"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 01:14:39 +00:00
parent a30100a976
commit 44074307cc
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
66 changed files with 4169 additions and 4169 deletions

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20001212 Stack too ;) Re: [pkc] remote heap buffer overflow in oops",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-12/0158.html"
},
{ {
"name": "2099", "name": "2099",
"refsource": "BID", "refsource": "BID",
@ -71,6 +66,11 @@
"name": "oops-dns-bo(6122)", "name": "oops-dns-bo(6122)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6122" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6122"
},
{
"name": "20001212 Stack too ;) Re: [pkc] remote heap buffer overflow in oops",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0158.html"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20010423 (SRPRE00001) phpMyAdmin 2.1.0 and phpPgAdmin 2.2.1",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0396.html"
},
{ {
"name": "2642", "name": "2642",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/2642" "url": "http://www.securityfocus.com/bid/2642"
},
{
"name": "20010423 (SRPRE00001) phpMyAdmin 2.1.0 and phpPgAdmin 2.2.1",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-04/0396.html"
} }
] ]
} }

View File

@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20010802 vulnerability in otrcrep binary in Oracle 8.0.5.",
"refsource" : "BUGTRAQ",
"url" : "http://online.securityfocus.com/archive/1/201295"
},
{ {
"name": "20011023 FW: ASI Oracle Security Alert: 3 new security alerts", "name": "20011023 FW: ASI Oracle Security Alert: 3 new security alerts",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=100386756715645&w=2" "url": "http://marc.info/?l=bugtraq&m=100386756715645&w=2"
}, },
{ {
"name" : "20011024 Oracle Trace Collection Security Vulnerability", "name": "3139",
"refsource" : "BUGTRAQ", "refsource": "BID",
"url" : "http://online.securityfocus.com/archive/1/222612" "url": "http://www.securityfocus.com/bid/3139"
},
{
"name" : "http://otn.oracle.com/deploy/security/pdf/otrcrep.pdf",
"refsource" : "CONFIRM",
"url" : "http://otn.oracle.com/deploy/security/pdf/otrcrep.pdf"
}, },
{ {
"name": "M-011", "name": "M-011",
"refsource": "CIAC", "refsource": "CIAC",
"url": "http://www.ciac.org/ciac/bulletins/m-011.shtml" "url": "http://www.ciac.org/ciac/bulletins/m-011.shtml"
}, },
{
"name": "20010802 vulnerability in otrcrep binary in Oracle 8.0.5.",
"refsource": "BUGTRAQ",
"url": "http://online.securityfocus.com/archive/1/201295"
},
{ {
"name": "oracle-binary-symlink(6940)", "name": "oracle-binary-symlink(6940)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6940" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6940"
}, },
{ {
"name" : "3139", "name": "http://otn.oracle.com/deploy/security/pdf/otrcrep.pdf",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/3139" "url": "http://otn.oracle.com/deploy/security/pdf/otrcrep.pdf"
},
{
"name": "20011024 Oracle Trace Collection Security Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://online.securityfocus.com/archive/1/222612"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20080202 Wordpress Plugin dmsguestbook 1.7.0 Multiple Remote Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/487437/100/0/threaded"
},
{
"name" : "5035",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/5035"
},
{ {
"name": "27575", "name": "27575",
"refsource": "BID", "refsource": "BID",
@ -71,6 +61,16 @@
"name": "3615", "name": "3615",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3615" "url": "http://securityreason.com/securityalert/3615"
},
{
"name": "20080202 Wordpress Plugin dmsguestbook 1.7.0 Multiple Remote Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/487437/100/0/threaded"
},
{
"name": "5035",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5035"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1019727",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019727"
},
{ {
"name": "HPSBOV02278", "name": "HPSBOV02278",
"refsource": "HP", "refsource": "HP",
@ -62,21 +67,11 @@
"refsource": "HP", "refsource": "HP",
"url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01414022" "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01414022"
}, },
{
"name" : "28486",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28486"
},
{ {
"name": "ADV-2008-1009", "name": "ADV-2008-1009",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1009" "url": "http://www.vupen.com/english/advisories/2008/1009"
}, },
{
"name" : "1019727",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1019727"
},
{ {
"name": "29566", "name": "29566",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -86,6 +81,11 @@
"name": "openvms-sshserver-unauthorized-access(41519)", "name": "openvms-sshserver-unauthorized-access(41519)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41519" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41519"
},
{
"name": "28486",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28486"
} }
] ]
} }

View File

@ -52,90 +52,50 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20080212 Cacti 0.8.7a Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/488018/100/0/threaded"
},
{
"name" : "20080212 cacti -- Multiple security vulnerabilities have been discovered",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/488013/100/0/threaded"
},
{
"name" : "http://www.cacti.net/release_notes_0_8_7b.php",
"refsource" : "CONFIRM",
"url" : "http://www.cacti.net/release_notes_0_8_7b.php"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=432758",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=432758"
},
{
"name" : "DSA-1569",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1569"
},
{
"name" : "FEDORA-2008-1699",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00570.html"
},
{ {
"name": "FEDORA-2008-1737", "name": "FEDORA-2008-1737",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00593.html" "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00593.html"
}, },
{
"name" : "GLSA-200803-18",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200803-18.xml"
},
{
"name" : "MDVSA-2008:052",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:052"
},
{
"name" : "SUSE-SR:2008:005",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html"
},
{
"name" : "27749",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/27749"
},
{
"name" : "ADV-2008-0540",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0540"
},
{
"name" : "1019414",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1019414"
},
{
"name" : "28872",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28872"
},
{
"name" : "28976",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28976"
},
{ {
"name": "29242", "name": "29242",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29242" "url": "http://secunia.com/advisories/29242"
}, },
{ {
"name" : "29274", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=432758",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432758"
},
{
"name": "3657",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3657"
},
{
"name": "SUSE-SR:2008:005",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html"
},
{
"name": "GLSA-200803-18",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200803-18.xml"
},
{
"name": "28872",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/29274" "url": "http://secunia.com/advisories/28872"
},
{
"name": "MDVSA-2008:052",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:052"
},
{
"name": "http://www.cacti.net/release_notes_0_8_7b.php",
"refsource": "CONFIRM",
"url": "http://www.cacti.net/release_notes_0_8_7b.php"
}, },
{ {
"name": "30045", "name": "30045",
@ -143,9 +103,49 @@
"url": "http://secunia.com/advisories/30045" "url": "http://secunia.com/advisories/30045"
}, },
{ {
"name" : "3657", "name": "29274",
"refsource" : "SREASON", "refsource": "SECUNIA",
"url" : "http://securityreason.com/securityalert/3657" "url": "http://secunia.com/advisories/29274"
},
{
"name": "20080212 cacti -- Multiple security vulnerabilities have been discovered",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/488013/100/0/threaded"
},
{
"name": "ADV-2008-0540",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0540"
},
{
"name": "27749",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27749"
},
{
"name": "DSA-1569",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1569"
},
{
"name": "28976",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28976"
},
{
"name": "FEDORA-2008-1699",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00570.html"
},
{
"name": "1019414",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019414"
},
{
"name": "20080212 Cacti 0.8.7a Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/488018/100/0/threaded"
} }
] ]
} }

View File

@ -52,50 +52,50 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://docs.info.apple.com/article.html?artnum=307563",
"refsource" : "CONFIRM",
"url" : "http://docs.info.apple.com/article.html?artnum=307563"
},
{
"name" : "APPLE-SA-2008-03-18",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2008/Mar/msg00000.html"
},
{
"name" : "TA08-079A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-079A.html"
},
{ {
"name": "28347", "name": "28347",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/28347" "url": "http://www.securityfocus.com/bid/28347"
}, },
{
"name" : "28290",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28290"
},
{
"name" : "ADV-2008-0920",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0920/references"
},
{ {
"name": "1019653", "name": "1019653",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019653" "url": "http://www.securitytracker.com/id?1019653"
}, },
{ {
"name" : "29393", "name": "TA08-079A",
"refsource" : "SECUNIA", "refsource": "CERT",
"url" : "http://secunia.com/advisories/29393" "url": "http://www.us-cert.gov/cas/techalerts/TA08-079A.html"
},
{
"name": "APPLE-SA-2008-03-18",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00000.html"
}, },
{ {
"name": "safari-webinspector-security-bypass(41331)", "name": "safari-webinspector-security-bypass(41331)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41331" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41331"
},
{
"name": "28290",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28290"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=307563",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=307563"
},
{
"name": "ADV-2008-0920",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0920/references"
},
{
"name": "29393",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29393"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "29158",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29158"
},
{ {
"name": "http://www.centreon.com/Product/Changelog-Centreon-1.4.x.html", "name": "http://www.centreon.com/Product/Changelog-Centreon-1.4.x.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -62,11 +67,6 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/28043" "url": "http://www.securityfocus.com/bid/28043"
}, },
{
"name" : "29158",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29158"
},
{ {
"name": "centreon-colorpicker-xss(40924)", "name": "centreon-colorpicker-xss(40924)",
"refsource": "XF", "refsource": "XF",

View File

@ -53,34 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "APPLE-SA-2008-05-28", "name": "30775",
"refsource" : "APPLE", "refsource": "SECUNIA",
"url" : "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" "url": "http://secunia.com/advisories/30775"
},
{
"name" : "APPLE-SA-2008-06-19",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2008//Jun/msg00001.html"
},
{
"name" : "TA08-150A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-150A.html"
},
{
"name" : "29412",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/29412"
},
{
"name" : "29513",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/29513"
},
{
"name" : "ADV-2008-1697",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/1697"
}, },
{ {
"name": "ADV-2008-1882", "name": "ADV-2008-1882",
@ -88,9 +63,9 @@
"url": "http://www.vupen.com/english/advisories/2008/1882/references" "url": "http://www.vupen.com/english/advisories/2008/1882/references"
}, },
{ {
"name" : "1020144", "name": "TA08-150A",
"refsource" : "SECTRACK", "refsource": "CERT",
"url" : "http://securitytracker.com/id?1020144" "url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html"
}, },
{ {
"name": "30430", "name": "30430",
@ -98,14 +73,39 @@
"url": "http://secunia.com/advisories/30430" "url": "http://secunia.com/advisories/30430"
}, },
{ {
"name" : "30775", "name": "APPLE-SA-2008-05-28",
"refsource" : "SECUNIA", "refsource": "APPLE",
"url" : "http://secunia.com/advisories/30775" "url": "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html"
},
{
"name": "1020144",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1020144"
}, },
{ {
"name": "macosx-imageio-information-disclosure(42721)", "name": "macosx-imageio-information-disclosure(42721)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42721" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42721"
},
{
"name": "APPLE-SA-2008-06-19",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00001.html"
},
{
"name": "ADV-2008-1697",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1697"
},
{
"name": "29513",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29513"
},
{
"name": "29412",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29412"
} }
] ]
} }

View File

@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "5389",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/5389"
},
{
"name" : "28640",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28640"
},
{
"name" : "29701",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29701"
},
{ {
"name": "ADV-2008-1116", "name": "ADV-2008-1116",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -76,6 +61,21 @@
"name": "prozillacheats-viewreviews-sql-injection(41673)", "name": "prozillacheats-viewreviews-sql-injection(41673)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41673" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41673"
},
{
"name": "29701",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29701"
},
{
"name": "28640",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28640"
},
{
"name": "5389",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5389"
} }
] ]
} }

View File

@ -53,15 +53,25 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://bugzilla.novell.com/show_bug.cgi?id=373853", "name": "30947",
"refsource" : "MISC", "refsource": "BID",
"url" : "https://bugzilla.novell.com/show_bug.cgi?id=373853" "url": "http://www.securityfocus.com/bid/30947"
}, },
{ {
"name": "http://www.novell.com/support/viewContent.do?externalId=3426981", "name": "http://www.novell.com/support/viewContent.do?externalId=3426981",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.novell.com/support/viewContent.do?externalId=3426981" "url": "http://www.novell.com/support/viewContent.do?externalId=3426981"
}, },
{
"name": "1020788",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020788"
},
{
"name": "novell-edirectory-extensiblematch-dos(43590)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43590"
},
{ {
"name": "http://www.novell.com/documentation/edir873/sp10_readme/netware/readme.txt", "name": "http://www.novell.com/documentation/edir873/sp10_readme/netware/readme.txt",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -73,24 +83,14 @@
"url": "http://www.novell.com/support/viewContent.do?externalId=3477912" "url": "http://www.novell.com/support/viewContent.do?externalId=3477912"
}, },
{ {
"name" : "30947", "name": "https://bugzilla.novell.com/show_bug.cgi?id=373853",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/30947" "url": "https://bugzilla.novell.com/show_bug.cgi?id=373853"
},
{
"name" : "1020788",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1020788"
}, },
{ {
"name": "ADV-2008-2462", "name": "ADV-2008-2462",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2462" "url": "http://www.vupen.com/english/advisories/2008/2462"
},
{
"name" : "novell-edirectory-extensiblematch-dos(43590)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43590"
} }
] ]
} }

View File

@ -57,11 +57,26 @@
"refsource": "SUNALERT", "refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-243386-1" "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-243386-1"
}, },
{
"name": "32606",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32606"
},
{ {
"name": "32262", "name": "32262",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/32262" "url": "http://www.securityfocus.com/bid/32262"
}, },
{
"name": "ADV-2008-3128",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/3128"
},
{
"name": "sun-jsim-frames-xss(46555)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46555"
},
{ {
"name": "49769", "name": "49769",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -71,21 +86,6 @@
"name": "1021170", "name": "1021170",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021170" "url": "http://www.securitytracker.com/id?1021170"
},
{
"name" : "ADV-2008-3128",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/3128"
},
{
"name" : "32606",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32606"
},
{
"name" : "sun-jsim-frames-xss(46555)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/46555"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2008-5259", "ID": "CVE-2008-5259",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,14 +58,14 @@
"url": "http://www.securityfocus.com/archive/1/502701/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/502701/100/0/threaded"
}, },
{ {
"name" : "http://secunia.com/secunia_research/2008-57/", "name": "ADV-2009-1044",
"refsource" : "MISC", "refsource": "VUPEN",
"url" : "http://secunia.com/secunia_research/2008-57/" "url": "http://www.vupen.com/english/advisories/2009/1044"
}, },
{ {
"name" : "34523", "name": "divxwebplayer-strf-bo(49908)",
"refsource" : "BID", "refsource": "XF",
"url" : "http://www.securityfocus.com/bid/34523" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49908"
}, },
{ {
"name": "1022061", "name": "1022061",
@ -78,14 +78,14 @@
"url": "http://secunia.com/advisories/33196" "url": "http://secunia.com/advisories/33196"
}, },
{ {
"name" : "ADV-2009-1044", "name": "http://secunia.com/secunia_research/2008-57/",
"refsource" : "VUPEN", "refsource": "MISC",
"url" : "http://www.vupen.com/english/advisories/2009/1044" "url": "http://secunia.com/secunia_research/2008-57/"
}, },
{ {
"name" : "divxwebplayer-strf-bo(49908)", "name": "34523",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/49908" "url": "http://www.securityfocus.com/bid/34523"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "PK38745", "name": "clearquest-sql-information-disclosure(46993)",
"refsource" : "AIXAPAR", "refsource": "XF",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1PK38745" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46993"
}, },
{ {
"name": "32847", "name": "32847",
@ -63,9 +63,9 @@
"url": "http://secunia.com/advisories/32847" "url": "http://secunia.com/advisories/32847"
}, },
{ {
"name" : "clearquest-sql-information-disclosure(46993)", "name": "PK38745",
"refsource" : "XF", "refsource": "AIXAPAR",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/46993" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK38745"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "7269",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7269"
},
{ {
"name": "32523", "name": "32523",
"refsource": "BID", "refsource": "BID",
@ -67,6 +62,11 @@
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4781" "url": "http://securityreason.com/securityalert/4781"
}, },
{
"name": "7269",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7269"
},
{ {
"name": "cmslittle-index-sql-injection(46931)", "name": "cmslittle-index-sql-injection(46931)",
"refsource": "XF", "refsource": "XF",

View File

@ -53,14 +53,19 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20080816 Nokia 6131 NFC URI/URL Spoofing and DoS Advisory", "name": "http://www.mulliner.org/nfc/feed/collin_mulliner_eusecwest08_attacking_nfc_phones.pdf",
"refsource" : "BUGTRAQ", "refsource": "MISC",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2008-08/0186.html" "url": "http://www.mulliner.org/nfc/feed/collin_mulliner_eusecwest08_attacking_nfc_phones.pdf"
}, },
{ {
"name" : "20080816 Nokia 6131 NFC URI/URL Spoofing and DoS Advisory", "name": "30716",
"refsource" : "FULLDISC", "refsource": "BID",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2008-08/0344.html" "url": "http://www.securityfocus.com/bid/30716"
},
{
"name": "http://www.mulliner.org/security/advisories/nokia6131nfc_uri_spoofing_and_dos_advisory.txt",
"refsource": "MISC",
"url": "http://www.mulliner.org/security/advisories/nokia6131nfc_uri_spoofing_and_dos_advisory.txt"
}, },
{ {
"name": "http://events.ccc.de/congress/2008/Fahrplan/attachments/1109_collin_mulliner_eusecwest08_attacking_nfc_phones_slim.pdf", "name": "http://events.ccc.de/congress/2008/Fahrplan/attachments/1109_collin_mulliner_eusecwest08_attacking_nfc_phones_slim.pdf",
@ -72,30 +77,25 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://events.ccc.de/congress/2008/Fahrplan/events/2639.en.html" "url": "http://events.ccc.de/congress/2008/Fahrplan/events/2639.en.html"
}, },
{
"name": "nokia-6131-ndef-uri-dos(44529)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44529"
},
{
"name": "20080816 Nokia 6131 NFC URI/URL Spoofing and DoS Advisory",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2008-08/0186.html"
},
{ {
"name": "http://www.mulliner.org/nfc/feed/collin_mulliner_25c3_attacking_nfc_phones.pdf", "name": "http://www.mulliner.org/nfc/feed/collin_mulliner_25c3_attacking_nfc_phones.pdf",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.mulliner.org/nfc/feed/collin_mulliner_25c3_attacking_nfc_phones.pdf" "url": "http://www.mulliner.org/nfc/feed/collin_mulliner_25c3_attacking_nfc_phones.pdf"
}, },
{ {
"name" : "http://www.mulliner.org/nfc/feed/collin_mulliner_eusecwest08_attacking_nfc_phones.pdf", "name": "20080816 Nokia 6131 NFC URI/URL Spoofing and DoS Advisory",
"refsource" : "MISC", "refsource": "FULLDISC",
"url" : "http://www.mulliner.org/nfc/feed/collin_mulliner_eusecwest08_attacking_nfc_phones.pdf" "url": "http://archives.neohapsis.com/archives/fulldisclosure/2008-08/0344.html"
},
{
"name" : "http://www.mulliner.org/security/advisories/nokia6131nfc_uri_spoofing_and_dos_advisory.txt",
"refsource" : "MISC",
"url" : "http://www.mulliner.org/security/advisories/nokia6131nfc_uri_spoofing_and_dos_advisory.txt"
},
{
"name" : "30716",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30716"
},
{
"name" : "nokia-6131-ndef-uri-dos(44529)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44529"
} }
] ]
} }

View File

@ -57,11 +57,6 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7443" "url": "https://www.exploit-db.com/exploits/7443"
}, },
{
"name" : "32810",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32810"
},
{ {
"name": "33114", "name": "33114",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -71,6 +66,11 @@
"name": "4927", "name": "4927",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4927" "url": "http://securityreason.com/securityalert/4927"
},
{
"name": "32810",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32810"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0272", "ID": "CVE-2013-0272",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,45 +52,45 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://hg.pidgin.im/pidgin/main/rev/879db2a9a59c",
"refsource" : "CONFIRM",
"url" : "http://hg.pidgin.im/pidgin/main/rev/879db2a9a59c"
},
{
"name" : "http://www.pidgin.im/news/security/?id=66",
"refsource" : "CONFIRM",
"url" : "http://www.pidgin.im/news/security/?id=66"
},
{ {
"name": "SUSE-SU-2013:0388", "name": "SUSE-SU-2013:0388",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html"
}, },
{
"name" : "openSUSE-SU-2013:0405",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html"
},
{
"name" : "openSUSE-SU-2013:0407",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html"
},
{ {
"name": "USN-1746-1", "name": "USN-1746-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1746-1" "url": "http://www.ubuntu.com/usn/USN-1746-1"
}, },
{
"name": "http://hg.pidgin.im/pidgin/main/rev/879db2a9a59c",
"refsource": "CONFIRM",
"url": "http://hg.pidgin.im/pidgin/main/rev/879db2a9a59c"
},
{ {
"name": "57951", "name": "57951",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/57951" "url": "http://www.securityfocus.com/bid/57951"
}, },
{
"name": "openSUSE-SU-2013:0405",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html"
},
{ {
"name": "oval:org.mitre.oval:def:17474", "name": "oval:org.mitre.oval:def:17474",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17474" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17474"
},
{
"name": "openSUSE-SU-2013:0407",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html"
},
{
"name": "http://www.pidgin.im/news/security/?id=66",
"refsource": "CONFIRM",
"url": "http://www.pidgin.im/news/security/?id=66"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2013-0829", "ID": "CVE-2013-0829",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html"
},
{ {
"name": "https://code.google.com/p/chromium/issues/detail?id=162114", "name": "https://code.google.com/p/chromium/issues/detail?id=162114",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=162114" "url": "https://code.google.com/p/chromium/issues/detail?id=162114"
}, },
{
"name": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html"
},
{ {
"name": "oval:org.mitre.oval:def:16322", "name": "oval:org.mitre.oval:def:16322",
"refsource": "OVAL", "refsource": "OVAL",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2013-0831", "ID": "CVE-2013-0831",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=161836",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=161836"
},
{ {
"name": "openSUSE-SU-2013:0236", "name": "openSUSE-SU-2013:0236",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00005.html" "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00005.html"
}, },
{
"name": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html"
},
{ {
"name": "oval:org.mitre.oval:def:15917", "name": "oval:org.mitre.oval:def:15917",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15917" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15917"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=161836",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=161836"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security_alert@emc.com",
"ID": "CVE-2013-3274", "ID": "CVE-2013-3274",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-3302", "ID": "CVE-2013-3302",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://github.com/torvalds/linux/commit/ea702b80e0bbb2448e201472127288beb82ca2fe",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/ea702b80e0bbb2448e201472127288beb82ca2fe"
},
{
"name": "59064",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/59064"
},
{ {
"name": "[oss-security] 20130415 CVE request: Linux kernel: cifs: NULL pointer dereference", "name": "[oss-security] 20130415 CVE request: Linux kernel: cifs: NULL pointer dereference",
"refsource": "MLIST", "refsource": "MLIST",
@ -71,16 +81,6 @@
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=952260", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=952260",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952260" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952260"
},
{
"name" : "https://github.com/torvalds/linux/commit/ea702b80e0bbb2448e201472127288beb82ca2fe",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/ea702b80e0bbb2448e201472127288beb82ca2fe"
},
{
"name" : "59064",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/59064"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4157", "ID": "CVE-2013-4157",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4270", "ID": "CVE-2013-4270",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2433c8f094a008895e66f25bd1773cdb01c91d01", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1027752",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2433c8f094a008895e66f25bd1773cdb01c91d01" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027752"
}, },
{ {
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.5", "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.5",
@ -63,24 +63,24 @@
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.5" "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.5"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1027752", "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2433c8f094a008895e66f25bd1773cdb01c91d01",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1027752" "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2433c8f094a008895e66f25bd1773cdb01c91d01"
}, },
{ {
"name": "https://github.com/torvalds/linux/commit/2433c8f094a008895e66f25bd1773cdb01c91d01", "name": "https://github.com/torvalds/linux/commit/2433c8f094a008895e66f25bd1773cdb01c91d01",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/2433c8f094a008895e66f25bd1773cdb01c91d01" "url": "https://github.com/torvalds/linux/commit/2433c8f094a008895e66f25bd1773cdb01c91d01"
}, },
{
"name" : "RHSA-2014:0100",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0100.html"
},
{ {
"name": "USN-2049-1", "name": "USN-2049-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2049-1" "url": "http://www.ubuntu.com/usn/USN-2049-1"
},
{
"name": "RHSA-2014:0100",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0100.html"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20131203 McAfee Email Gateway multiple vulns",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2013/Dec/18"
},
{ {
"name": "http://packetstormsecurity.com/files/124277/McAfee-Email-Gateway-7.6-Command-Execution-SQL-Injection.html", "name": "http://packetstormsecurity.com/files/124277/McAfee-Email-Gateway-7.6-Command-Execution-SQL-Injection.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/124277/McAfee-Email-Gateway-7.6-Command-Execution-SQL-Injection.html" "url": "http://packetstormsecurity.com/files/124277/McAfee-Email-Gateway-7.6-Command-Execution-SQL-Injection.html"
}, },
{
"name": "100581",
"refsource": "OSVDB",
"url": "http://osvdb.org/100581"
},
{ {
"name": "64150", "name": "64150",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/64150" "url": "http://www.securityfocus.com/bid/64150"
}, },
{ {
"name" : "100581", "name": "20131203 McAfee Email Gateway multiple vulns",
"refsource" : "OSVDB", "refsource": "FULLDISC",
"url" : "http://osvdb.org/100581" "url": "http://seclists.org/fulldisclosure/2013/Dec/18"
}, },
{ {
"name": "mcafee-gateway-cve20137104-command-exec(90163)", "name": "mcafee-gateway-cve20137104-command-exec(90163)",

View File

@ -58,9 +58,14 @@
"url": "http://www.openwall.com/lists/oss-security/2015/02/17/1" "url": "http://www.openwall.com/lists/oss-security/2015/02/17/1"
}, },
{ {
"name" : "[oss-security] 20150312 CVE request: novnc: session hijack through insecurely set session token cookies", "name": "RHSA-2015:0833",
"refsource" : "MLIST", "refsource": "REDHAT",
"url" : "http://www.openwall.com/lists/oss-security/2015/03/12/13" "url": "http://rhn.redhat.com/errata/RHSA-2015-0833.html"
},
{
"name": "RHSA-2015:0884",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0884.html"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1193451", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1193451",
@ -78,19 +83,14 @@
"url": "http://rhn.redhat.com/errata/RHSA-2015-0788.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-0788.html"
}, },
{ {
"name" : "RHSA-2015:0833", "name": "[oss-security] 20150312 CVE request: novnc: session hijack through insecurely set session token cookies",
"refsource" : "REDHAT", "refsource": "MLIST",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0833.html" "url": "http://www.openwall.com/lists/oss-security/2015/03/12/13"
}, },
{ {
"name": "RHSA-2015:0834", "name": "RHSA-2015:0834",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0834.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-0834.html"
},
{
"name" : "RHSA-2015:0884",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0884.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-7438", "ID": "CVE-2013-7438",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-12880", "ID": "CVE-2017-12880",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -62,15 +62,15 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://hyp3rlinx.altervista.org/advisories/APACHE2TRIAD-SERVER-STACK-v1.5.4-MULTIPLE-CVE.txt" "url": "http://hyp3rlinx.altervista.org/advisories/APACHE2TRIAD-SERVER-STACK-v1.5.4-MULTIPLE-CVE.txt"
}, },
{
"name" : "http://packetstormsecurity.com/files/143863/Apache2Triad-1.5.4-CSRF-XSS-Session-Fixation.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/143863/Apache2Triad-1.5.4-CSRF-XSS-Session-Fixation.html"
},
{ {
"name": "100447", "name": "100447",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/100447" "url": "http://www.securityfocus.com/bid/100447"
},
{
"name": "http://packetstormsecurity.com/files/143863/Apache2Triad-1.5.4-CSRF-XSS-Session-Fixation.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/143863/Apache2Triad-1.5.4-CSRF-XSS-Session-Fixation.html"
} }
] ]
} }

View File

@ -53,9 +53,44 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://www.krackattacks.com/", "name": "1039581",
"refsource" : "MISC", "refsource": "SECTRACK",
"url" : "https://www.krackattacks.com/" "url": "http://www.securitytracker.com/id/1039581"
},
{
"name": "101274",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101274"
},
{
"name": "SUSE-SU-2017:2745",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html"
},
{
"name": "DSA-3999",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3999"
},
{
"name": "1039578",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039578"
},
{
"name": "https://access.redhat.com/security/vulnerabilities/kracks",
"refsource": "CONFIRM",
"url": "https://access.redhat.com/security/vulnerabilities/kracks"
},
{
"name": "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa"
},
{
"name": "RHSA-2017:2911",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2911"
}, },
{ {
"name": "https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt", "name": "https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt",
@ -68,45 +103,20 @@
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt" "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt"
}, },
{ {
"name" : "https://access.redhat.com/security/vulnerabilities/kracks", "name": "1039577",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://access.redhat.com/security/vulnerabilities/kracks" "url": "http://www.securitytracker.com/id/1039577"
}, },
{ {
"name" : "https://support.lenovo.com/us/en/product_security/LEN-17420", "name": "openSUSE-SU-2017:2755",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "https://support.lenovo.com/us/en/product_security/LEN-17420" "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html"
}, },
{ {
"name": "https://source.android.com/security/bulletin/2017-11-01", "name": "https://source.android.com/security/bulletin/2017-11-01",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-11-01" "url": "https://source.android.com/security/bulletin/2017-11-01"
}, },
{
"name" : "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf",
"refsource" : "CONFIRM",
"url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf"
},
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2017-005",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2017-005"
},
{
"name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II",
"refsource" : "CISCO",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa"
},
{
"name" : "DSA-3999",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2017/dsa-3999"
},
{
"name" : "FreeBSD-SA-17:07",
"refsource" : "FREEBSD",
"url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc"
},
{ {
"name": "GLSA-201711-03", "name": "GLSA-201711-03",
"refsource": "GENTOO", "refsource": "GENTOO",
@ -118,64 +128,54 @@
"url": "https://access.redhat.com/errata/RHSA-2017:2907" "url": "https://access.redhat.com/errata/RHSA-2017:2907"
}, },
{ {
"name" : "RHSA-2017:2911", "name": "https://support.lenovo.com/us/en/product_security/LEN-17420",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "https://access.redhat.com/errata/RHSA-2017:2911" "url": "https://support.lenovo.com/us/en/product_security/LEN-17420"
}, },
{ {
"name" : "SUSE-SU-2017:2745", "name": "FreeBSD-SA-17:07",
"refsource" : "SUSE", "refsource": "FREEBSD",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc"
}, },
{ {
"name" : "SUSE-SU-2017:2752", "name": "https://www.krackattacks.com/",
"refsource" : "SUSE", "refsource": "MISC",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" "url": "https://www.krackattacks.com/"
},
{
"name" : "openSUSE-SU-2017:2755",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html"
},
{
"name" : "USN-3455-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3455-1"
},
{
"name" : "VU#228519",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/228519"
},
{
"name" : "101274",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/101274"
}, },
{ {
"name": "1039573", "name": "1039573",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039573" "url": "http://www.securitytracker.com/id/1039573"
}, },
{
"name": "SUSE-SU-2017:2752",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html"
},
{ {
"name": "1039576", "name": "1039576",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039576" "url": "http://www.securitytracker.com/id/1039576"
}, },
{ {
"name" : "1039577", "name": "VU#228519",
"refsource" : "SECTRACK", "refsource": "CERT-VN",
"url" : "http://www.securitytracker.com/id/1039577" "url": "http://www.kb.cert.org/vuls/id/228519"
}, },
{ {
"name" : "1039578", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1039578" "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf"
}, },
{ {
"name" : "1039581", "name": "https://cert.vde.com/en-us/advisories/vde-2017-005",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1039581" "url": "https://cert.vde.com/en-us/advisories/vde-2017-005"
},
{
"name": "USN-3455-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3455-1"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-13123", "ID": "CVE-2017-13123",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2018-01-02T00:00:00", "DATE_PUBLIC": "2018-01-02T00:00:00",
"ID": "CVE-2017-13203", "ID": "CVE-2017-13203",
"STATE": "PUBLIC" "STATE": "PUBLIC"

View File

@ -52,21 +52,31 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "DSA-4090",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4090"
},
{ {
"name": "[debian-lts-announce] 20171221 [SECURITY] [DLA 1216-1] wordpress security update", "name": "[debian-lts-announce] 20171221 [SECURITY] [DLA 1216-1] wordpress security update",
"refsource": "MLIST", "refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00019.html" "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00019.html"
}, },
{
"name" : "https://codex.wordpress.org/Version_4.9.1",
"refsource" : "MISC",
"url" : "https://codex.wordpress.org/Version_4.9.1"
},
{ {
"name": "https://github.com/WordPress/WordPress/commit/67d03a98c2cae5f41843c897f206adde299b0509", "name": "https://github.com/WordPress/WordPress/commit/67d03a98c2cae5f41843c897f206adde299b0509",
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/WordPress/WordPress/commit/67d03a98c2cae5f41843c897f206adde299b0509" "url": "https://github.com/WordPress/WordPress/commit/67d03a98c2cae5f41843c897f206adde299b0509"
}, },
{
"name": "102024",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102024"
},
{
"name": "https://codex.wordpress.org/Version_4.9.1",
"refsource": "MISC",
"url": "https://codex.wordpress.org/Version_4.9.1"
},
{ {
"name": "https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/", "name": "https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/",
"refsource": "MISC", "refsource": "MISC",
@ -76,16 +86,6 @@
"name": "https://wpvulndb.com/vulnerabilities/8966", "name": "https://wpvulndb.com/vulnerabilities/8966",
"refsource": "MISC", "refsource": "MISC",
"url": "https://wpvulndb.com/vulnerabilities/8966" "url": "https://wpvulndb.com/vulnerabilities/8966"
},
{
"name" : "DSA-4090",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4090"
},
{
"name" : "102024",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/102024"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[debian-lts-announce] 20190107 [SECURITY] [DLA 1630-1] libav security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html"
},
{ {
"name": "https://bugzilla.libav.org/show_bug.cgi?id=1100", "name": "https://bugzilla.libav.org/show_bug.cgi?id=1100",
"refsource": "MISC", "refsource": "MISC",
"url": "https://bugzilla.libav.org/show_bug.cgi?id=1100" "url": "https://bugzilla.libav.org/show_bug.cgi?id=1100"
},
{
"name": "[debian-lts-announce] 20190107 [SECURITY] [DLA 1630-1] libav security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-17198", "ID": "CVE-2017-17198",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "45564",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/45564/"
},
{ {
"name": "https://seccops.com/wikidforum-2-20-multiple-sql-injection-vulnerabilities/", "name": "https://seccops.com/wikidforum-2-20-multiple-sql-injection-vulnerabilities/",
"refsource": "MISC", "refsource": "MISC",
"url": "https://seccops.com/wikidforum-2-20-multiple-sql-injection-vulnerabilities/" "url": "https://seccops.com/wikidforum-2-20-multiple-sql-injection-vulnerabilities/"
},
{
"name": "45564",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/45564/"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "105921",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105921"
},
{ {
"name": "https://wordpress.org/plugins/wp-gdpr-compliance/#developers", "name": "https://wordpress.org/plugins/wp-gdpr-compliance/#developers",
"refsource": "MISC", "refsource": "MISC",
"url": "https://wordpress.org/plugins/wp-gdpr-compliance/#developers" "url": "https://wordpress.org/plugins/wp-gdpr-compliance/#developers"
}, },
{
"name" : "https://www.wordfence.com/blog/2018/11/trends-following-vulnerability-in-wp-gdpr-compliance-plugin/",
"refsource" : "MISC",
"url" : "https://www.wordfence.com/blog/2018/11/trends-following-vulnerability-in-wp-gdpr-compliance-plugin/"
},
{ {
"name": "https://wpvulndb.com/vulnerabilities/9144", "name": "https://wpvulndb.com/vulnerabilities/9144",
"refsource": "MISC", "refsource": "MISC",
"url": "https://wpvulndb.com/vulnerabilities/9144" "url": "https://wpvulndb.com/vulnerabilities/9144"
}, },
{ {
"name" : "105921", "name": "https://www.wordfence.com/blog/2018/11/trends-following-vulnerability-in-wp-gdpr-compliance-plugin/",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/105921" "url": "https://www.wordfence.com/blog/2018/11/trends-following-vulnerability-in-wp-gdpr-compliance-plugin/"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20181209 Multiple vulnerabilities found in Trendnet routers and IP Cameras.",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2018/Dec/21"
},
{ {
"name": "http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html", "name": "http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html" "url": "http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html"
},
{
"name": "20181209 Multiple vulnerabilities found in Trendnet routers and IP Cameras.",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2018/Dec/21"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20181207 [CVE-2018-19649, CVE-2018-19765 to CVE-2018-19775, CVE-2018-19809 to CVE-2018-19822] - Multiple Cross Site Scripting in VistaPortal SE Version 5.1 (build 51029)",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2018/Dec/20"
},
{ {
"name": "http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html", "name": "http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html" "url": "http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html"
},
{
"name": "20181207 [CVE-2018-19649, CVE-2018-19765 to CVE-2018-19775, CVE-2018-19809 to CVE-2018-19822] - Multiple Cross Site Scripting in VistaPortal SE Version 5.1 (build 51029)",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2018/Dec/20"
} }
] ]
} }

View File

@ -77,16 +77,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/140043",
"refsource" : "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/140043"
},
{ {
"name": "http://www.ibm.com/support/docview.wss?uid=swg22014388", "name": "http://www.ibm.com/support/docview.wss?uid=swg22014388",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg22014388" "url": "http://www.ibm.com/support/docview.wss?uid=swg22014388"
}, },
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/140043",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/140043"
},
{ {
"name": "103535", "name": "103535",
"refsource": "BID", "refsource": "BID",

View File

@ -56,15 +56,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg22015754",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22015754"
},
{ {
"name": "ibm-bigfix-cve20181475-info-disc(140756)", "name": "ibm-bigfix-cve20181475-info-disc(140756)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/140756" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/140756"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg22015754",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg22015754"
} }
] ]
} }

View File

@ -52,30 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html"
},
{ {
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c095508770aebf1b9218e77026e48345d719b17c", "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c095508770aebf1b9218e77026e48345d719b17c",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c095508770aebf1b9218e77026e48345d719b17c" "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c095508770aebf1b9218e77026e48345d719b17c"
}, },
{
"name" : "https://github.com/torvalds/linux/commit/c095508770aebf1b9218e77026e48345d719b17c",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/c095508770aebf1b9218e77026e48345d719b17c"
},
{ {
"name": "DSA-4187", "name": "DSA-4187",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4187" "url": "https://www.debian.org/security/2018/dsa-4187"
}, },
{ {
"name" : "RHSA-2018:0470", "name": "https://github.com/torvalds/linux/commit/c095508770aebf1b9218e77026e48345d719b17c",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "https://access.redhat.com/errata/RHSA-2018:0470" "url": "https://github.com/torvalds/linux/commit/c095508770aebf1b9218e77026e48345d719b17c"
}, },
{ {
"name": "USN-3617-1", "name": "USN-3617-1",
@ -83,9 +73,9 @@
"url": "https://usn.ubuntu.com/3617-1/" "url": "https://usn.ubuntu.com/3617-1/"
}, },
{ {
"name" : "USN-3617-2", "name": "USN-3619-2",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url" : "https://usn.ubuntu.com/3617-2/" "url": "https://usn.ubuntu.com/3619-2/"
}, },
{ {
"name": "USN-3617-3", "name": "USN-3617-3",
@ -93,34 +83,44 @@
"url": "https://usn.ubuntu.com/3617-3/" "url": "https://usn.ubuntu.com/3617-3/"
}, },
{ {
"name" : "USN-3619-1", "name": "USN-3632-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url" : "https://usn.ubuntu.com/3619-1/" "url": "https://usn.ubuntu.com/3632-1/"
},
{
"name" : "USN-3620-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3620-1/"
}, },
{ {
"name": "USN-3620-2", "name": "USN-3620-2",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3620-2/" "url": "https://usn.ubuntu.com/3620-2/"
}, },
{
"name" : "USN-3619-2",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3619-2/"
},
{
"name" : "USN-3632-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3632-1/"
},
{ {
"name": "102507", "name": "102507",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/102507" "url": "http://www.securityfocus.com/bid/102507"
},
{
"name": "RHSA-2018:0470",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0470"
},
{
"name": "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html"
},
{
"name": "USN-3617-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3617-2/"
},
{
"name": "USN-3620-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3620-1/"
},
{
"name": "USN-3619-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3619-1/"
} }
] ]
} }

View File

@ -54,9 +54,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://source.android.com/security/bulletin/2018-06-01#qualcomm-components", "name": "https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2018-06-01#qualcomm-components" "url": "https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin"
}, },
{ {
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=27381e9d253629180dcdaa698d3fd01bec28d351", "name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=27381e9d253629180dcdaa698d3fd01bec28d351",
@ -64,9 +64,9 @@
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=27381e9d253629180dcdaa698d3fd01bec28d351" "url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=27381e9d253629180dcdaa698d3fd01bec28d351"
}, },
{ {
"name" : "https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin", "name": "https://source.android.com/security/bulletin/2018-06-01#qualcomm-components",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin" "url": "https://source.android.com/security/bulletin/2018-06-01#qualcomm-components"
} }
] ]
} }