
}, },
{
"name": "emulinker-packet-handling-dos(24784)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24784"
},
{ {
"name": "ADV-2006-0665", "name": "ADV-2006-0665",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0665" "url": "http://www.vupen.com/english/advisories/2006/0665"
}, },
{ {
"name" : "18938", "name": "http://sourceforge.net/project/shownotes.php?release_id=394690&group_id=127754",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/18938" "url": "http://sourceforge.net/project/shownotes.php?release_id=394690&group_id=127754"
},
{
"name" : "emulinker-packet-handling-dos(24784)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24784"
} }
] ]
} }

View File

@ -53,24 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060223 Vulnerability in Crypt::CBC Perl module, versions <= 2.16", "name": "20899",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/425966/100/0/threaded" "url": "http://secunia.com/advisories/20899"
},
{
"name" : "DSA-996",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-996"
},
{
"name" : "GLSA-200603-15",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200603-15.xml"
},
{
"name" : "RHSA-2008:0261",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0261.html"
}, },
{ {
"name": "RHSA-2008:0630", "name": "RHSA-2008:0630",
@ -78,44 +63,59 @@
"url": "http://rhn.redhat.com/errata/RHSA-2008-0630.html" "url": "http://rhn.redhat.com/errata/RHSA-2008-0630.html"
}, },
{ {
"name" : "SUSE-SR:2006:015", "name": "31493",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2006_38_security.html"
},
{
"name" : "16802",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16802"
},
{
"name" : "18755",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/18755" "url": "http://secunia.com/advisories/31493"
},
{
"name": "GLSA-200603-15",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200603-15.xml"
}, },
{ {
"name": "19187", "name": "19187",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19187" "url": "http://secunia.com/advisories/19187"
}, },
{
"name": "488",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/488"
},
{
"name": "DSA-996",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-996"
},
{
"name": "20060223 Vulnerability in Crypt::CBC Perl module, versions <= 2.16",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/425966/100/0/threaded"
},
{
"name": "SUSE-SR:2006:015",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2006_38_security.html"
},
{ {
"name": "19303", "name": "19303",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19303" "url": "http://secunia.com/advisories/19303"
}, },
{ {
"name" : "20899", "name": "18755",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/20899" "url": "http://secunia.com/advisories/18755"
}, },
{ {
"name" : "31493", "name": "16802",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/31493" "url": "http://www.securityfocus.com/bid/16802"
}, },
{ {
"name" : "488", "name": "RHSA-2008:0261",
"refsource" : "SREASON", "refsource": "REDHAT",
"url" : "http://securityreason.com/securityalert/488" "url": "http://www.redhat.com/support/errata/RHSA-2008-0261.html"
}, },
{ {
"name": "crypt-cbc-header-weak-encryption(24954)", "name": "crypt-cbc-header-weak-encryption(24954)",

View File

@ -53,64 +53,64 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060228 (PHP) imap functions bypass safemode and open_basedir restrictions", "name": "ADV-2006-0772",
"refsource" : "BUGTRAQ", "refsource": "VUPEN",
"url" : "http://www.securityfocus.com/archive/1/426339/100/0/threaded" "url": "http://www.vupen.com/english/advisories/2006/0772"
},
{
"name" : "http://bugs.php.net/bug.php?id=37265",
"refsource" : "CONFIRM",
"url" : "http://bugs.php.net/bug.php?id=37265"
},
{
"name" : "http://www.php.net/ChangeLog-5.php#5.1.5",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/ChangeLog-5.php#5.1.5"
}, },
{ {
"name": "http://www.php.net/release_5_1_5.php", "name": "http://www.php.net/release_5_1_5.php",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.php.net/release_5_1_5.php" "url": "http://www.php.net/release_5_1_5.php"
}, },
{
"name" : "MDKSA-2006:122",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:122"
},
{
"name" : "ADV-2006-0772",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0772"
},
{ {
"name": "23535", "name": "23535",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/23535" "url": "http://www.osvdb.org/23535"
}, },
{
"name" : "18694",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18694"
},
{ {
"name": "21050", "name": "21050",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21050" "url": "http://secunia.com/advisories/21050"
}, },
{
"name" : "21546",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21546"
},
{ {
"name": "516", "name": "516",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/516" "url": "http://securityreason.com/securityalert/516"
}, },
{
"name": "21546",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21546"
},
{
"name": "MDKSA-2006:122",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:122"
},
{
"name": "http://bugs.php.net/bug.php?id=37265",
"refsource": "CONFIRM",
"url": "http://bugs.php.net/bug.php?id=37265"
},
{ {
"name": "php-imap-restriction-bypass(24964)", "name": "php-imap-restriction-bypass(24964)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24964" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24964"
},
{
"name": "http://www.php.net/ChangeLog-5.php#5.1.5",
"refsource": "CONFIRM",
"url": "http://www.php.net/ChangeLog-5.php#5.1.5"
},
{
"name": "20060228 (PHP) imap functions bypass safemode and open_basedir restrictions",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/426339/100/0/threaded"
},
{
"name": "18694",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18694"
} }
] ]
} }

View File

@ -53,39 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060316 Oxynews Sql &#304;njection", "name": "23940",
"refsource" : "BUGTRAQ", "refsource": "OSVDB",
"url" : "http://www.securityfocus.com/archive/1/428057/100/0/threaded" "url": "http://www.osvdb.org/23940"
},
{
"name" : "http://biyosecurity.be/bugs/oxynews.txt",
"refsource" : "MISC",
"url" : "http://biyosecurity.be/bugs/oxynews.txt"
}, },
{ {
"name": "17132", "name": "17132",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/17132" "url": "http://www.securityfocus.com/bid/17132"
}, },
{
"name" : "ADV-2006-0976",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0976"
},
{
"name" : "23940",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/23940"
},
{ {
"name": "19255", "name": "19255",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19255" "url": "http://secunia.com/advisories/19255"
}, },
{
"name": "20060316 Oxynews Sql &#304;njection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/428057/100/0/threaded"
},
{ {
"name": "oxynews-index-sql-injection(25301)", "name": "oxynews-index-sql-injection(25301)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25301" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25301"
},
{
"name": "http://biyosecurity.be/bugs/oxynews.txt",
"refsource": "MISC",
"url": "http://biyosecurity.be/bugs/oxynews.txt"
},
{
"name": "ADV-2006-0976",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0976"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2006-1523", "ID": "CVE-2006-1523",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,45 +52,45 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "ADV-2006-2554",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2554"
},
{ {
"name": "[linux-kernel] 20060411 [PATCH] __group_complete_signal: remove bogus BUG_ON", "name": "[linux-kernel] 20060411 [PATCH] __group_complete_signal: remove bogus BUG_ON",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://marc.info/?l=linux-kernel&m=114476543426600&w=2" "url": "http://marc.info/?l=linux-kernel&m=114476543426600&w=2"
}, },
{
"name" : "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=188604",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=188604"
},
{
"name" : "DSA-1103",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1103"
},
{ {
"name": "SUSE-SA:2006:028", "name": "SUSE-SA:2006:028",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2006-05-31.html" "url": "http://www.novell.com/linux/security/advisories/2006-05-31.html"
}, },
{ {
"name" : "17640", "name": "DSA-1103",
"refsource" : "BID", "refsource": "DEBIAN",
"url" : "http://www.securityfocus.com/bid/17640" "url": "http://www.debian.org/security/2006/dsa-1103"
},
{
"name" : "ADV-2006-2554",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2554"
},
{
"name" : "20914",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20914"
}, },
{ {
"name": "20398", "name": "20398",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20398" "url": "http://secunia.com/advisories/20398"
},
{
"name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=188604",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=188604"
},
{
"name": "17640",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17640"
},
{
"name": "20914",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20914"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "ADV-2006-1384",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1384"
},
{
"name" : "24720",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/24720"
},
{ {
"name": "24721", "name": "24721",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -76,6 +66,16 @@
"name": "myevent-addevent-del-sql-injection(25886)", "name": "myevent-addevent-del-sql-injection(25886)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25886" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25886"
},
{
"name": "24720",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24720"
},
{
"name": "ADV-2006-1384",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1384"
} }
] ]
} }

View File

@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20061008 Freenews v1.1 <= (chemin) Remote File Include Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/448019/100/0/threaded"
},
{ {
"name": "2490", "name": "2490",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2490" "url": "https://www.exploit-db.com/exploits/2490"
}, },
{
"name" : "20405",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/20405"
},
{ {
"name": "1704", "name": "1704",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1704" "url": "http://securityreason.com/securityalert/1704"
}, },
{
"name": "20405",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20405"
},
{ {
"name": "freenews-moteur-file-include(29395)", "name": "freenews-moteur-file-include(29395)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29395" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29395"
},
{
"name": "20061008 Freenews v1.1 <= (chemin) Remote File Include Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/448019/100/0/threaded"
} }
] ]
} }

View File

@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20061031 Cross Site Scripting (XSS) Vulnerability in iPlanet Messaging Server Messenger Express by \"Sun\"", "name": "sun-messaging-expression-xss(29929)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/450184/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29929"
},
{
"name" : "20061031 Cross Site Scripting (XSS) Vulnerability in iPlanet Messaging Server Messenger Express by \"Sun\"",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050460.html"
}, },
{ {
"name": "20838", "name": "20838",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/20838" "url": "http://www.securityfocus.com/bid/20838"
}, },
{
"name": "20061031 Cross Site Scripting (XSS) Vulnerability in iPlanet Messaging Server Messenger Express by \"Sun\"",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050460.html"
},
{
"name": "20061031 Cross Site Scripting (XSS) Vulnerability in iPlanet Messaging Server Messenger Express by \"Sun\"",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/450184/100/0/threaded"
},
{ {
"name": "1806", "name": "1806",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1806" "url": "http://securityreason.com/securityalert/1806"
},
{
"name" : "sun-messaging-expression-xss(29929)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29929"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "20979",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20979"
},
{ {
"name": "20061120 Shopping_Catalog Remote File Include exploit", "name": "20061120 Shopping_Catalog Remote File Include exploit",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -61,11 +66,6 @@
"name": "2745", "name": "2745",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2745" "url": "https://www.exploit-db.com/exploits/2745"
},
{
"name" : "20979",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/20979"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "ADV-2006-4559", "name": "netjetserver-permissions-info-disclosure(30338)",
"refsource" : "VUPEN", "refsource": "XF",
"url" : "http://www.vupen.com/english/advisories/2006/4559" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30338"
}, },
{ {
"name": "22859", "name": "22859",
@ -63,9 +63,9 @@
"url": "http://secunia.com/advisories/22859" "url": "http://secunia.com/advisories/22859"
}, },
{ {
"name" : "netjetserver-permissions-info-disclosure(30338)", "name": "ADV-2006-4559",
"refsource" : "XF", "refsource": "VUPEN",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30338" "url": "http://www.vupen.com/english/advisories/2006/4559"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2010-0053", "ID": "CVE-2010-0053",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://support.apple.com/kb/HT4070", "name": "MDVSA-2011:039",
"refsource" : "CONFIRM", "refsource": "MANDRIVA",
"url" : "http://support.apple.com/kb/HT4070" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:039"
},
{
"name" : "http://support.apple.com/kb/HT4225",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4225"
}, },
{ {
"name": "APPLE-SA-2010-03-11-1", "name": "APPLE-SA-2010-03-11-1",
@ -68,55 +63,20 @@
"url": "http://lists.apple.com/archives/security-announce/2010/Mar/msg00000.html" "url": "http://lists.apple.com/archives/security-announce/2010/Mar/msg00000.html"
}, },
{ {
"name" : "APPLE-SA-2010-06-21-1", "name": "ADV-2010-2722",
"refsource" : "APPLE", "refsource": "VUPEN",
"url" : "http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html" "url": "http://www.vupen.com/english/advisories/2010/2722"
}, },
{ {
"name" : "FEDORA-2010-8360", "name": "43068",
"refsource" : "FEDORA", "refsource": "SECUNIA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041383.html" "url": "http://secunia.com/advisories/43068"
},
{
"name" : "FEDORA-2010-8379",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041432.html"
},
{
"name" : "FEDORA-2010-8423",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041436.html"
},
{
"name" : "MDVSA-2011:039",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:039"
},
{
"name" : "SUSE-SR:2011:002",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
}, },
{ {
"name": "USN-1006-1", "name": "USN-1006-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1006-1" "url": "http://www.ubuntu.com/usn/USN-1006-1"
}, },
{
"name" : "38671",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/38671"
},
{
"name" : "62948",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/62948"
},
{
"name" : "oval:org.mitre.oval:def:7323",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7323"
},
{ {
"name": "1023708", "name": "1023708",
"refsource": "SECTRACK", "refsource": "SECTRACK",
@ -127,25 +87,65 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41856" "url": "http://secunia.com/advisories/41856"
}, },
{
"name" : "43068",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43068"
},
{
"name" : "ADV-2010-2722",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/2722"
},
{ {
"name": "ADV-2011-0212", "name": "ADV-2011-0212",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0212" "url": "http://www.vupen.com/english/advisories/2011/0212"
}, },
{
"name": "http://support.apple.com/kb/HT4225",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4225"
},
{
"name": "FEDORA-2010-8360",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041383.html"
},
{
"name": "oval:org.mitre.oval:def:7323",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7323"
},
{
"name": "http://support.apple.com/kb/HT4070",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4070"
},
{
"name": "62948",
"refsource": "OSVDB",
"url": "http://osvdb.org/62948"
},
{
"name": "SUSE-SR:2011:002",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{ {
"name": "ADV-2011-0552", "name": "ADV-2011-0552",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0552" "url": "http://www.vupen.com/english/advisories/2011/0552"
},
{
"name": "FEDORA-2010-8379",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041432.html"
},
{
"name": "APPLE-SA-2010-06-21-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html"
},
{
"name": "38671",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/38671"
},
{
"name": "FEDORA-2010-8423",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041436.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2010-0135", "ID": "CVE-2010-0135",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://secunia.com/secunia_research/2010-31/",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2010-31/"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21440812",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21440812"
},
{ {
"name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100727_01", "name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100727_01",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -71,6 +61,16 @@
"name": "41928", "name": "41928",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/41928" "url": "http://www.securityfocus.com/bid/41928"
},
{
"name": "http://secunia.com/secunia_research/2010-31/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2010-31/"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2010-0544", "ID": "CVE-2010-0544",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.apple.com/kb/HT4196",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4196"
},
{ {
"name": "http://support.apple.com/kb/HT4220", "name": "http://support.apple.com/kb/HT4220",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -67,21 +62,66 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4225" "url": "http://support.apple.com/kb/HT4225"
}, },
{
"name" : "http://support.apple.com/kb/HT4456",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4456"
},
{ {
"name": "APPLE-SA-2010-06-07-1", "name": "APPLE-SA-2010-06-07-1",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html" "url": "http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html"
}, },
{
"name": "40196",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40196"
},
{
"name": "40105",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40105"
},
{
"name": "ADV-2010-1373",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1373"
},
{
"name": "oval:org.mitre.oval:def:6656",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6656"
},
{ {
"name": "APPLE-SA-2010-06-16-1", "name": "APPLE-SA-2010-06-16-1",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html" "url": "http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html"
}, },
{
"name": "42314",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42314"
},
{
"name": "ADV-2010-1512",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1512"
},
{
"name": "40620",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/40620"
},
{
"name": "http://support.apple.com/kb/HT4456",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4456"
},
{
"name": "1024067",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1024067"
},
{
"name": "http://support.apple.com/kb/HT4196",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4196"
},
{ {
"name": "APPLE-SA-2010-06-21-1", "name": "APPLE-SA-2010-06-21-1",
"refsource": "APPLE", "refsource": "APPLE",
@ -91,46 +131,6 @@
"name": "APPLE-SA-2010-11-22-1", "name": "APPLE-SA-2010-11-22-1",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html" "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"
},
{
"name" : "40620",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/40620"
},
{
"name" : "oval:org.mitre.oval:def:6656",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6656"
},
{
"name" : "1024067",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1024067"
},
{
"name" : "40105",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/40105"
},
{
"name" : "40196",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/40196"
},
{
"name" : "42314",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42314"
},
{
"name" : "ADV-2010-1373",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1373"
},
{
"name" : "ADV-2010-1512",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1512"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@ubuntu.com",
"ID": "CVE-2010-0825", "ID": "CVE-2010-0825",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://bugs.launchpad.net/ubuntu/+bug/531569",
"refsource" : "CONFIRM",
"url" : "https://bugs.launchpad.net/ubuntu/+bug/531569"
},
{ {
"name": "MDVSA-2010:083", "name": "MDVSA-2010:083",
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:083" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:083"
}, },
{
"name": "emacs-emailhelper-symlink(57457)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57457"
},
{ {
"name": "USN-919-1", "name": "USN-919-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
@ -77,15 +77,15 @@
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0734" "url": "http://www.vupen.com/english/advisories/2010/0734"
}, },
{
"name": "https://bugs.launchpad.net/ubuntu/+bug/531569",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/ubuntu/+bug/531569"
},
{ {
"name": "ADV-2010-0952", "name": "ADV-2010-0952",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0952" "url": "http://www.vupen.com/english/advisories/2010/0952"
},
{
"name" : "emacs-emailhelper-symlink(57457)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/57457"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2010-2218", "ID": "CVE-2010-2218",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "14835",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/14835"
},
{ {
"name": "http://packetstormsecurity.org/1008-exploits/mlecomsys-rfi.txt", "name": "http://packetstormsecurity.org/1008-exploits/mlecomsys-rfi.txt",
"refsource": "MISC", "refsource": "MISC",
@ -66,6 +61,11 @@
"name": "mlecs-multiple-file-include(61464)", "name": "mlecs-multiple-file-include(61464)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61464" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61464"
},
{
"name": "14835",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/14835"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3294", "ID": "CVE-2010-3294",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,34 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20100914 CVE request: xss in pecl-apc before 3.1.4", "name": "http://pecl.php.net/package-changelog.php?package=APC&release=3.1.4",
"refsource" : "MLIST", "refsource": "CONFIRM",
"url" : "http://www.openwall.com/lists/oss-security/2010/09/14/1" "url": "http://pecl.php.net/package-changelog.php?package=APC&release=3.1.4"
},
{
"name": "ADV-2010-2406",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2406"
}, },
{ {
"name": "[oss-security] 20100914 Re: CVE request: xss in pecl-apc before 3.1.4", "name": "[oss-security] 20100914 Re: CVE request: xss in pecl-apc before 3.1.4",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/09/14/6" "url": "http://www.openwall.com/lists/oss-security/2010/09/14/6"
}, },
{
"name" : "[oss-security] 20100914 Re: CVE request: xss in pecl-apc before 3.1.4",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2010/09/14/8"
},
{
"name" : "http://pecl.php.net/package-changelog.php?package=APC&release=3.1.4",
"refsource" : "CONFIRM",
"url" : "http://pecl.php.net/package-changelog.php?package=APC&release=3.1.4"
},
{ {
"name": "RHSA-2012:0811", "name": "RHSA-2012:0811",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0811.html" "url": "http://rhn.redhat.com/errata/RHSA-2012-0811.html"
}, },
{ {
"name" : "ADV-2010-2406", "name": "[oss-security] 20100914 CVE request: xss in pecl-apc before 3.1.4",
"refsource" : "VUPEN", "refsource": "MLIST",
"url" : "http://www.vupen.com/english/advisories/2010/2406" "url": "http://www.openwall.com/lists/oss-security/2010/09/14/1"
},
{
"name": "[oss-security] 20100914 Re: CVE request: xss in pecl-apc before 3.1.4",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/09/14/8"
} }
] ]
} }

View File

@ -53,9 +53,19 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21446455", "name": "43291",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21446455" "url": "http://www.securityfocus.com/bid/43291"
},
{
"name": "oval:org.mitre.oval:def:14669",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14669"
},
{
"name": "ibm-db2-public-security-bypass(61872)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61872"
}, },
{ {
"name": "IC68015", "name": "IC68015",
@ -63,19 +73,9 @@
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC68015" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC68015"
}, },
{ {
"name" : "43291", "name": "ADV-2010-2425",
"refsource" : "BID", "refsource": "VUPEN",
"url" : "http://www.securityfocus.com/bid/43291" "url": "http://www.vupen.com/english/advisories/2010/2425"
},
{
"name" : "68121",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/68121"
},
{
"name" : "oval:org.mitre.oval:def:14669",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14669"
}, },
{ {
"name": "1024457", "name": "1024457",
@ -88,14 +88,14 @@
"url": "http://secunia.com/advisories/41444" "url": "http://secunia.com/advisories/41444"
}, },
{ {
"name" : "ADV-2010-2425", "name": "68121",
"refsource" : "VUPEN", "refsource": "OSVDB",
"url" : "http://www.vupen.com/english/advisories/2010/2425" "url": "http://osvdb.org/68121"
}, },
{ {
"name" : "ibm-db2-public-security-bypass(61872)", "name": "http://www.ibm.com/support/docview.wss?uid=swg21446455",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/61872" "url": "http://www.ibm.com/support/docview.wss?uid=swg21446455"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2010-4473", "ID": "CVE-2010-4473",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html", "name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html" "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html"
}, },
{ {
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html", "name": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html",
@ -63,15 +63,60 @@
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html" "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html"
}, },
{ {
"name" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html", "name": "HPSBMU02799",
"refsource" : "CONFIRM", "refsource": "HP",
"url" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html" "url": "http://marc.info/?l=bugtraq&m=134254866602253&w=2"
}, },
{ {
"name" : "HPSBMU02797", "name": "SUSE-SU-2011:0823",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html"
},
{
"name": "oval:org.mitre.oval:def:12952",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12952"
},
{
"name": "44954",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44954"
},
{
"name": "RHSA-2011:0880",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0880.html"
},
{
"name": "RHSA-2011:0282",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0282.html"
},
{
"name": "SSRT100867",
"refsource": "HP", "refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=134254957702612&w=2" "url": "http://marc.info/?l=bugtraq&m=134254957702612&w=2"
}, },
{
"name": "49198",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49198"
},
{
"name": "oval:org.mitre.oval:def:14119",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14119"
},
{
"name": "SUSE-SA:2011:024",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html"
},
{ {
"name": "HPSBUX02777", "name": "HPSBUX02777",
"refsource": "HP", "refsource": "HP",
@ -83,54 +128,9 @@
"url": "http://marc.info/?l=bugtraq&m=133728004526190&w=2" "url": "http://marc.info/?l=bugtraq&m=133728004526190&w=2"
}, },
{ {
"name" : "SSRT100867", "name": "HPSBMU02797",
"refsource": "HP", "refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=134254957702612&w=2" "url": "http://marc.info/?l=bugtraq&m=134254957702612&w=2"
},
{
"name" : "HPSBMU02799",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=134254866602253&w=2"
},
{
"name" : "RHSA-2011:0282",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0282.html"
},
{
"name" : "RHSA-2011:0880",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0880.html"
},
{
"name" : "SUSE-SA:2011:024",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html"
},
{
"name" : "SUSE-SU-2011:0823",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html"
},
{
"name" : "oval:org.mitre.oval:def:12952",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12952"
},
{
"name" : "oval:org.mitre.oval:def:14119",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14119"
},
{
"name" : "44954",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/44954"
},
{
"name" : "49198",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/49198"
} }
] ]
} }

View File

@ -53,34 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20141121 FluxBB <= 1.5.6 SQL Injection", "name": "http://fluxbb.org/forums/viewtopic.php?id=8001",
"refsource" : "FULLDISC", "refsource": "CONFIRM",
"url" : "http://seclists.org/fulldisclosure/2014/Nov/73" "url": "http://fluxbb.org/forums/viewtopic.php?id=8001"
}, },
{ {
"name": "http://packetstormsecurity.com/files/129225/FluxBB-1.5.6-SQL-Injection.html", "name": "http://packetstormsecurity.com/files/129225/FluxBB-1.5.6-SQL-Injection.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/129225/FluxBB-1.5.6-SQL-Injection.html" "url": "http://packetstormsecurity.com/files/129225/FluxBB-1.5.6-SQL-Injection.html"
}, },
{
"name" : "http://fluxbb.org/forums/viewtopic.php?id=8001",
"refsource" : "CONFIRM",
"url" : "http://fluxbb.org/forums/viewtopic.php?id=8001"
},
{
"name" : "https://fluxbb.org/development/core/tickets/990/",
"refsource" : "CONFIRM",
"url" : "https://fluxbb.org/development/core/tickets/990/"
},
{ {
"name": "59038", "name": "59038",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59038" "url": "http://secunia.com/advisories/59038"
}, },
{
"name": "20141121 FluxBB <= 1.5.6 SQL Injection",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Nov/73"
},
{ {
"name": "fluxbb-profile-sql-injection(98890)", "name": "fluxbb-profile-sql-injection(98890)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98890" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98890"
},
{
"name": "https://fluxbb.org/development/core/tickets/990/",
"refsource": "CONFIRM",
"url": "https://fluxbb.org/development/core/tickets/990/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-3322", "ID": "CVE-2014-3322",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=35009", "name": "60311",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=35009" "url": "http://secunia.com/advisories/60311"
},
{
"name": "1030623",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030623"
}, },
{ {
"name": "20140722 Cisco IOS XR Software NetFlow Processing Denial of Service Vulnerability", "name": "20140722 Cisco IOS XR Software NetFlow Processing Denial of Service Vulnerability",
@ -68,14 +73,9 @@
"url": "http://www.securityfocus.com/bid/68833" "url": "http://www.securityfocus.com/bid/68833"
}, },
{ {
"name" : "1030623", "name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35009",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1030623" "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35009"
},
{
"name" : "60311",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/60311"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-3712", "ID": "CVE-2014-3712",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20141022 CVE-2014-3712 Katello: user parameters passed to to_sym", "name": "70707",
"refsource" : "MLIST", "refsource": "BID",
"url" : "http://seclists.org/oss-sec/2014/q4/419" "url": "http://www.securityfocus.com/bid/70707"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1155708", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1155708",
"refsource": "MISC", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1155708" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1155708"
}, },
{
"name" : "70707",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/70707"
},
{ {
"name": "katello-cve20143712-dos(97724)", "name": "katello-cve20143712-dos(97724)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97724" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97724"
},
{
"name": "[oss-security] 20141022 CVE-2014-3712 Katello: user parameters passed to to_sym",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2014/q4/419"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://www.drupal.org/node/2288353",
"refsource" : "MISC",
"url" : "https://www.drupal.org/node/2288353"
},
{ {
"name": "https://www.drupal.org/node/2286121", "name": "https://www.drupal.org/node/2286121",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.drupal.org/node/2286121" "url": "https://www.drupal.org/node/2286121"
}, },
{
"name" : "68106",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/68106"
},
{ {
"name": "59379", "name": "59379",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59379" "url": "http://secunia.com/advisories/59379"
},
{
"name": "https://www.drupal.org/node/2288353",
"refsource": "MISC",
"url": "https://www.drupal.org/node/2288353"
},
{
"name": "68106",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/68106"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20140708 Re: CVE request: WordPress plugin wysija-newsletters remote file upload",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/07/08/7"
},
{ {
"name": "https://wordpress.org/plugins/wysija-newsletters/changelog/", "name": "https://wordpress.org/plugins/wysija-newsletters/changelog/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://wordpress.org/plugins/wysija-newsletters/changelog/" "url": "https://wordpress.org/plugins/wysija-newsletters/changelog/"
},
{
"name": "[oss-security] 20140708 Re: CVE request: WordPress plugin wysija-newsletters remote file upload",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/07/08/7"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-8030", "ID": "CVE-2014-8030",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20150108 Cisco WebEx Meetings Server Cross-Site Scripting Vulnerability", "name": "cisco-webex-cve20148030-xss(100574)",
"refsource" : "CISCO", "refsource": "XF",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8030" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100574"
},
{
"name" : "71945",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/71945"
}, },
{ {
"name": "1031517", "name": "1031517",
@ -73,9 +68,14 @@
"url": "http://secunia.com/advisories/62163" "url": "http://secunia.com/advisories/62163"
}, },
{ {
"name" : "cisco-webex-cve20148030-xss(100574)", "name": "20150108 Cisco WebEx Meetings Server Cross-Site Scripting Vulnerability",
"refsource" : "XF", "refsource": "CISCO",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/100574" "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8030"
},
{
"name": "71945",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/71945"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-8174", "ID": "CVE-2014-8174",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "70837",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/70837"
},
{ {
"name": "https://int21.de/cve/CVE-2014-8562-ImageMagick-dcm-oob-heap-overflow.html", "name": "https://int21.de/cve/CVE-2014-8562-ImageMagick-dcm-oob-heap-overflow.html",
"refsource": "MISC", "refsource": "MISC",
@ -66,11 +71,6 @@
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1159362", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1159362",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1159362" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1159362"
},
{
"name" : "70837",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/70837"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-8576", "ID": "CVE-2014-8576",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-8890", "ID": "CVE-2014-8890",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21690185",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21690185"
},
{ {
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21963275", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21963275",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963275" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963275"
}, },
{
"name": "1033384",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033384"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21690185",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21690185"
},
{ {
"name": "PI29911", "name": "PI29911",
"refsource": "AIXAPAR", "refsource": "AIXAPAR",
@ -72,11 +77,6 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/71834" "url": "http://www.securityfocus.com/bid/71834"
}, },
{
"name" : "1033384",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1033384"
},
{ {
"name": "ibm-websphere-cve20148890-priv-escalation(99009)", "name": "ibm-websphere-cve20148890-priv-escalation(99009)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "DSA-3508",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3508"
},
{ {
"name": "[oss-security] 20160303 Security issues in JasPer (CVE-2016-1577 and CVE-2016-2116)", "name": "[oss-security] 20160303 Security issues in JasPer (CVE-2016-1577 and CVE-2016-2116)",
"refsource": "MLIST", "refsource": "MLIST",
@ -63,20 +68,15 @@
"url": "https://bugs.launchpad.net/ubuntu/+source/jasper/+bug/1547865" "url": "https://bugs.launchpad.net/ubuntu/+source/jasper/+bug/1547865"
}, },
{ {
"name" : "DSA-3508", "name": "USN-2919-1",
"refsource" : "DEBIAN", "refsource": "UBUNTU",
"url" : "http://www.debian.org/security/2016/dsa-3508" "url": "http://www.ubuntu.com/usn/USN-2919-1"
}, },
{ {
"name": "RHSA-2017:1208", "name": "RHSA-2017:1208",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1208" "url": "https://access.redhat.com/errata/RHSA-2017:1208"
}, },
{
"name" : "USN-2919-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2919-1"
},
{ {
"name": "84133", "name": "84133",
"refsource": "BID", "refsource": "BID",

View File

@ -65,16 +65,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/113937",
"refsource" : "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/113937"
},
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg22006439",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22006439"
},
{ {
"name": "100599", "name": "100599",
"refsource": "BID", "refsource": "BID",
@ -84,6 +74,16 @@
"name": "1039231", "name": "1039231",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039231" "url": "http://www.securitytracker.com/id/1039231"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg22006439",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg22006439"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/113937",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/113937"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2016-2986", "ID": "CVE-2016-2986",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://blog.spip.net/Mise-a-jour-CRITIQUE-de-securite-Sortie-de-SPIP-3-1-1-SPIP-3-0-22-et-SPIP-2-1.html?lang=fr" "url": "https://blog.spip.net/Mise-a-jour-CRITIQUE-de-securite-Sortie-de-SPIP-3-1-1-SPIP-3-0-22-et-SPIP-2-1.html?lang=fr"
}, },
{
"name" : "https://core.spip.net/projects/spip/repository/revisions/22903",
"refsource" : "CONFIRM",
"url" : "https://core.spip.net/projects/spip/repository/revisions/22903"
},
{ {
"name": "DSA-3518", "name": "DSA-3518",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3518" "url": "http://www.debian.org/security/2016/dsa-3518"
},
{
"name": "https://core.spip.net/projects/spip/repository/revisions/22903",
"refsource": "CONFIRM",
"url": "https://core.spip.net/projects/spip/repository/revisions/22903"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-3217", "ID": "CVE-2016-3217",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-3290", "ID": "CVE-2016-3290",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS16-095",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-095"
},
{ {
"name": "92322", "name": "92322",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/92322" "url": "http://www.securityfocus.com/bid/92322"
}, },
{
"name": "MS16-095",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-095"
},
{ {
"name": "1036562", "name": "1036562",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2016-3754", "ID": "CVE-2016-3754",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://android.googlesource.com/platform/frameworks/av/+/e7142a0703bc93f75e213e96ebc19000022afed9",
"refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/frameworks/av/+/e7142a0703bc93f75e213e96ebc19000022afed9"
},
{ {
"name": "http://source.android.com/security/bulletin/2016-07-01.html", "name": "http://source.android.com/security/bulletin/2016-07-01.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "https://android.googlesource.com/platform/frameworks/av/+/6fdee2a83432b3b150d6a34f231c4e2f7353c01e", "name": "https://android.googlesource.com/platform/frameworks/av/+/6fdee2a83432b3b150d6a34f231c4e2f7353c01e",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/frameworks/av/+/6fdee2a83432b3b150d6a34f231c4e2f7353c01e" "url": "https://android.googlesource.com/platform/frameworks/av/+/6fdee2a83432b3b150d6a34f231c4e2f7353c01e"
},
{
"name" : "https://android.googlesource.com/platform/frameworks/av/+/e7142a0703bc93f75e213e96ebc19000022afed9",
"refsource" : "CONFIRM",
"url" : "https://android.googlesource.com/platform/frameworks/av/+/e7142a0703bc93f75e213e96ebc19000022afed9"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2016-3876", "ID": "CVE-2016-3876",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://source.android.com/security/bulletin/2016-09-01.html",
"refsource" : "CONFIRM",
"url" : "http://source.android.com/security/bulletin/2016-09-01.html"
},
{ {
"name": "https://android.googlesource.com/platform/frameworks/base/+/91fc934bb2e5ea59929bb2f574de6db9b5100745", "name": "https://android.googlesource.com/platform/frameworks/base/+/91fc934bb2e5ea59929bb2f574de6db9b5100745",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/frameworks/base/+/91fc934bb2e5ea59929bb2f574de6db9b5100745" "url": "https://android.googlesource.com/platform/frameworks/base/+/91fc934bb2e5ea59929bb2f574de6db9b5100745"
}, },
{ {
"name" : "92819", "name": "http://source.android.com/security/bulletin/2016-09-01.html",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/92819" "url": "http://source.android.com/security/bulletin/2016-09-01.html"
}, },
{ {
"name": "1036763", "name": "1036763",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036763" "url": "http://www.securitytracker.com/id/1036763"
},
{
"name": "92819",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92819"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "http://www.openbsd.org/errata59.html",
"refsource": "CONFIRM",
"url": "http://www.openbsd.org/errata59.html"
},
{ {
"name": "[oss-security] 20160714 Multiple Bugs in OpenBSD Kernel", "name": "[oss-security] 20160714 Multiple Bugs in OpenBSD Kernel",
"refsource": "MLIST", "refsource": "MLIST",
@ -67,11 +72,6 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.openbsd.org/errata58.html" "url": "http://www.openbsd.org/errata58.html"
}, },
{
"name" : "http://www.openbsd.org/errata59.html",
"refsource" : "CONFIRM",
"url" : "http://www.openbsd.org/errata59.html"
},
{ {
"name": "91805", "name": "91805",
"refsource": "BID", "refsource": "BID",

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "http://www.openbsd.org/errata59.html",
"refsource": "CONFIRM",
"url": "http://www.openbsd.org/errata59.html"
},
{ {
"name": "[oss-security] 20160714 Multiple Bugs in OpenBSD Kernel", "name": "[oss-security] 20160714 Multiple Bugs in OpenBSD Kernel",
"refsource": "MLIST", "refsource": "MLIST",
@ -67,11 +72,6 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.openbsd.org/errata58.html" "url": "http://www.openbsd.org/errata58.html"
}, },
{
"name" : "http://www.openbsd.org/errata59.html",
"refsource" : "CONFIRM",
"url" : "http://www.openbsd.org/errata59.html"
},
{ {
"name": "91805", "name": "91805",
"refsource": "BID", "refsource": "BID",

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html", "name": "SUSE-SU-2016:3148",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html"
},
{
"name" : "GLSA-201701-17",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201701-17"
}, },
{ {
"name": "MS16-154", "name": "MS16-154",
@ -68,19 +63,14 @@
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-154" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-154"
}, },
{ {
"name" : "RHSA-2016:2947", "name": "GLSA-201701-17",
"refsource" : "REDHAT", "refsource": "GENTOO",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2947.html" "url": "https://security.gentoo.org/glsa/201701-17"
}, },
{ {
"name" : "SUSE-SU-2016:3148", "name": "1037442",
"refsource" : "SUSE", "refsource": "SECTRACK",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html" "url": "http://www.securitytracker.com/id/1037442"
},
{
"name" : "openSUSE-SU-2016:3160",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html"
}, },
{ {
"name": "94866", "name": "94866",
@ -88,9 +78,19 @@
"url": "http://www.securityfocus.com/bid/94866" "url": "http://www.securityfocus.com/bid/94866"
}, },
{ {
"name" : "1037442", "name": "RHSA-2016:2947",
"refsource" : "SECTRACK", "refsource": "REDHAT",
"url" : "http://www.securitytracker.com/id/1037442" "url": "http://rhn.redhat.com/errata/RHSA-2016-2947.html"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html"
},
{
"name": "openSUSE-SU-2016:3160",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html"
} }
] ]
} }

View File

@ -53,34 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1494526.html", "name": "1037755",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1494526.html" "url": "http://www.securitytracker.com/id/1037755"
}, },
{ {
"name": "DSA-3775", "name": "DSA-3775",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3775" "url": "http://www.debian.org/security/2017/dsa-3775"
}, },
{
"name" : "GLSA-201702-30",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201702-30"
},
{ {
"name": "RHSA-2017:1871", "name": "RHSA-2017:1871",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1871" "url": "https://access.redhat.com/errata/RHSA-2017:1871"
}, },
{
"name": "https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1494526.html",
"refsource": "CONFIRM",
"url": "https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1494526.html"
},
{ {
"name": "95852", "name": "95852",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/95852" "url": "http://www.securityfocus.com/bid/95852"
}, },
{ {
"name" : "1037755", "name": "GLSA-201702-30",
"refsource" : "SECTRACK", "refsource": "GENTOO",
"url" : "http://www.securitytracker.com/id/1037755" "url": "https://security.gentoo.org/glsa/201702-30"
} }
] ]
} }

View File

@ -53,34 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1494526.html", "name": "1037755",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1494526.html" "url": "http://www.securitytracker.com/id/1037755"
}, },
{ {
"name": "DSA-3775", "name": "DSA-3775",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3775" "url": "http://www.debian.org/security/2017/dsa-3775"
}, },
{
"name" : "GLSA-201702-30",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201702-30"
},
{ {
"name": "RHSA-2017:1871", "name": "RHSA-2017:1871",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1871" "url": "https://access.redhat.com/errata/RHSA-2017:1871"
}, },
{
"name": "https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1494526.html",
"refsource": "CONFIRM",
"url": "https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1494526.html"
},
{ {
"name": "95852", "name": "95852",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/95852" "url": "http://www.securityfocus.com/bid/95852"
}, },
{ {
"name" : "1037755", "name": "GLSA-201702-30",
"refsource" : "SECTRACK", "refsource": "GENTOO",
"url" : "http://www.securitytracker.com/id/1037755" "url": "https://security.gentoo.org/glsa/201702-30"
} }
] ]
} }