"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 06:38:44 +00:00
parent 6804d3ee1c
commit 5eeb338977
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
67 changed files with 4098 additions and 4098 deletions

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "I-042",
"refsource" : "CIAC",
"url" : "http://www.ciac.org/ciac/bulletins/i-042.shtml"
},
{ {
"name": "19980402-01-PX", "name": "19980402-01-PX",
"refsource": "SGI", "refsource": "SGI",
@ -66,6 +61,11 @@
"name": "707", "name": "707",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/707" "url": "http://www.securityfocus.com/bid/707"
},
{
"name": "I-042",
"refsource": "CIAC",
"url": "http://www.ciac.org/ciac/bulletins/i-042.shtml"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "19971224 Quake II Remote Denial of Service",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/8282"
},
{ {
"name": "quake2-dos(698)", "name": "quake2-dos(698)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/698" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/698"
},
{
"name": "19971224 Quake II Remote Denial of Service",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/8282"
} }
] ]
} }

View File

@ -53,24 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391", "name": "20050204 [USN-75-1] cpio vulnerability",
"refsource" : "MISC", "refsource": "BUGTRAQ",
"url" : "http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391" "url": "http://marc.info/?l=bugtraq&m=110763404701519&w=2"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf"
},
{
"name" : "DSA-664",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2005/dsa-664"
},
{
"name" : "MDKSA-2005:032",
"refsource" : "MANDRAKE",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:032"
}, },
{ {
"name": "RHSA-2005:073", "name": "RHSA-2005:073",
@ -78,34 +63,9 @@
"url": "http://www.redhat.com/support/errata/RHSA-2005-073.html" "url": "http://www.redhat.com/support/errata/RHSA-2005-073.html"
}, },
{ {
"name" : "RHSA-2005:080", "name": "cpio-o-archive-insecure-permissions(19167)",
"refsource" : "REDHAT", "refsource": "XF",
"url" : "http://www.redhat.com/support/errata/RHSA-2005-080.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19167"
},
{
"name" : "RHSA-2005:806",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2005-806.html"
},
{
"name" : "2005-0003",
"refsource" : "TRUSTIX",
"url" : "http://www.trustix.org/errata/2005/0003/"
},
{
"name" : "20050204 [USN-75-1] cpio vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=110763404701519&w=2"
},
{
"name" : "oval:org.mitre.oval:def:10888",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10888"
},
{
"name" : "14357",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/14357"
}, },
{ {
"name": "17063", "name": "17063",
@ -118,9 +78,49 @@
"url": "http://secunia.com/advisories/17532" "url": "http://secunia.com/advisories/17532"
}, },
{ {
"name" : "cpio-o-archive-insecure-permissions(19167)", "name": "2005-0003",
"refsource" : "XF", "refsource": "TRUSTIX",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/19167" "url": "http://www.trustix.org/errata/2005/0003/"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf"
},
{
"name": "RHSA-2005:080",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-080.html"
},
{
"name": "oval:org.mitre.oval:def:10888",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10888"
},
{
"name": "http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391",
"refsource": "MISC",
"url": "http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391"
},
{
"name": "14357",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/14357"
},
{
"name": "MDKSA-2005:032",
"refsource": "MANDRAKE",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:032"
},
{
"name": "DSA-664",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2005/dsa-664"
},
{
"name": "RHSA-2005:806",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-806.html"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "8098",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/8098"
},
{ {
"name": "MS99-058", "name": "MS99-058",
"refsource": "MS", "refsource": "MS",
@ -61,11 +66,6 @@
"name": "Q238606", "name": "Q238606",
"refsource": "MSKB", "refsource": "MSKB",
"url": "http://support.microsoft.com/default.aspx?scid=kb;[LN];Q238606" "url": "http://support.microsoft.com/default.aspx?scid=kb;[LN];Q238606"
},
{
"name" : "8098",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/8098"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "19991019 Security hole in cdwtools < 093",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/suse_security_announce_25.html"
},
{ {
"name": "738", "name": "738",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/738" "url": "http://www.securityfocus.com/bid/738"
},
{
"name": "19991019 Security hole in cdwtools < 093",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/suse_security_announce_25.html"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.lsoft.com/news/default.asp?item=Advisory0",
"refsource" : "CONFIRM",
"url" : "http://www.lsoft.com/news/default.asp?item=Advisory0"
},
{ {
"name": "20000505 Alert: Listserv Web Archives (wa) buffer overflow", "name": "20000505 Alert: Listserv Web Archives (wa) buffer overflow",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-05/0048.html" "url": "http://archives.neohapsis.com/archives/bugtraq/2000-05/0048.html"
}, },
{
"name": "http://www.lsoft.com/news/default.asp?item=Advisory0",
"refsource": "CONFIRM",
"url": "http://www.lsoft.com/news/default.asp?item=Advisory0"
},
{ {
"name": "1167", "name": "1167",
"refsource": "BID", "refsource": "BID",

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20000607 [ Hackerslab bug_paper ] HP-UX SNMP daemon vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/templates/archive.pike?list=1&msg=200006070511.OAA05492@dogfoot.hackerslab.org"
},
{ {
"name": "20000608 Re: HP-UX SNMP daemon vulnerability", "name": "20000608 Re: HP-UX SNMP daemon vulnerability",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/templates/archive.pike?list=1&msg=200006090640.XAA00779@hpchs.cup.hp.com" "url": "http://www.securityfocus.com/templates/archive.pike?list=1&msg=200006090640.XAA00779@hpchs.cup.hp.com"
}, },
{
"name": "hpux-snmp-daemon(4643)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4643"
},
{ {
"name": "1327", "name": "1327",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/1327" "url": "http://www.securityfocus.com/bid/1327"
}, },
{ {
"name" : "hpux-snmp-daemon(4643)", "name": "20000607 [ Hackerslab bug_paper ] HP-UX SNMP daemon vulnerability",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/4643" "url": "http://www.securityfocus.com/templates/archive.pike?list=1&msg=200006070511.OAA05492@dogfoot.hackerslab.org"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20000630 Kerberos security vulnerability in SSH-1.2.27",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=96256265914116&w=2"
},
{ {
"name": "1426", "name": "1426",
"refsource": "BID", "refsource": "BID",
@ -66,6 +61,11 @@
"name": "ssh-kerberos-tickets-disclosure(4903)", "name": "ssh-kerberos-tickets-disclosure(4903)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4903" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4903"
},
{
"name": "20000630 Kerberos security vulnerability in SSH-1.2.27",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=96256265914116&w=2"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "RHSA-2000:044", "name": "20000801 MDKSA-2000:029 pam update",
"refsource" : "REDHAT", "refsource": "BUGTRAQ",
"url" : "http://www.redhat.com/support/errata/RHSA-2000-044.html" "url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0455.html"
}, },
{ {
"name": "20000727 CONECTIVA LINUX SECURITY ANNOUNCEMENT - PAM", "name": "20000727 CONECTIVA LINUX SECURITY ANNOUNCEMENT - PAM",
@ -63,9 +63,9 @@
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0398.html" "url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0398.html"
}, },
{ {
"name" : "20000801 MDKSA-2000:029 pam update", "name": "linux-pam-console(5001)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-07/0455.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5001"
}, },
{ {
"name": "1513", "name": "1513",
@ -73,9 +73,9 @@
"url": "http://www.securityfocus.com/bid/1513" "url": "http://www.securityfocus.com/bid/1513"
}, },
{ {
"name" : "linux-pam-console(5001)", "name": "RHSA-2000:044",
"refsource" : "XF", "refsource": "REDHAT",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5001" "url": "http://www.redhat.com/support/errata/RHSA-2000-044.html"
} }
] ]
} }

View File

@ -52,30 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070211 Arbitrary file disclosure vulnerability in IP3 NetAccess < 4.1.9.6",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/459806/100/0/threaded"
},
{
"name" : "20070211 Arbitrary file disclosure vulnerability in IP3 NetAccess < 4.1.9.6",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0235.html"
},
{
"name" : "http://www.devtarget.org/ip3-advisory-02-2007.txt",
"refsource" : "MISC",
"url" : "http://www.devtarget.org/ip3-advisory-02-2007.txt"
},
{ {
"name": "3294", "name": "3294",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3294" "url": "https://www.exploit-db.com/exploits/3294"
}, },
{ {
"name" : "22513", "name": "ip3netaccess-getfile-directory-traversal(32432)",
"refsource" : "BID", "refsource": "XF",
"url" : "http://www.securityfocus.com/bid/22513" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32432"
}, },
{ {
"name": "ADV-2007-0615", "name": "ADV-2007-0615",
@ -83,24 +68,39 @@
"url": "http://www.vupen.com/english/advisories/2007/0615" "url": "http://www.vupen.com/english/advisories/2007/0615"
}, },
{ {
"name" : "31912", "name": "20070211 Arbitrary file disclosure vulnerability in IP3 NetAccess < 4.1.9.6",
"refsource" : "OSVDB", "refsource": "BUGTRAQ",
"url" : "http://osvdb.org/31912" "url": "http://www.securityfocus.com/archive/1/459806/100/0/threaded"
}, },
{ {
"name": "1017623", "name": "1017623",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017623" "url": "http://www.securitytracker.com/id?1017623"
}, },
{
"name": "31912",
"refsource": "OSVDB",
"url": "http://osvdb.org/31912"
},
{ {
"name": "24118", "name": "24118",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24118" "url": "http://secunia.com/advisories/24118"
}, },
{ {
"name" : "ip3netaccess-getfile-directory-traversal(32432)", "name": "20070211 Arbitrary file disclosure vulnerability in IP3 NetAccess < 4.1.9.6",
"refsource" : "XF", "refsource": "FULLDISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32432" "url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0235.html"
},
{
"name": "22513",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22513"
},
{
"name": "http://www.devtarget.org/ip3-advisory-02-2007.txt",
"refsource": "MISC",
"url": "http://www.devtarget.org/ip3-advisory-02-2007.txt"
} }
] ]
} }

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "33759",
"refsource": "OSVDB",
"url": "http://osvdb.org/33759"
},
{
"name": "ADV-2007-0740",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0740"
},
{ {
"name": "20070223 Simple one-file gallery", "name": "20070223 Simple one-file gallery",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -62,21 +72,6 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/22700" "url": "http://www.securityfocus.com/bid/22700"
}, },
{
"name" : "ADV-2007-0740",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0740"
},
{
"name" : "33759",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33759"
},
{
"name" : "24292",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24292"
},
{ {
"name": "2292", "name": "2292",
"refsource": "SREASON", "refsource": "SREASON",
@ -86,6 +81,11 @@
"name": "sofg-gallery-xss(32655)", "name": "sofg-gallery-xss(32655)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32655" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32655"
},
{
"name": "24292",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24292"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070301 Built2Go v.1.0 => ( news.php & rating.php ) Cross Site Scripting", "name": "24334",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/461672/100/0/threaded" "url": "http://secunia.com/advisories/24334"
}, },
{ {
"name": "22783", "name": "22783",
@ -63,14 +63,9 @@
"url": "http://www.securityfocus.com/bid/22783" "url": "http://www.securityfocus.com/bid/22783"
}, },
{ {
"name" : "ADV-2007-0818", "name": "newsmanagerblog-news-rating-xss(32772)",
"refsource" : "VUPEN", "refsource": "XF",
"url" : "http://www.vupen.com/english/advisories/2007/0818" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32772"
},
{
"name" : "24334",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24334"
}, },
{ {
"name": "2343", "name": "2343",
@ -78,9 +73,14 @@
"url": "http://securityreason.com/securityalert/2343" "url": "http://securityreason.com/securityalert/2343"
}, },
{ {
"name" : "newsmanagerblog-news-rating-xss(32772)", "name": "20070301 Built2Go v.1.0 => ( news.php & rating.php ) Cross Site Scripting",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32772" "url": "http://www.securityfocus.com/archive/1/461672/100/0/threaded"
},
{
"name": "ADV-2007-0818",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0818"
} }
] ]
} }

View File

@ -53,44 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://sourceforge.net/project/shownotes.php?release_id=500765", "name": "25022",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://sourceforge.net/project/shownotes.php?release_id=500765" "url": "http://secunia.com/advisories/25022"
}, },
{ {
"name" : "http://support.novell.com/techcenter/psdb/50a5cb718f20761dd7e0b6b4e0935c52.html", "name": "34913",
"refsource" : "CONFIRM", "refsource": "OSVDB",
"url" : "http://support.novell.com/techcenter/psdb/50a5cb718f20761dd7e0b6b4e0935c52.html" "url": "http://osvdb.org/34913"
},
{
"name" : "http://docs.info.apple.com/article.html?artnum=307562",
"refsource" : "CONFIRM",
"url" : "http://docs.info.apple.com/article.html?artnum=307562"
},
{
"name" : "APPLE-SA-2008-03-18",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
},
{
"name" : "DSA-1281",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1281"
},
{
"name" : "GLSA-200704-21",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200704-21.xml"
},
{
"name" : "MDKSA-2007:098",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:098"
},
{
"name" : "SUSE-SA:2007:026",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_26_clamav.html"
}, },
{ {
"name": "2007-0013", "name": "2007-0013",
@ -103,9 +73,14 @@
"url": "http://www.securityfocus.com/bid/23473" "url": "http://www.securityfocus.com/bid/23473"
}, },
{ {
"name" : "ADV-2007-1378", "name": "24996",
"refsource" : "VUPEN", "refsource": "SECUNIA",
"url" : "http://www.vupen.com/english/advisories/2007/1378" "url": "http://secunia.com/advisories/24996"
},
{
"name": "MDKSA-2007:098",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:098"
}, },
{ {
"name": "ADV-2008-0924", "name": "ADV-2008-0924",
@ -113,54 +88,79 @@
"url": "http://www.vupen.com/english/advisories/2008/0924/references" "url": "http://www.vupen.com/english/advisories/2008/0924/references"
}, },
{ {
"name" : "34913", "name": "SUSE-SA:2007:026",
"refsource" : "OSVDB", "refsource": "SUSE",
"url" : "http://osvdb.org/34913" "url": "http://www.novell.com/linux/security/advisories/2007_26_clamav.html"
},
{
"name" : "24891",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24891"
},
{
"name" : "24920",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24920"
},
{
"name" : "24946",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24946"
},
{
"name" : "24996",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24996"
},
{
"name" : "25022",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25022"
},
{
"name" : "25028",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25028"
},
{
"name" : "25189",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25189"
}, },
{ {
"name": "29420", "name": "29420",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29420" "url": "http://secunia.com/advisories/29420"
}, },
{
"name": "APPLE-SA-2008-03-18",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
},
{
"name": "25189",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25189"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=307562",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=307562"
},
{ {
"name": "clamav-chmdecompressstream-dos(33636)", "name": "clamav-chmdecompressstream-dos(33636)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33636" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33636"
},
{
"name": "http://support.novell.com/techcenter/psdb/50a5cb718f20761dd7e0b6b4e0935c52.html",
"refsource": "CONFIRM",
"url": "http://support.novell.com/techcenter/psdb/50a5cb718f20761dd7e0b6b4e0935c52.html"
},
{
"name": "http://sourceforge.net/project/shownotes.php?release_id=500765",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?release_id=500765"
},
{
"name": "ADV-2007-1378",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1378"
},
{
"name": "25028",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25028"
},
{
"name": "GLSA-200704-21",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200704-21.xml"
},
{
"name": "24946",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24946"
},
{
"name": "DSA-1281",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1281"
},
{
"name": "24920",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24920"
},
{
"name": "24891",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24891"
} }
] ]
} }

View File

@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20071006 Else If cms Multiple Remote vulnerabilities", "name": "elseif-upload-file-upload(37009)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/481683/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37009"
}, },
{ {
"name": "25951", "name": "25951",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/25951" "url": "http://www.securityfocus.com/bid/25951"
}, },
{
"name": "20071006 Else If cms Multiple Remote vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/481683/100/0/threaded"
},
{ {
"name": "3204", "name": "3204",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3204" "url": "http://securityreason.com/securityalert/3204"
},
{
"name" : "elseif-upload-file-upload(37009)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/37009"
} }
] ]
} }

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "27198",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27198"
},
{
"name": "40170",
"refsource": "OSVDB",
"url": "http://osvdb.org/40170"
},
{ {
"name": "20071016 WWWISIS <= 7.1 (IsisScript) Multiple Vulnerabilities", "name": "20071016 WWWISIS <= 7.1 (IsisScript) Multiple Vulnerabilities",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -67,16 +77,6 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/26079" "url": "http://www.securityfocus.com/bid/26079"
}, },
{
"name" : "40170",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/40170"
},
{
"name" : "27198",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27198"
},
{ {
"name": "wwwisis-wxis-directory-traversal(37215)", "name": "wwwisis-wxis-directory-traversal(37215)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.netragard.com/pdfs/research/NETRAGARD-20070313-OPENBASE.txt",
"refsource" : "MISC",
"url" : "http://www.netragard.com/pdfs/research/NETRAGARD-20070313-OPENBASE.txt"
},
{ {
"name": "26347", "name": "26347",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/26347" "url": "http://www.securityfocus.com/bid/26347"
}, },
{
"name": "http://www.netragard.com/pdfs/research/NETRAGARD-20070313-OPENBASE.txt",
"refsource": "MISC",
"url": "http://www.netragard.com/pdfs/research/NETRAGARD-20070313-OPENBASE.txt"
},
{ {
"name": "27525", "name": "27525",
"refsource": "SECUNIA", "refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-3273", "ID": "CVE-2015-3273",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20150713 moodle security announcements",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2015/07/13/2"
},
{ {
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-50220", "name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-50220",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-50220" "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-50220"
}, },
{ {
"name" : "https://moodle.org/mod/forum/discuss.php?d=316663", "name": "[oss-security] 20150713 moodle security announcements",
"refsource" : "CONFIRM", "refsource": "MLIST",
"url" : "https://moodle.org/mod/forum/discuss.php?d=316663" "url": "http://openwall.com/lists/oss-security/2015/07/13/2"
}, },
{ {
"name": "1032877", "name": "1032877",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032877" "url": "http://www.securitytracker.com/id/1032877"
},
{
"name": "https://moodle.org/mod/forum/discuss.php?d=316663",
"refsource": "CONFIRM",
"url": "https://moodle.org/mod/forum/discuss.php?d=316663"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20150425 CVE requests for Drupal contributed modules (from SA-CONTRIB-2015-034 to SA-CONTRIB-2015-099)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/04/25/6"
},
{
"name" : "https://www.drupal.org/node/2459327",
"refsource" : "MISC",
"url" : "https://www.drupal.org/node/2459327"
},
{ {
"name": "https://www.drupal.org/node/2459197", "name": "https://www.drupal.org/node/2459197",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.drupal.org/node/2459197" "url": "https://www.drupal.org/node/2459197"
}, },
{
"name": "[oss-security] 20150425 CVE requests for Drupal contributed modules (from SA-CONTRIB-2015-034 to SA-CONTRIB-2015-099)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/04/25/6"
},
{ {
"name": "74340", "name": "74340",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/74340" "url": "http://www.securityfocus.com/bid/74340"
},
{
"name": "https://www.drupal.org/node/2459327",
"refsource": "MISC",
"url": "https://www.drupal.org/node/2459327"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-7076", "ID": "CVE-2015-7076",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://support.apple.com/HT205637" "url": "https://support.apple.com/HT205637"
}, },
{
"name" : "APPLE-SA-2015-12-08-3",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
},
{ {
"name": "1034344", "name": "1034344",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034344" "url": "http://www.securitytracker.com/id/1034344"
},
{
"name": "APPLE-SA-2015-12-08-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2015-7180", "ID": "CVE-2015-7180",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,15 +53,40 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.mozilla.org/security/announce/2015/mfsa2015-112.html", "name": "SUSE-SU-2015:1680",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "http://www.mozilla.org/security/announce/2015/mfsa2015-112.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html"
}, },
{ {
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1191463", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1191463",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1191463" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1191463"
}, },
{
"name": "SUSE-SU-2015:2081",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html"
},
{
"name": "openSUSE-SU-2015:1681",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html"
},
{
"name": "USN-2754-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2754-1"
},
{
"name": "http://www.mozilla.org/security/announce/2015/mfsa2015-112.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2015/mfsa2015-112.html"
},
{
"name": "USN-2743-4",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2743-4"
},
{ {
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -73,74 +98,34 @@
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
}, },
{ {
"name" : "DSA-3365", "name": "USN-2743-3",
"refsource" : "DEBIAN", "refsource": "UBUNTU",
"url" : "http://www.debian.org/security/2015/dsa-3365" "url": "http://www.ubuntu.com/usn/USN-2743-3"
},
{
"name" : "RHSA-2015:1852",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1852.html"
}, },
{ {
"name": "RHSA-2015:1834", "name": "RHSA-2015:1834",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1834.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-1834.html"
}, },
{
"name" : "SUSE-SU-2015:2081",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html"
},
{
"name" : "openSUSE-SU-2015:1658",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html"
},
{
"name" : "SUSE-SU-2015:1680",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html"
},
{
"name" : "openSUSE-SU-2015:1679",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html"
},
{
"name" : "openSUSE-SU-2015:1681",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html"
},
{
"name" : "SUSE-SU-2015:1703",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html"
},
{
"name" : "USN-2743-4",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2743-4"
},
{
"name" : "USN-2754-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2754-1"
},
{
"name" : "USN-2743-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2743-1"
},
{ {
"name": "USN-2743-2", "name": "USN-2743-2",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2743-2" "url": "http://www.ubuntu.com/usn/USN-2743-2"
}, },
{ {
"name" : "USN-2743-3", "name": "1033640",
"refsource" : "UBUNTU", "refsource": "SECTRACK",
"url" : "http://www.ubuntu.com/usn/USN-2743-3" "url": "http://www.securitytracker.com/id/1033640"
},
{
"name": "RHSA-2015:1852",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1852.html"
},
{
"name": "DSA-3365",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3365"
}, },
{ {
"name": "76816", "name": "76816",
@ -148,9 +133,24 @@
"url": "http://www.securityfocus.com/bid/76816" "url": "http://www.securityfocus.com/bid/76816"
}, },
{ {
"name" : "1033640", "name": "SUSE-SU-2015:1703",
"refsource" : "SECTRACK", "refsource": "SUSE",
"url" : "http://www.securitytracker.com/id/1033640" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html"
},
{
"name": "openSUSE-SU-2015:1679",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html"
},
{
"name": "openSUSE-SU-2015:1658",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html"
},
{
"name": "USN-2743-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2743-1"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-7520", "ID": "CVE-2015-7520",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://wicket.apache.org/news/2016/03/02/cve-2015-7520.html",
"refsource" : "CONFIRM",
"url" : "http://wicket.apache.org/news/2016/03/02/cve-2015-7520.html"
},
{ {
"name": "1035166", "name": "1035166",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035166" "url": "http://www.securitytracker.com/id/1035166"
},
{
"name": "http://wicket.apache.org/news/2016/03/02/cve-2015-7520.html",
"refsource": "CONFIRM",
"url": "http://wicket.apache.org/news/2016/03/02/cve-2015-7520.html"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "38341",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/38341/"
},
{ {
"name": "http://packetstormsecurity.com/files/133749/BisonWare-BisonFTP-3.5-Directory-Traversal.html", "name": "http://packetstormsecurity.com/files/133749/BisonWare-BisonFTP-3.5-Directory-Traversal.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/133749/BisonWare-BisonFTP-3.5-Directory-Traversal.html" "url": "http://packetstormsecurity.com/files/133749/BisonWare-BisonFTP-3.5-Directory-Traversal.html"
},
{
"name": "38341",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/38341/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-8055", "ID": "CVE-2015-8055",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "openSUSE-SU-2015:2239",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html"
},
{ {
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html", "name": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html" "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html"
}, },
{ {
"name" : "GLSA-201601-03", "name": "78715",
"refsource" : "GENTOO", "refsource": "BID",
"url" : "https://security.gentoo.org/glsa/201601-03" "url": "http://www.securityfocus.com/bid/78715"
}, },
{ {
"name": "SUSE-SU-2015:2236", "name": "SUSE-SU-2015:2236",
@ -72,20 +77,15 @@
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html"
}, },
{
"name" : "openSUSE-SU-2015:2239",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html"
},
{
"name" : "78715",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/78715"
},
{ {
"name": "1034318", "name": "1034318",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034318" "url": "http://www.securitytracker.com/id/1034318"
},
{
"name": "GLSA-201601-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201601-03"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-8197", "ID": "CVE-2015-8197",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-8500", "ID": "CVE-2015-8500",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://web.archive.org/web/20150329173628/http://www.mailenable.com/Standard-ReleaseNotes.txt",
"refsource" : "MISC",
"url" : "https://web.archive.org/web/20150329173628/http://www.mailenable.com/Standard-ReleaseNotes.txt"
},
{ {
"name": "https://www.nccgroup.trust/globalassets/our-research/uk/technical-advisories/2015/technical-advisory-multiple-vulnerabilities-in-mailenable.pdf", "name": "https://www.nccgroup.trust/globalassets/our-research/uk/technical-advisories/2015/technical-advisory-multiple-vulnerabilities-in-mailenable.pdf",
"refsource": "MISC", "refsource": "MISC",
@ -66,6 +61,11 @@
"name": "https://www.nccgroup.trust/uk/our-research/multiple-vulnerabilities-in-mailenable/", "name": "https://www.nccgroup.trust/uk/our-research/multiple-vulnerabilities-in-mailenable/",
"refsource": "MISC", "refsource": "MISC",
"url": "https://www.nccgroup.trust/uk/our-research/multiple-vulnerabilities-in-mailenable/" "url": "https://www.nccgroup.trust/uk/our-research/multiple-vulnerabilities-in-mailenable/"
},
{
"name": "https://web.archive.org/web/20150329173628/http://www.mailenable.com/Standard-ReleaseNotes.txt",
"refsource": "MISC",
"url": "https://web.archive.org/web/20150329173628/http://www.mailenable.com/Standard-ReleaseNotes.txt"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-0009", "ID": "CVE-2016-0009",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-0194", "ID": "CVE-2016-0194",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "90004",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/90004"
},
{ {
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-275", "name": "http://www.zerodayinitiative.com/advisories/ZDI-16-275",
"refsource": "MISC", "refsource": "MISC",
@ -62,11 +67,6 @@
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-051" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-051"
}, },
{
"name" : "90004",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/90004"
},
{ {
"name": "1035820", "name": "1035820",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1478", "ID": "CVE-2016-1478",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20160804 Cisco IOS Software Crafted Network Time Protocol Packets Denial of Service Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160804-wedge"
},
{ {
"name": "92317", "name": "92317",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/92317" "url": "http://www.securityfocus.com/bid/92317"
}, },
{
"name": "20160804 Cisco IOS Software Crafted Network Time Protocol Packets Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160804-wedge"
},
{ {
"name": "1036541", "name": "1036541",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2016-1560", "ID": "CVE-2016-1560",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html" "url": "http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html"
}, },
{
"name" : "http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey",
"refsource" : "MISC",
"url" : "http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey"
},
{ {
"name": "https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials", "name": "https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials",
"refsource": "MISC", "refsource": "MISC",
"url": "https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials" "url": "https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials"
},
{
"name": "http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey",
"refsource": "MISC",
"url": "http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2016-1764", "ID": "CVE-2016-1764",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://support.apple.com/HT206167",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206167"
},
{ {
"name": "APPLE-SA-2016-03-21-5", "name": "APPLE-SA-2016-03-21-5",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html" "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html"
}, },
{
"name": "https://support.apple.com/HT206167",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206167"
},
{ {
"name": "1035363", "name": "1035363",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2016-1766", "ID": "CVE-2016-1766",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,9 +58,9 @@
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-314" "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-314"
}, },
{ {
"name" : "https://support.apple.com/HT206166", "name": "1035353",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://support.apple.com/HT206166" "url": "http://www.securitytracker.com/id/1035353"
}, },
{ {
"name": "APPLE-SA-2016-03-21-1", "name": "APPLE-SA-2016-03-21-1",
@ -68,9 +68,9 @@
"url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html" "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html"
}, },
{ {
"name" : "1035353", "name": "https://support.apple.com/HT206166",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1035353" "url": "https://support.apple.com/HT206166"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2016-1810", "ID": "CVE-2016-1810",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://httpoxy.org/", "name": "FEDORA-2016-8eb11666aa",
"refsource" : "MISC", "refsource": "FEDORA",
"url" : "https://httpoxy.org/" "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7RMYXAVNYL2MOBJTFATE73TOVOEZYC5R/"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1353794",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1353794"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
}, },
{ {
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149", "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149",
@ -78,104 +68,114 @@
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05333297" "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05333297"
}, },
{ {
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722", "name": "VU#797896",
"refsource" : "CONFIRM", "refsource": "CERT-VN",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722" "url": "http://www.kb.cert.org/vuls/id/797896"
},
{
"name" : "https://github.com/guzzle/guzzle/releases/tag/6.2.1",
"refsource" : "CONFIRM",
"url" : "https://github.com/guzzle/guzzle/releases/tag/6.2.1"
},
{
"name" : "https://www.drupal.org/SA-CORE-2016-003",
"refsource" : "CONFIRM",
"url" : "https://www.drupal.org/SA-CORE-2016-003"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
},
{
"name" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us"
}, },
{ {
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", "name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
}, },
{
"name" : "DSA-3631",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3631"
},
{
"name" : "FEDORA-2016-4e7db3d437",
"refsource" : "FEDORA",
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KZOIUYZDBWNDDHC6XTOLZYRMRXZWTJCP/"
},
{
"name" : "FEDORA-2016-8eb11666aa",
"refsource" : "FEDORA",
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7RMYXAVNYL2MOBJTFATE73TOVOEZYC5R/"
},
{
"name" : "FEDORA-2016-9c8cf5912c",
"refsource" : "FEDORA",
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXFEIMZPSVGZQQAYIQ7U7DFVX3IBSDLF/"
},
{ {
"name": "GLSA-201611-22", "name": "GLSA-201611-22",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201611-22" "url": "https://security.gentoo.org/glsa/201611-22"
}, },
{
"name" : "RHSA-2016:1609",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1609.html"
},
{
"name" : "RHSA-2016:1610",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1610.html"
},
{
"name" : "RHSA-2016:1611",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1611.html"
},
{
"name" : "RHSA-2016:1612",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1612.html"
},
{
"name" : "RHSA-2016:1613",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1613.html"
},
{ {
"name": "openSUSE-SU-2016:1922", "name": "openSUSE-SU-2016:1922",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html" "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html"
}, },
{ {
"name" : "VU#797896", "name": "https://www.drupal.org/SA-CORE-2016-003",
"refsource" : "CERT-VN", "refsource": "CONFIRM",
"url" : "http://www.kb.cert.org/vuls/id/797896" "url": "https://www.drupal.org/SA-CORE-2016-003"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
},
{
"name": "RHSA-2016:1613",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1613.html"
},
{
"name": "RHSA-2016:1611",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1611.html"
},
{
"name": "RHSA-2016:1610",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1610.html"
},
{
"name": "DSA-3631",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3631"
}, },
{ {
"name": "91821", "name": "91821",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/91821" "url": "http://www.securityfocus.com/bid/91821"
}, },
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
},
{
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us"
},
{
"name": "FEDORA-2016-4e7db3d437",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KZOIUYZDBWNDDHC6XTOLZYRMRXZWTJCP/"
},
{
"name": "RHSA-2016:1609",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1609.html"
},
{ {
"name": "1036335", "name": "1036335",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036335" "url": "http://www.securitytracker.com/id/1036335"
},
{
"name": "https://httpoxy.org/",
"refsource": "MISC",
"url": "https://httpoxy.org/"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
},
{
"name": "RHSA-2016:1612",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1612.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1353794",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1353794"
},
{
"name": "FEDORA-2016-9c8cf5912c",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXFEIMZPSVGZQQAYIQ7U7DFVX3IBSDLF/"
},
{
"name": "https://github.com/guzzle/guzzle/releases/tag/6.2.1",
"refsource": "CONFIRM",
"url": "https://github.com/guzzle/guzzle/releases/tag/6.2.1"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1371428",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1371428"
},
{ {
"name": "https://gerrit.ovirt.org/#/q/I40c88ad48f8f7c2b8e06802137870b0c198b5129", "name": "https://gerrit.ovirt.org/#/q/I40c88ad48f8f7c2b8e06802137870b0c198b5129",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -67,6 +62,11 @@
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1967.html" "url": "http://rhn.redhat.com/errata/RHSA-2016-1967.html"
}, },
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1371428",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1371428"
},
{ {
"name": "92694", "name": "92694",
"refsource": "BID", "refsource": "BID",

View File

@ -79,25 +79,40 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "name": "RHSA-2017:0338",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
},
{
"name" : "https://security.netapp.com/advisory/ntap-20170119-0001/",
"refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20170119-0001/"
}, },
{ {
"name": "DSA-3782", "name": "DSA-3782",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3782" "url": "http://www.debian.org/security/2017/dsa-3782"
}, },
{
"name": "RHSA-2017:0176",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
},
{ {
"name": "GLSA-201701-65", "name": "GLSA-201701-65",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-65" "url": "https://security.gentoo.org/glsa/201701-65"
}, },
{
"name": "RHSA-2017:0180",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
},
{
"name": "95506",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95506"
},
{
"name": "1037637",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037637"
},
{ {
"name": "GLSA-201707-01", "name": "GLSA-201707-01",
"refsource": "GENTOO", "refsource": "GENTOO",
@ -108,35 +123,35 @@
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
}, },
{
"name" : "RHSA-2017:0176",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
},
{ {
"name": "RHSA-2017:0177", "name": "RHSA-2017:0177",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
}, },
{
"name" : "RHSA-2017:0180",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
},
{ {
"name": "RHSA-2017:0263", "name": "RHSA-2017:0263",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
}, },
{
"name": "RHSA-2017:1216",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1216"
},
{
"name": "https://security.netapp.com/advisory/ntap-20170119-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
},
{ {
"name": "RHSA-2017:0269", "name": "RHSA-2017:0269",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
}, },
{ {
"name" : "RHSA-2017:0336", "name": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0336.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
}, },
{ {
"name": "RHSA-2017:0337", "name": "RHSA-2017:0337",
@ -144,24 +159,9 @@
"url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
}, },
{ {
"name" : "RHSA-2017:0338", "name": "RHSA-2017:0336",
"refsource": "REDHAT", "refsource": "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0338.html" "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
},
{
"name" : "RHSA-2017:1216",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1216"
},
{
"name" : "95506",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/95506"
},
{
"name" : "1037637",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1037637"
} }
] ]
} }

View File

@ -65,70 +65,80 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "RHSA-2018:2254",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2254"
},
{ {
"name": "[debian-lts-announce] 20181122 [SECURITY] [DLA 1590-1] openjdk-7 security update", "name": "[debian-lts-announce] 20181122 [SECURITY] [DLA 1590-1] openjdk-7 security update",
"refsource": "MLIST", "refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00026.html" "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00026.html"
}, },
{
"name": "RHSA-2018:3007",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3007"
},
{
"name": "104765",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104765"
},
{ {
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
}, },
{
"name": "RHSA-2018:2713",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2713"
},
{ {
"name": "https://security.netapp.com/advisory/ntap-20180726-0001/", "name": "https://security.netapp.com/advisory/ntap-20180726-0001/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180726-0001/" "url": "https://security.netapp.com/advisory/ntap-20180726-0001/"
}, },
{
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03882en_us",
"refsource" : "CONFIRM",
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03882en_us"
},
{
"name" : "DSA-4268",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4268"
},
{
"name" : "RHSA-2018:2241",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:2241"
},
{ {
"name": "RHSA-2018:2242", "name": "RHSA-2018:2242",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2242" "url": "https://access.redhat.com/errata/RHSA-2018:2242"
}, },
{
"name" : "RHSA-2018:2253",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:2253"
},
{
"name" : "RHSA-2018:2254",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:2254"
},
{ {
"name": "RHSA-2018:2255", "name": "RHSA-2018:2255",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2255" "url": "https://access.redhat.com/errata/RHSA-2018:2255"
}, },
{
"name": "USN-3747-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3747-1/"
},
{
"name": "RHSA-2018:2575",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2575"
},
{ {
"name": "RHSA-2018:2256", "name": "RHSA-2018:2256",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2256" "url": "https://access.redhat.com/errata/RHSA-2018:2256"
}, },
{ {
"name" : "RHSA-2018:2283", "name": "RHSA-2018:2576",
"refsource": "REDHAT", "refsource": "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:2283" "url": "https://access.redhat.com/errata/RHSA-2018:2576"
}, },
{ {
"name" : "RHSA-2018:2286", "name": "RHSA-2018:2241",
"refsource": "REDHAT", "refsource": "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:2286" "url": "https://access.redhat.com/errata/RHSA-2018:2241"
},
{
"name": "RHSA-2018:2253",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2253"
}, },
{ {
"name": "RHSA-2018:2568", "name": "RHSA-2018:2568",
@ -141,59 +151,49 @@
"url": "https://access.redhat.com/errata/RHSA-2018:2569" "url": "https://access.redhat.com/errata/RHSA-2018:2569"
}, },
{ {
"name" : "RHSA-2018:2575", "name": "USN-3735-1",
"refsource" : "REDHAT", "refsource": "UBUNTU",
"url" : "https://access.redhat.com/errata/RHSA-2018:2575" "url": "https://usn.ubuntu.com/3735-1/"
},
{
"name" : "RHSA-2018:2576",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:2576"
}, },
{ {
"name": "RHSA-2018:2712", "name": "RHSA-2018:2712",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2712" "url": "https://access.redhat.com/errata/RHSA-2018:2712"
}, },
{
"name" : "RHSA-2018:2713",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:2713"
},
{
"name" : "RHSA-2018:3007",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:3007"
},
{ {
"name": "RHSA-2018:3008", "name": "RHSA-2018:3008",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3008" "url": "https://access.redhat.com/errata/RHSA-2018:3008"
}, },
{ {
"name" : "USN-3734-1", "name": "RHSA-2018:2286",
"refsource" : "UBUNTU", "refsource": "REDHAT",
"url" : "https://usn.ubuntu.com/3734-1/" "url": "https://access.redhat.com/errata/RHSA-2018:2286"
}, },
{ {
"name" : "USN-3735-1", "name": "DSA-4268",
"refsource" : "UBUNTU", "refsource": "DEBIAN",
"url" : "https://usn.ubuntu.com/3735-1/" "url": "https://www.debian.org/security/2018/dsa-4268"
}, },
{ {
"name" : "USN-3747-1", "name": "RHSA-2018:2283",
"refsource" : "UBUNTU", "refsource": "REDHAT",
"url" : "https://usn.ubuntu.com/3747-1/" "url": "https://access.redhat.com/errata/RHSA-2018:2283"
},
{
"name" : "104765",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/104765"
}, },
{ {
"name": "1041302", "name": "1041302",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041302" "url": "http://www.securitytracker.com/id/1041302"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03882en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03882en_us"
},
{
"name": "USN-3734-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3734-1/"
} }
] ]
} }