mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
6804d3ee1c
commit
5eeb338977
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "I-042",
|
|
||||||
"refsource" : "CIAC",
|
|
||||||
"url" : "http://www.ciac.org/ciac/bulletins/i-042.shtml"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "19980402-01-PX",
|
"name": "19980402-01-PX",
|
||||||
"refsource": "SGI",
|
"refsource": "SGI",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "707",
|
"name": "707",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/707"
|
"url": "http://www.securityfocus.com/bid/707"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "I-042",
|
||||||
|
"refsource": "CIAC",
|
||||||
|
"url": "http://www.ciac.org/ciac/bulletins/i-042.shtml"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "19971224 Quake II Remote Denial of Service",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/8282"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "quake2-dos(698)",
|
"name": "quake2-dos(698)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/698"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/698"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "19971224 Quake II Remote Denial of Service",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/8282"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,24 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391",
|
"name": "20050204 [USN-75-1] cpio vulnerability",
|
||||||
"refsource" : "MISC",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391"
|
"url": "http://marc.info/?l=bugtraq&m=110763404701519&w=2"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-664",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2005/dsa-664"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDKSA-2005:032",
|
|
||||||
"refsource" : "MANDRAKE",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:032"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2005:073",
|
"name": "RHSA-2005:073",
|
||||||
@ -78,34 +63,9 @@
|
|||||||
"url": "http://www.redhat.com/support/errata/RHSA-2005-073.html"
|
"url": "http://www.redhat.com/support/errata/RHSA-2005-073.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2005:080",
|
"name": "cpio-o-archive-insecure-permissions(19167)",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "XF",
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2005-080.html"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19167"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2005:806",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2005-806.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "2005-0003",
|
|
||||||
"refsource" : "TRUSTIX",
|
|
||||||
"url" : "http://www.trustix.org/errata/2005/0003/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20050204 [USN-75-1] cpio vulnerability",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=110763404701519&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:10888",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10888"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "14357",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/14357"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "17063",
|
"name": "17063",
|
||||||
@ -118,9 +78,49 @@
|
|||||||
"url": "http://secunia.com/advisories/17532"
|
"url": "http://secunia.com/advisories/17532"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "cpio-o-archive-insecure-permissions(19167)",
|
"name": "2005-0003",
|
||||||
"refsource" : "XF",
|
"refsource": "TRUSTIX",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/19167"
|
"url": "http://www.trustix.org/errata/2005/0003/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2005:080",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2005-080.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:10888",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10888"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "14357",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/14357"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDKSA-2005:032",
|
||||||
|
"refsource": "MANDRAKE",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:032"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-664",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2005/dsa-664"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2005:806",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2005-806.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "8098",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/8098"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "MS99-058",
|
"name": "MS99-058",
|
||||||
"refsource": "MS",
|
"refsource": "MS",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "Q238606",
|
"name": "Q238606",
|
||||||
"refsource": "MSKB",
|
"refsource": "MSKB",
|
||||||
"url": "http://support.microsoft.com/default.aspx?scid=kb;[LN];Q238606"
|
"url": "http://support.microsoft.com/default.aspx?scid=kb;[LN];Q238606"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "8098",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/8098"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "19991019 Security hole in cdwtools < 093",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://www.novell.com/linux/security/advisories/suse_security_announce_25.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "738",
|
"name": "738",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/738"
|
"url": "http://www.securityfocus.com/bid/738"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "19991019 Security hole in cdwtools < 093",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://www.novell.com/linux/security/advisories/suse_security_announce_25.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.lsoft.com/news/default.asp?item=Advisory0",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.lsoft.com/news/default.asp?item=Advisory0"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20000505 Alert: Listserv Web Archives (wa) buffer overflow",
|
"name": "20000505 Alert: Listserv Web Archives (wa) buffer overflow",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-05/0048.html"
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-05/0048.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.lsoft.com/news/default.asp?item=Advisory0",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.lsoft.com/news/default.asp?item=Advisory0"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1167",
|
"name": "1167",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
|
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20000607 [ Hackerslab bug_paper ] HP-UX SNMP daemon vulnerability",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/templates/archive.pike?list=1&msg=200006070511.OAA05492@dogfoot.hackerslab.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20000608 Re: HP-UX SNMP daemon vulnerability",
|
"name": "20000608 Re: HP-UX SNMP daemon vulnerability",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/templates/archive.pike?list=1&msg=200006090640.XAA00779@hpchs.cup.hp.com"
|
"url": "http://www.securityfocus.com/templates/archive.pike?list=1&msg=200006090640.XAA00779@hpchs.cup.hp.com"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "hpux-snmp-daemon(4643)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4643"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1327",
|
"name": "1327",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/1327"
|
"url": "http://www.securityfocus.com/bid/1327"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "hpux-snmp-daemon(4643)",
|
"name": "20000607 [ Hackerslab bug_paper ] HP-UX SNMP daemon vulnerability",
|
||||||
"refsource" : "XF",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/4643"
|
"url": "http://www.securityfocus.com/templates/archive.pike?list=1&msg=200006070511.OAA05492@dogfoot.hackerslab.org"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20000630 Kerberos security vulnerability in SSH-1.2.27",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=96256265914116&w=2"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1426",
|
"name": "1426",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "ssh-kerberos-tickets-disclosure(4903)",
|
"name": "ssh-kerberos-tickets-disclosure(4903)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4903"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4903"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20000630 Kerberos security vulnerability in SSH-1.2.27",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=96256265914116&w=2"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2000:044",
|
"name": "20000801 MDKSA-2000:029 pam update",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2000-044.html"
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0455.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "20000727 CONECTIVA LINUX SECURITY ANNOUNCEMENT - PAM",
|
"name": "20000727 CONECTIVA LINUX SECURITY ANNOUNCEMENT - PAM",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0398.html"
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0398.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20000801 MDKSA-2000:029 pam update",
|
"name": "linux-pam-console(5001)",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "XF",
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-07/0455.html"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5001"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1513",
|
"name": "1513",
|
||||||
@ -73,9 +73,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/1513"
|
"url": "http://www.securityfocus.com/bid/1513"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "linux-pam-console(5001)",
|
"name": "RHSA-2000:044",
|
||||||
"refsource" : "XF",
|
"refsource": "REDHAT",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5001"
|
"url": "http://www.redhat.com/support/errata/RHSA-2000-044.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,30 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20070211 Arbitrary file disclosure vulnerability in IP3 NetAccess < 4.1.9.6",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/459806/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20070211 Arbitrary file disclosure vulnerability in IP3 NetAccess < 4.1.9.6",
|
|
||||||
"refsource" : "FULLDISC",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0235.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.devtarget.org/ip3-advisory-02-2007.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.devtarget.org/ip3-advisory-02-2007.txt"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "3294",
|
"name": "3294",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "https://www.exploit-db.com/exploits/3294"
|
"url": "https://www.exploit-db.com/exploits/3294"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "22513",
|
"name": "ip3netaccess-getfile-directory-traversal(32432)",
|
||||||
"refsource" : "BID",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/bid/22513"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32432"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2007-0615",
|
"name": "ADV-2007-0615",
|
||||||
@ -83,24 +68,39 @@
|
|||||||
"url": "http://www.vupen.com/english/advisories/2007/0615"
|
"url": "http://www.vupen.com/english/advisories/2007/0615"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "31912",
|
"name": "20070211 Arbitrary file disclosure vulnerability in IP3 NetAccess < 4.1.9.6",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://osvdb.org/31912"
|
"url": "http://www.securityfocus.com/archive/1/459806/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1017623",
|
"name": "1017623",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id?1017623"
|
"url": "http://www.securitytracker.com/id?1017623"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "31912",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/31912"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "24118",
|
"name": "24118",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/24118"
|
"url": "http://secunia.com/advisories/24118"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ip3netaccess-getfile-directory-traversal(32432)",
|
"name": "20070211 Arbitrary file disclosure vulnerability in IP3 NetAccess < 4.1.9.6",
|
||||||
"refsource" : "XF",
|
"refsource": "FULLDISC",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32432"
|
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0235.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "22513",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/22513"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.devtarget.org/ip3-advisory-02-2007.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.devtarget.org/ip3-advisory-02-2007.txt"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "33759",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/33759"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2007-0740",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2007/0740"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20070223 Simple one-file gallery",
|
"name": "20070223 Simple one-file gallery",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
@ -62,21 +72,6 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/22700"
|
"url": "http://www.securityfocus.com/bid/22700"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "ADV-2007-0740",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/0740"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "33759",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/33759"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "24292",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/24292"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "2292",
|
"name": "2292",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
@ -86,6 +81,11 @@
|
|||||||
"name": "sofg-gallery-xss(32655)",
|
"name": "sofg-gallery-xss(32655)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32655"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32655"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "24292",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/24292"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20070301 Built2Go v.1.0 => ( news.php & rating.php ) Cross Site Scripting",
|
"name": "24334",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/461672/100/0/threaded"
|
"url": "http://secunia.com/advisories/24334"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "22783",
|
"name": "22783",
|
||||||
@ -63,14 +63,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/22783"
|
"url": "http://www.securityfocus.com/bid/22783"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2007-0818",
|
"name": "newsmanagerblog-news-rating-xss(32772)",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "XF",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/0818"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32772"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "24334",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/24334"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "2343",
|
"name": "2343",
|
||||||
@ -78,9 +73,14 @@
|
|||||||
"url": "http://securityreason.com/securityalert/2343"
|
"url": "http://securityreason.com/securityalert/2343"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "newsmanagerblog-news-rating-xss(32772)",
|
"name": "20070301 Built2Go v.1.0 => ( news.php & rating.php ) Cross Site Scripting",
|
||||||
"refsource" : "XF",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32772"
|
"url": "http://www.securityfocus.com/archive/1/461672/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2007-0818",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2007/0818"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,44 +53,14 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://sourceforge.net/project/shownotes.php?release_id=500765",
|
"name": "25022",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://sourceforge.net/project/shownotes.php?release_id=500765"
|
"url": "http://secunia.com/advisories/25022"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://support.novell.com/techcenter/psdb/50a5cb718f20761dd7e0b6b4e0935c52.html",
|
"name": "34913",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://support.novell.com/techcenter/psdb/50a5cb718f20761dd7e0b6b4e0935c52.html"
|
"url": "http://osvdb.org/34913"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://docs.info.apple.com/article.html?artnum=307562",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://docs.info.apple.com/article.html?artnum=307562"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2008-03-18",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-1281",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2007/dsa-1281"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-200704-21",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "http://security.gentoo.org/glsa/glsa-200704-21.xml"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDKSA-2007:098",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:098"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SA:2007:026",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://www.novell.com/linux/security/advisories/2007_26_clamav.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "2007-0013",
|
"name": "2007-0013",
|
||||||
@ -103,9 +73,14 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/23473"
|
"url": "http://www.securityfocus.com/bid/23473"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2007-1378",
|
"name": "24996",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/1378"
|
"url": "http://secunia.com/advisories/24996"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDKSA-2007:098",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:098"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2008-0924",
|
"name": "ADV-2008-0924",
|
||||||
@ -113,54 +88,79 @@
|
|||||||
"url": "http://www.vupen.com/english/advisories/2008/0924/references"
|
"url": "http://www.vupen.com/english/advisories/2008/0924/references"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "34913",
|
"name": "SUSE-SA:2007:026",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "SUSE",
|
||||||
"url" : "http://osvdb.org/34913"
|
"url": "http://www.novell.com/linux/security/advisories/2007_26_clamav.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "24891",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/24891"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "24920",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/24920"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "24946",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/24946"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "24996",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/24996"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "25022",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/25022"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "25028",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/25028"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "25189",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/25189"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "29420",
|
"name": "29420",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/29420"
|
"url": "http://secunia.com/advisories/29420"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2008-03-18",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "25189",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/25189"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://docs.info.apple.com/article.html?artnum=307562",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://docs.info.apple.com/article.html?artnum=307562"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "clamav-chmdecompressstream-dos(33636)",
|
"name": "clamav-chmdecompressstream-dos(33636)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33636"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33636"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.novell.com/techcenter/psdb/50a5cb718f20761dd7e0b6b4e0935c52.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.novell.com/techcenter/psdb/50a5cb718f20761dd7e0b6b4e0935c52.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://sourceforge.net/project/shownotes.php?release_id=500765",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://sourceforge.net/project/shownotes.php?release_id=500765"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2007-1378",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2007/1378"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "25028",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/25028"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-200704-21",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "http://security.gentoo.org/glsa/glsa-200704-21.xml"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "24946",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/24946"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-1281",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2007/dsa-1281"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "24920",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/24920"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "24891",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/24891"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,24 +53,24 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20071006 Else If cms Multiple Remote vulnerabilities",
|
"name": "elseif-upload-file-upload(37009)",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/481683/100/0/threaded"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37009"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "25951",
|
"name": "25951",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/25951"
|
"url": "http://www.securityfocus.com/bid/25951"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20071006 Else If cms Multiple Remote vulnerabilities",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/481683/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "3204",
|
"name": "3204",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/3204"
|
"url": "http://securityreason.com/securityalert/3204"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "elseif-upload-file-upload(37009)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/37009"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "27198",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/27198"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "40170",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/40170"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20071016 WWWISIS <= 7.1 (IsisScript) Multiple Vulnerabilities",
|
"name": "20071016 WWWISIS <= 7.1 (IsisScript) Multiple Vulnerabilities",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
@ -67,16 +77,6 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/26079"
|
"url": "http://www.securityfocus.com/bid/26079"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "40170",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/40170"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "27198",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/27198"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "wwwisis-wxis-directory-traversal(37215)",
|
"name": "wwwisis-wxis-directory-traversal(37215)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.netragard.com/pdfs/research/NETRAGARD-20070313-OPENBASE.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.netragard.com/pdfs/research/NETRAGARD-20070313-OPENBASE.txt"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "26347",
|
"name": "26347",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/26347"
|
"url": "http://www.securityfocus.com/bid/26347"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.netragard.com/pdfs/research/NETRAGARD-20070313-OPENBASE.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.netragard.com/pdfs/research/NETRAGARD-20070313-OPENBASE.txt"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "27525",
|
"name": "27525",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2015-3273",
|
"ID": "CVE-2015-3273",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20150713 moodle security announcements",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://openwall.com/lists/oss-security/2015/07/13/2"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-50220",
|
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-50220",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-50220"
|
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-50220"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://moodle.org/mod/forum/discuss.php?d=316663",
|
"name": "[oss-security] 20150713 moodle security announcements",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "MLIST",
|
||||||
"url" : "https://moodle.org/mod/forum/discuss.php?d=316663"
|
"url": "http://openwall.com/lists/oss-security/2015/07/13/2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1032877",
|
"name": "1032877",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1032877"
|
"url": "http://www.securitytracker.com/id/1032877"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://moodle.org/mod/forum/discuss.php?d=316663",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://moodle.org/mod/forum/discuss.php?d=316663"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20150425 CVE requests for Drupal contributed modules (from SA-CONTRIB-2015-034 to SA-CONTRIB-2015-099)",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2015/04/25/6"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://www.drupal.org/node/2459327",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://www.drupal.org/node/2459327"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://www.drupal.org/node/2459197",
|
"name": "https://www.drupal.org/node/2459197",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://www.drupal.org/node/2459197"
|
"url": "https://www.drupal.org/node/2459197"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20150425 CVE requests for Drupal contributed modules (from SA-CONTRIB-2015-034 to SA-CONTRIB-2015-099)",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2015/04/25/6"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "74340",
|
"name": "74340",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/74340"
|
"url": "http://www.securityfocus.com/bid/74340"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.drupal.org/node/2459327",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://www.drupal.org/node/2459327"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2015-7076",
|
"ID": "CVE-2015-7076",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,15 +57,15 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://support.apple.com/HT205637"
|
"url": "https://support.apple.com/HT205637"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2015-12-08-3",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1034344",
|
"name": "1034344",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1034344"
|
"url": "http://www.securitytracker.com/id/1034344"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2015-12-08-3",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@mozilla.org",
|
||||||
"ID": "CVE-2015-7180",
|
"ID": "CVE-2015-7180",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,15 +53,40 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.mozilla.org/security/announce/2015/mfsa2015-112.html",
|
"name": "SUSE-SU-2015:1680",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SUSE",
|
||||||
"url" : "http://www.mozilla.org/security/announce/2015/mfsa2015-112.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1191463",
|
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1191463",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1191463"
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1191463"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2015:2081",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2015:1681",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-2754-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2754-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.mozilla.org/security/announce/2015/mfsa2015-112.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.mozilla.org/security/announce/2015/mfsa2015-112.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-2743-4",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2743-4"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -73,74 +98,34 @@
|
|||||||
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
|
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "DSA-3365",
|
"name": "USN-2743-3",
|
||||||
"refsource" : "DEBIAN",
|
"refsource": "UBUNTU",
|
||||||
"url" : "http://www.debian.org/security/2015/dsa-3365"
|
"url": "http://www.ubuntu.com/usn/USN-2743-3"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2015:1852",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1852.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2015:1834",
|
"name": "RHSA-2015:1834",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1834.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-1834.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2015:2081",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2015:1658",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2015:1680",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2015:1679",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2015:1681",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2015:1703",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-2743-4",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2743-4"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-2754-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2754-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-2743-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2743-1"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "USN-2743-2",
|
"name": "USN-2743-2",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-2743-2"
|
"url": "http://www.ubuntu.com/usn/USN-2743-2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "USN-2743-3",
|
"name": "1033640",
|
||||||
"refsource" : "UBUNTU",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2743-3"
|
"url": "http://www.securitytracker.com/id/1033640"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2015:1852",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-1852.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3365",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2015/dsa-3365"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "76816",
|
"name": "76816",
|
||||||
@ -148,9 +133,24 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/76816"
|
"url": "http://www.securityfocus.com/bid/76816"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1033640",
|
"name": "SUSE-SU-2015:1703",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "SUSE",
|
||||||
"url" : "http://www.securitytracker.com/id/1033640"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2015:1679",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2015:1658",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-2743-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2743-1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2015-7520",
|
"ID": "CVE-2015-7520",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://wicket.apache.org/news/2016/03/02/cve-2015-7520.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://wicket.apache.org/news/2016/03/02/cve-2015-7520.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1035166",
|
"name": "1035166",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1035166"
|
"url": "http://www.securitytracker.com/id/1035166"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://wicket.apache.org/news/2016/03/02/cve-2015-7520.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://wicket.apache.org/news/2016/03/02/cve-2015-7520.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "38341",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/38341/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://packetstormsecurity.com/files/133749/BisonWare-BisonFTP-3.5-Directory-Traversal.html",
|
"name": "http://packetstormsecurity.com/files/133749/BisonWare-BisonFTP-3.5-Directory-Traversal.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://packetstormsecurity.com/files/133749/BisonWare-BisonFTP-3.5-Directory-Traversal.html"
|
"url": "http://packetstormsecurity.com/files/133749/BisonWare-BisonFTP-3.5-Directory-Traversal.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "38341",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/38341/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2015-8055",
|
"ID": "CVE-2015-8055",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,20 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2015:2239",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html",
|
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html"
|
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "GLSA-201601-03",
|
"name": "78715",
|
||||||
"refsource" : "GENTOO",
|
"refsource": "BID",
|
||||||
"url" : "https://security.gentoo.org/glsa/201601-03"
|
"url": "http://www.securityfocus.com/bid/78715"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2015:2236",
|
"name": "SUSE-SU-2015:2236",
|
||||||
@ -72,20 +77,15 @@
|
|||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2015:2239",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "78715",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/78715"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1034318",
|
"name": "1034318",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1034318"
|
"url": "http://www.securitytracker.com/id/1034318"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201601-03",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "https://security.gentoo.org/glsa/201601-03"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2015-8197",
|
"ID": "CVE-2015-8197",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2015-8500",
|
"ID": "CVE-2015-8500",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://web.archive.org/web/20150329173628/http://www.mailenable.com/Standard-ReleaseNotes.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://web.archive.org/web/20150329173628/http://www.mailenable.com/Standard-ReleaseNotes.txt"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://www.nccgroup.trust/globalassets/our-research/uk/technical-advisories/2015/technical-advisory-multiple-vulnerabilities-in-mailenable.pdf",
|
"name": "https://www.nccgroup.trust/globalassets/our-research/uk/technical-advisories/2015/technical-advisory-multiple-vulnerabilities-in-mailenable.pdf",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "https://www.nccgroup.trust/uk/our-research/multiple-vulnerabilities-in-mailenable/",
|
"name": "https://www.nccgroup.trust/uk/our-research/multiple-vulnerabilities-in-mailenable/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://www.nccgroup.trust/uk/our-research/multiple-vulnerabilities-in-mailenable/"
|
"url": "https://www.nccgroup.trust/uk/our-research/multiple-vulnerabilities-in-mailenable/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://web.archive.org/web/20150329173628/http://www.mailenable.com/Standard-ReleaseNotes.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://web.archive.org/web/20150329173628/http://www.mailenable.com/Standard-ReleaseNotes.txt"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2016-0009",
|
"ID": "CVE-2016-0009",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2016-0194",
|
"ID": "CVE-2016-0194",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "90004",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/90004"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-275",
|
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-275",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -62,11 +67,6 @@
|
|||||||
"refsource": "MS",
|
"refsource": "MS",
|
||||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-051"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-051"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "90004",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/90004"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1035820",
|
"name": "1035820",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2016-1478",
|
"ID": "CVE-2016-1478",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20160804 Cisco IOS Software Crafted Network Time Protocol Packets Denial of Service Vulnerability",
|
|
||||||
"refsource" : "CISCO",
|
|
||||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160804-wedge"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "92317",
|
"name": "92317",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/92317"
|
"url": "http://www.securityfocus.com/bid/92317"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20160804 Cisco IOS Software Crafted Network Time Protocol Packets Denial of Service Vulnerability",
|
||||||
|
"refsource": "CISCO",
|
||||||
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160804-wedge"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1036541",
|
"name": "1036541",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2016-1560",
|
"ID": "CVE-2016-1560",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,15 +57,15 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html"
|
"url": "http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials",
|
"name": "https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials"
|
"url": "https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2016-1764",
|
"ID": "CVE-2016-1764",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT206167",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT206167"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2016-03-21-5",
|
"name": "APPLE-SA-2016-03-21-5",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
"url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html"
|
"url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT206167",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT206167"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1035363",
|
"name": "1035363",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2016-1766",
|
"ID": "CVE-2016-1766",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -58,9 +58,9 @@
|
|||||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-314"
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-314"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://support.apple.com/HT206166",
|
"name": "1035353",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://support.apple.com/HT206166"
|
"url": "http://www.securitytracker.com/id/1035353"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2016-03-21-1",
|
"name": "APPLE-SA-2016-03-21-1",
|
||||||
@ -68,9 +68,9 @@
|
|||||||
"url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html"
|
"url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1035353",
|
"name": "https://support.apple.com/HT206166",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securitytracker.com/id/1035353"
|
"url": "https://support.apple.com/HT206166"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2016-1810",
|
"ID": "CVE-2016-1810",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -53,19 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://httpoxy.org/",
|
"name": "FEDORA-2016-8eb11666aa",
|
||||||
"refsource" : "MISC",
|
"refsource": "FEDORA",
|
||||||
"url" : "https://httpoxy.org/"
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7RMYXAVNYL2MOBJTFATE73TOVOEZYC5R/"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1353794",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1353794"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149",
|
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149",
|
||||||
@ -78,104 +68,114 @@
|
|||||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05333297"
|
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05333297"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
|
"name": "VU#797896",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "CERT-VN",
|
||||||
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
|
"url": "http://www.kb.cert.org/vuls/id/797896"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://github.com/guzzle/guzzle/releases/tag/6.2.1",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://github.com/guzzle/guzzle/releases/tag/6.2.1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://www.drupal.org/SA-CORE-2016-003",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.drupal.org/SA-CORE-2016-003"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "DSA-3631",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2016/dsa-3631"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2016-4e7db3d437",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KZOIUYZDBWNDDHC6XTOLZYRMRXZWTJCP/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2016-8eb11666aa",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7RMYXAVNYL2MOBJTFATE73TOVOEZYC5R/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2016-9c8cf5912c",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXFEIMZPSVGZQQAYIQ7U7DFVX3IBSDLF/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "GLSA-201611-22",
|
"name": "GLSA-201611-22",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "https://security.gentoo.org/glsa/201611-22"
|
"url": "https://security.gentoo.org/glsa/201611-22"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:1609",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1609.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:1610",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1610.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:1611",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1611.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:1612",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1612.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:1613",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1613.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2016:1922",
|
"name": "openSUSE-SU-2016:1922",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "VU#797896",
|
"name": "https://www.drupal.org/SA-CORE-2016-003",
|
||||||
"refsource" : "CERT-VN",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/797896"
|
"url": "https://www.drupal.org/SA-CORE-2016-003"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:1613",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-1613.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:1611",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-1611.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:1610",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-1610.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3631",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2016/dsa-3631"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "91821",
|
"name": "91821",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/91821"
|
"url": "http://www.securityfocus.com/bid/91821"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2016-4e7db3d437",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KZOIUYZDBWNDDHC6XTOLZYRMRXZWTJCP/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:1609",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-1609.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1036335",
|
"name": "1036335",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1036335"
|
"url": "http://www.securitytracker.com/id/1036335"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://httpoxy.org/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://httpoxy.org/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:1612",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-1612.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1353794",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1353794"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2016-9c8cf5912c",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXFEIMZPSVGZQQAYIQ7U7DFVX3IBSDLF/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/guzzle/guzzle/releases/tag/6.2.1",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://github.com/guzzle/guzzle/releases/tag/6.2.1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1371428",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1371428"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://gerrit.ovirt.org/#/q/I40c88ad48f8f7c2b8e06802137870b0c198b5129",
|
"name": "https://gerrit.ovirt.org/#/q/I40c88ad48f8f7c2b8e06802137870b0c198b5129",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -67,6 +62,11 @@
|
|||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-1967.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-1967.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1371428",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1371428"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "92694",
|
"name": "92694",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
|
@ -79,25 +79,40 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
|
"name": "RHSA-2017:0338",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://security.netapp.com/advisory/ntap-20170119-0001/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://security.netapp.com/advisory/ntap-20170119-0001/"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-3782",
|
"name": "DSA-3782",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"url": "http://www.debian.org/security/2017/dsa-3782"
|
"url": "http://www.debian.org/security/2017/dsa-3782"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2017:0176",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "GLSA-201701-65",
|
"name": "GLSA-201701-65",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "https://security.gentoo.org/glsa/201701-65"
|
"url": "https://security.gentoo.org/glsa/201701-65"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2017:0180",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "95506",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/95506"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1037637",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1037637"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "GLSA-201707-01",
|
"name": "GLSA-201707-01",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
@ -108,35 +123,35 @@
|
|||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "RHSA-2017:0176",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "RHSA-2017:0177",
|
"name": "RHSA-2017:0177",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "RHSA-2017:0180",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "RHSA-2017:0263",
|
"name": "RHSA-2017:0263",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2017:1216",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2017:1216"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://security.netapp.com/advisory/ntap-20170119-0001/",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2017:0269",
|
"name": "RHSA-2017:0269",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2017:0336",
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2017:0337",
|
"name": "RHSA-2017:0337",
|
||||||
@ -144,24 +159,9 @@
|
|||||||
"url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2017:0338",
|
"name": "RHSA-2017:0336",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2017:1216",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2017:1216"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "95506",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/95506"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1037637",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1037637"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -65,70 +65,80 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "RHSA-2018:2254",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2018:2254"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[debian-lts-announce] 20181122 [SECURITY] [DLA 1590-1] openjdk-7 security update",
|
"name": "[debian-lts-announce] 20181122 [SECURITY] [DLA 1590-1] openjdk-7 security update",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00026.html"
|
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00026.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2018:3007",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2018:3007"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "104765",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/104765"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2018:2713",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2018:2713"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://security.netapp.com/advisory/ntap-20180726-0001/",
|
"name": "https://security.netapp.com/advisory/ntap-20180726-0001/",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://security.netapp.com/advisory/ntap-20180726-0001/"
|
"url": "https://security.netapp.com/advisory/ntap-20180726-0001/"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03882en_us",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03882en_us"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-4268",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "https://www.debian.org/security/2018/dsa-4268"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2018:2241",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2018:2241"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:2242",
|
"name": "RHSA-2018:2242",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2018:2242"
|
"url": "https://access.redhat.com/errata/RHSA-2018:2242"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "RHSA-2018:2253",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2018:2253"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2018:2254",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2018:2254"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:2255",
|
"name": "RHSA-2018:2255",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2018:2255"
|
"url": "https://access.redhat.com/errata/RHSA-2018:2255"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-3747-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "https://usn.ubuntu.com/3747-1/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2018:2575",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2018:2575"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:2256",
|
"name": "RHSA-2018:2256",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2018:2256"
|
"url": "https://access.redhat.com/errata/RHSA-2018:2256"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2018:2283",
|
"name": "RHSA-2018:2576",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2018:2283"
|
"url": "https://access.redhat.com/errata/RHSA-2018:2576"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2018:2286",
|
"name": "RHSA-2018:2241",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2018:2286"
|
"url": "https://access.redhat.com/errata/RHSA-2018:2241"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2018:2253",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2018:2253"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:2568",
|
"name": "RHSA-2018:2568",
|
||||||
@ -141,59 +151,49 @@
|
|||||||
"url": "https://access.redhat.com/errata/RHSA-2018:2569"
|
"url": "https://access.redhat.com/errata/RHSA-2018:2569"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2018:2575",
|
"name": "USN-3735-1",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "UBUNTU",
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2018:2575"
|
"url": "https://usn.ubuntu.com/3735-1/"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2018:2576",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2018:2576"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:2712",
|
"name": "RHSA-2018:2712",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2018:2712"
|
"url": "https://access.redhat.com/errata/RHSA-2018:2712"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "RHSA-2018:2713",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2018:2713"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2018:3007",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2018:3007"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:3008",
|
"name": "RHSA-2018:3008",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2018:3008"
|
"url": "https://access.redhat.com/errata/RHSA-2018:3008"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "USN-3734-1",
|
"name": "RHSA-2018:2286",
|
||||||
"refsource" : "UBUNTU",
|
"refsource": "REDHAT",
|
||||||
"url" : "https://usn.ubuntu.com/3734-1/"
|
"url": "https://access.redhat.com/errata/RHSA-2018:2286"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "USN-3735-1",
|
"name": "DSA-4268",
|
||||||
"refsource" : "UBUNTU",
|
"refsource": "DEBIAN",
|
||||||
"url" : "https://usn.ubuntu.com/3735-1/"
|
"url": "https://www.debian.org/security/2018/dsa-4268"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "USN-3747-1",
|
"name": "RHSA-2018:2283",
|
||||||
"refsource" : "UBUNTU",
|
"refsource": "REDHAT",
|
||||||
"url" : "https://usn.ubuntu.com/3747-1/"
|
"url": "https://access.redhat.com/errata/RHSA-2018:2283"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "104765",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/104765"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1041302",
|
"name": "1041302",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1041302"
|
"url": "http://www.securitytracker.com/id/1041302"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03882en_us",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03882en_us"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-3734-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "https://usn.ubuntu.com/3734-1/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user