"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-02-17 17:01:41 +00:00
parent 72ecfb17d3
commit 5c6f573e25
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
22 changed files with 111 additions and 111 deletions

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name": "https://security.paloaltonetworks.com/CVE-2015-2223",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2015-2223"
},
{
"name": "20150329 CVE-2015-2223: Palo Alto Traps Server Stored XSS",
"refsource": "BUGTRAQ",
@ -71,6 +66,11 @@
"name": "73704",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/73704"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2015-2223",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2015-2223"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name": "https://security.paloaltonetworks.com/CVE-2015-4162",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2015-4162"
},
{
"name": "74941",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/74941"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2015-4162",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2015-4162"
}
]
}

View File

@ -67,11 +67,6 @@
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/197c949e7798fbf28cfadc69d9ca0c2abbf93191"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2016-10229",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2016-10229"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=197c949e7798fbf28cfadc69d9ca0c2abbf93191",
"refsource": "CONFIRM",
@ -81,6 +76,11 @@
"name": "1038201",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038201"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2016-10229",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2016-10229"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name": "https://security.paloaltonetworks.com/CVE-2016-1712",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2016-1712"
},
{
"name": "1036326",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036326"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2016-1712",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2016-1712"
}
]
}

View File

@ -87,11 +87,6 @@
"refsource": "CONFIRM",
"url": "http://git.savannah.gnu.org/cgit/wget.git/commit/?id=e996e322ffd42aaa051602da182d03178d0f13e1"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2016-4971",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2016-4971"
},
{
"name": "RHSA-2016:2587",
"refsource": "REDHAT",
@ -111,6 +106,11 @@
"name": "91530",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91530"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2016-4971",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2016-4971"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@google.com",
"ASSIGNER": "chrome-cve-admin@google.com",
"ID": "CVE-2016-5195",
"STATE": "PUBLIC"
},
@ -197,11 +197,6 @@
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2016-5195",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2016-5195"
},
{
"name": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
"refsource": "CONFIRM",
@ -296,6 +291,11 @@
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10176",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10176"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2016-5195",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2016-5195"
}
]
}

View File

@ -117,11 +117,6 @@
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3070-2"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2016-5696",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2016-5696"
},
{
"name": "RHSA-2016:1815",
"refsource": "REDHAT",
@ -206,6 +201,11 @@
"name": "USN-3071-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3071-2"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2016-5696",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2016-5696"
}
]
}

View File

@ -97,11 +97,6 @@
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1413"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2016-8610",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2016-8610"
},
{
"name": "RHSA-2017:2494",
"refsource": "REDHAT",
@ -186,6 +181,11 @@
"url": "https://www.oracle.com/security-alerts/cpujan2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2020.html"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2016-8610",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2016-8610"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name": "https://security.paloaltonetworks.com/CVE-2016-9149",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2016-9149"
},
{
"name": "1037379",
"refsource": "SECTRACK",
@ -66,6 +61,11 @@
"name": "94401",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94401"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2016-9149",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2016-9149"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name": "https://security.paloaltonetworks.com/CVE-2016-9150",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2016-9150"
},
{
"name": "1037382",
"refsource": "SECTRACK",
@ -71,6 +66,11 @@
"name": "94399",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94399"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2016-9150",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2016-9150"
}
]
}

View File

@ -62,11 +62,6 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40788/"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2016-9151",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2016-9151"
},
{
"name": "94400",
"refsource": "BID",
@ -76,6 +71,11 @@
"name": "1037381",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037381"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2016-9151",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2016-9151"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name": "https://security.paloaltonetworks.com/CVE-2017-12416",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2017-12416"
},
{
"name": "1039255",
"refsource": "SECTRACK",
@ -66,6 +61,11 @@
"name": "100619",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100619"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2017-12416",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2017-12416"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name": "https://security.paloaltonetworks.com/CVE-2017-15870",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2017-15870"
},
{
"name": "102083",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102083"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2017-15870",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2017-15870"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040006"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2017-15940",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2017-15940"
},
{
"name": "102076",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102076"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2017-15940",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2017-15940"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name": "https://security.paloaltonetworks.com/CVE-2017-15941",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2017-15941"
},
{
"name": "102446",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "1040147",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040147"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2017-15941",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2017-15941"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name": "https://security.paloaltonetworks.com/CVE-2017-15942",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2017-15942"
},
{
"name": "1040004",
"refsource": "SECTRACK",
@ -66,6 +61,11 @@
"name": "102075",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102075"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2017-15942",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2017-15942"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040005"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2017-15943",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2017-15943"
},
{
"name": "102074",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102074"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2017-15943",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2017-15943"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name": "https://security.paloaltonetworks.com/CVE-2017-17841",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2017-17841"
},
{
"name": "102458",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "1040149",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040149"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2017-17841",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2017-17841"
}
]
}

View File

@ -189,11 +189,6 @@
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2017-3731",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2017-3731"
},
{
"name": "RHSA-2018:2187",
"refsource": "REDHAT",
@ -208,6 +203,11 @@
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2017-3731",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2017-3731"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name": "https://security.paloaltonetworks.com/CVE-2017-5583",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2017-5583"
},
{
"name": "96370",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "1037890",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037890"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2017-5583",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2017-5583"
}
]
}

View File

@ -238,11 +238,6 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102376"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2017-5715",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2017-5715"
},
{
"name": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability",
"refsource": "CONFIRM",
@ -512,6 +507,11 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html",
"url": "http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2017-5715",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2017-5715"
}
]
}

View File

@ -57,11 +57,6 @@
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038123"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2017-6460",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2017-6460"
},
{
"name": "https://support.apple.com/HT208144",
"refsource": "CONFIRM",
@ -86,6 +81,11 @@
"refsource": "CONFIRM",
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2017-6460",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2017-6460"
}
]
}