"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 01:36:21 +00:00
parent c488bd3ff3
commit 694d7f43dc
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
50 changed files with 3100 additions and 3100 deletions

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=90221101925960&w=2" "url": "http://marc.info/?l=bugtraq&m=90221101925960&w=2"
}, },
{
"name" : "I-053",
"refsource" : "CIAC",
"url" : "http://ciac.llnl.gov/ciac/bulletins/i-053.shtml"
},
{ {
"name": "ftp://ftp.isc.org/isc/dhcp/dhcp-1.0-history/dhcp-1.0.0-1.0pl1.diff.gz", "name": "ftp://ftp.isc.org/isc/dhcp/dhcp-1.0-history/dhcp-1.0.0-1.0pl1.diff.gz",
"refsource": "MISC", "refsource": "MISC",
"url": "ftp://ftp.isc.org/isc/dhcp/dhcp-1.0-history/dhcp-1.0.0-1.0pl1.diff.gz" "url": "ftp://ftp.isc.org/isc/dhcp/dhcp-1.0-history/dhcp-1.0.0-1.0pl1.diff.gz"
},
{
"name": "I-053",
"refsource": "CIAC",
"url": "http://ciac.llnl.gov/ciac/bulletins/i-053.shtml"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20050728 Advisory 12/2005: UseBB Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=112264706213040&w=2"
},
{
"name" : "http://www.hardened-php.net/advisory_122005.60.html",
"refsource" : "MISC",
"url" : "http://www.hardened-php.net/advisory_122005.60.html"
},
{ {
"name": "http://www.usebb.net/community/topic.php?id=605", "name": "http://www.usebb.net/community/topic.php?id=605",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -72,6 +62,16 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/14413" "url": "http://www.securityfocus.com/bid/14413"
}, },
{
"name": "20050728 Advisory 12/2005: UseBB Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=112264706213040&w=2"
},
{
"name": "http://www.hardened-php.net/advisory_122005.60.html",
"refsource": "MISC",
"url": "http://www.hardened-php.net/advisory_122005.60.html"
},
{ {
"name": "usebb-search-sql-injection(21652)", "name": "usebb-search-sql-injection(21652)",
"refsource": "XF", "refsource": "XF",

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "DSA-851", "name": "17103",
"refsource" : "DEBIAN", "refsource": "SECUNIA",
"url" : "http://www.debian.org/security/2005/dsa-851" "url": "http://secunia.com/advisories/17103"
},
{
"name" : "MDKSA-2005:145",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:145"
}, },
{ {
"name": "http://openvpn.net/changelog.html", "name": "http://openvpn.net/changelog.html",
@ -72,15 +67,20 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/14610" "url": "http://www.securityfocus.com/bid/14610"
}, },
{
"name": "MDKSA-2005:145",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:145"
},
{
"name": "DSA-851",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2005/dsa-851"
},
{ {
"name": "16463", "name": "16463",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/16463" "url": "http://secunia.com/advisories/16463"
},
{
"name" : "17103",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/17103"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2005-2794", "ID": "CVE-2005-2794",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,24 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE10-STORE_PENDING", "name": "oval:org.mitre.oval:def:10276",
"refsource" : "CONFIRM", "refsource": "OVAL",
"url" : "http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE10-STORE_PENDING" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10276"
},
{
"name" : "DSA-809",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2005/dsa-809"
},
{
"name" : "FLSA-2006:152809",
"refsource" : "FEDORA",
"url" : "http://fedoranews.org/updates/FEDORA--.shtml"
},
{
"name" : "GLSA-200509-06",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200509-06.xml"
}, },
{ {
"name": "MDKSA-2005:162", "name": "MDKSA-2005:162",
@ -78,9 +63,14 @@
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:162" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:162"
}, },
{ {
"name" : "RHSA-2005:766", "name": "14761",
"refsource" : "REDHAT", "refsource": "BID",
"url" : "http://www.redhat.com/support/errata/RHSA-2005-766.html" "url": "http://www.securityfocus.com/bid/14761"
},
{
"name": "DSA-809",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2005/dsa-809"
}, },
{ {
"name": "SUSE-SA:2005:053", "name": "SUSE-SA:2005:053",
@ -93,24 +83,34 @@
"url": "http://www.novell.com/linux/security/advisories/2005_21_sr.html" "url": "http://www.novell.com/linux/security/advisories/2005_21_sr.html"
}, },
{ {
"name" : "14761", "name": "FLSA-2006:152809",
"refsource" : "BID", "refsource": "FEDORA",
"url" : "http://www.securityfocus.com/bid/14761" "url": "http://fedoranews.org/updates/FEDORA--.shtml"
}, },
{ {
"name" : "oval:org.mitre.oval:def:10276", "name": "GLSA-200509-06",
"refsource" : "OVAL", "refsource": "GENTOO",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10276" "url": "http://www.gentoo.org/security/en/glsa/glsa-200509-06.xml"
}, },
{ {
"name" : "16977", "name": "http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE10-STORE_PENDING",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/16977" "url": "http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE10-STORE_PENDING"
},
{
"name": "RHSA-2005:766",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-766.html"
}, },
{ {
"name": "17027", "name": "17027",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17027" "url": "http://secunia.com/advisories/17027"
},
{
"name": "16977",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/16977"
} }
] ]
} }

View File

@ -57,6 +57,11 @@
"refsource": "SUNALERT", "refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101987-1" "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101987-1"
}, },
{
"name": "1015062",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015062"
},
{ {
"name": "15115", "name": "15115",
"refsource": "BID", "refsource": "BID",
@ -66,11 +71,6 @@
"name": "20069", "name": "20069",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/20069" "url": "http://www.osvdb.org/20069"
},
{
"name" : "1015062",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015062"
} }
] ]
} }

View File

@ -63,39 +63,39 @@
"url": "http://sourceforge.net/project/shownotes.php?release_id=364457" "url": "http://sourceforge.net/project/shownotes.php?release_id=364457"
}, },
{ {
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=109858", "name": "ADV-2005-2176",
"refsource" : "MISC", "refsource": "VUPEN",
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=109858" "url": "http://www.vupen.com/english/advisories/2005/2176"
},
{
"name" : "GLSA-200510-23",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200510-23.xml"
}, },
{ {
"name": "15164", "name": "15164",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/15164" "url": "http://www.securityfocus.com/bid/15164"
}, },
{
"name" : "ADV-2005-2176",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2005/2176"
},
{ {
"name": "1015087", "name": "1015087",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015087" "url": "http://securitytracker.com/id?1015087"
}, },
{ {
"name" : "17279", "name": "GLSA-200510-23",
"refsource" : "SECUNIA", "refsource": "GENTOO",
"url" : "http://secunia.com/advisories/17279" "url": "http://www.gentoo.org/security/en/glsa/glsa-200510-23.xml"
}, },
{ {
"name": "17363", "name": "17363",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17363" "url": "http://secunia.com/advisories/17363"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=109858",
"refsource": "MISC",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=109858"
},
{
"name": "17279",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17279"
} }
] ]
} }

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "jeebles-download-file-include(37378)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37378"
},
{
"name": "3315",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3315"
},
{ {
"name": "20071022 Jeebles Directory Local File Inclusion", "name": "20071022 Jeebles Directory Local File Inclusion",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -66,16 +76,6 @@
"name": "27345", "name": "27345",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27345" "url": "http://secunia.com/advisories/27345"
},
{
"name" : "3315",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/3315"
},
{
"name" : "jeebles-download-file-include(37378)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/37378"
} }
] ]
} }

View File

@ -57,25 +57,25 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/483525/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/483525/100/0/threaded"
}, },
{
"name": "xoops-mylinks-brokenlink-sql-injection(38370)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38370"
},
{ {
"name": "26392", "name": "26392",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/26392" "url": "http://www.securityfocus.com/bid/26392"
}, },
{
"name" : "38747",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/38747"
},
{ {
"name": "3362", "name": "3362",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3362" "url": "http://securityreason.com/securityalert/3362"
}, },
{ {
"name" : "xoops-mylinks-brokenlink-sql-injection(38370)", "name": "38747",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38370" "url": "http://osvdb.org/38747"
} }
] ]
} }

View File

@ -52,6 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "acrobat-reader-multiple-unspecified(51126)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51126"
},
{
"name": "35734",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35734"
},
{
"name": "RHSA-2009:1109",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1109.html"
},
{ {
"name": "http://www.adobe.com/support/security/bulletins/apsb09-07.html", "name": "http://www.adobe.com/support/security/bulletins/apsb09-07.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -62,25 +77,10 @@
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200907-06.xml" "url": "http://security.gentoo.org/glsa/glsa-200907-06.xml"
}, },
{
"name" : "RHSA-2009:1109",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2009-1109.html"
},
{ {
"name": "35496", "name": "35496",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35496" "url": "http://secunia.com/advisories/35496"
},
{
"name" : "35734",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/35734"
},
{
"name" : "acrobat-reader-multiple-unspecified(51126)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/51126"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2009-2845", "ID": "CVE-2009-2845",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-0059", "ID": "CVE-2015-0059",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-0731", "ID": "CVE-2015-0731",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20150406 CVE request: Module::Signature before 0.75 - multiple vulnerabilities",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/04/07/1"
},
{
"name" : "[oss-security] 20150423 Re: CVE request: Module::Signature before 0.75 - multiple vulnerabilities",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/04/23/17"
},
{
"name" : "https://github.com/audreyt/module-signature/commit/8a9164596fa5952d4fbcde5aa1c7d1c7bc85372f",
"refsource" : "CONFIRM",
"url" : "https://github.com/audreyt/module-signature/commit/8a9164596fa5952d4fbcde5aa1c7d1c7bc85372f"
},
{ {
"name": "https://metacpan.org/changes/distribution/Module-Signature", "name": "https://metacpan.org/changes/distribution/Module-Signature",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -77,6 +62,21 @@
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3261" "url": "http://www.debian.org/security/2015/dsa-3261"
}, },
{
"name": "[oss-security] 20150406 CVE request: Module::Signature before 0.75 - multiple vulnerabilities",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/04/07/1"
},
{
"name": "https://github.com/audreyt/module-signature/commit/8a9164596fa5952d4fbcde5aa1c7d1c7bc85372f",
"refsource": "CONFIRM",
"url": "https://github.com/audreyt/module-signature/commit/8a9164596fa5952d4fbcde5aa1c7d1c7bc85372f"
},
{
"name": "[oss-security] 20150423 Re: CVE request: Module::Signature before 0.75 - multiple vulnerabilities",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/04/23/17"
},
{ {
"name": "USN-2607-1", "name": "USN-2607-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20150526 Re: CVE Request for WP Fastest Cache plugin",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/05/26/20"
},
{ {
"name": "https://wordpress.org/plugins/wp-fastest-cache/#developers", "name": "https://wordpress.org/plugins/wp-fastest-cache/#developers",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://wordpress.org/plugins/wp-fastest-cache/#developers" "url": "https://wordpress.org/plugins/wp-fastest-cache/#developers"
},
{
"name": "[oss-security] 20150526 Re: CVE Request for WP Fastest Cache plugin",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/05/26/20"
} }
] ]
} }

View File

@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://packetstormsecurity.com/files/132463/Polycom-RealPresence-Resource-Manager-RPRM-Disclosure-Traversal.html",
"refsource": "MISC",
"url": "https://packetstormsecurity.com/files/132463/Polycom-RealPresence-Resource-Manager-RPRM-Disclosure-Traversal.html"
},
{ {
"name": "20150626 SEC Consult SA-20150626-0 :: Critical vulnerabilities in Polycom RealPresence Resource Manager (RPRM) allow surveillance on conferences", "name": "20150626 SEC Consult SA-20150626-0 :: Critical vulnerabilities in Polycom RealPresence Resource Manager (RPRM) allow surveillance on conferences",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/535852/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/535852/100/0/threaded"
}, },
{
"name" : "37449",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/37449/"
},
{ {
"name": "20150626 SEC Consult SA-20150626-0 :: Critical vulnerabilities in Polycom RealPresence Resource Manager (RPRM) allow surveillance on conferences", "name": "20150626 SEC Consult SA-20150626-0 :: Critical vulnerabilities in Polycom RealPresence Resource Manager (RPRM) allow surveillance on conferences",
"refsource": "FULLDISC", "refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Jun/81" "url": "http://seclists.org/fulldisclosure/2015/Jun/81"
}, },
{ {
"name" : "https://packetstormsecurity.com/files/132463/Polycom-RealPresence-Resource-Manager-RPRM-Disclosure-Traversal.html", "name": "37449",
"refsource" : "MISC", "refsource": "EXPLOIT-DB",
"url" : "https://packetstormsecurity.com/files/132463/Polycom-RealPresence-Resource-Manager-RPRM-Disclosure-Traversal.html" "url": "https://www.exploit-db.com/exploits/37449/"
},
{
"name" : "https://support.polycom.com/global/documents/support/documentation/Security_Center_Post_for_RPRM_CVEs.pdf",
"refsource" : "CONFIRM",
"url" : "https://support.polycom.com/global/documents/support/documentation/Security_Center_Post_for_RPRM_CVEs.pdf"
}, },
{ {
"name": "75432", "name": "75432",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/75432" "url": "http://www.securityfocus.com/bid/75432"
},
{
"name": "https://support.polycom.com/global/documents/support/documentation/Security_Center_Post_for_RPRM_CVEs.pdf",
"refsource": "CONFIRM",
"url": "https://support.polycom.com/global/documents/support/documentation/Security_Center_Post_for_RPRM_CVEs.pdf"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-4803", "ID": "CVE-2015-4803",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,36 +52,51 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "SUSE-SU-2015:2182",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"
},
{
"name": "USN-2784-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2784-1"
},
{
"name": "openSUSE-SU-2015:1905",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"
},
{
"name": "SUSE-SU-2015:2192",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"
},
{
"name": "77200",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/77200"
},
{
"name": "openSUSE-SU-2015:1906",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"
},
{
"name": "RHSA-2015:2507",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html"
},
{
"name": "RHSA-2015:1928",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html"
},
{ {
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
}, },
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10141",
"refsource" : "CONFIRM",
"url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10141"
},
{
"name" : "DSA-3381",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3381"
},
{
"name" : "GLSA-201603-11",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201603-11"
},
{
"name" : "GLSA-201603-14",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201603-14"
},
{ {
"name": "RHSA-2016:1430", "name": "RHSA-2016:1430",
"refsource": "REDHAT", "refsource": "REDHAT",
@ -92,60 +107,15 @@
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html"
}, },
{
"name" : "RHSA-2015:2507",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2507.html"
},
{
"name" : "RHSA-2015:2508",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2508.html"
},
{ {
"name": "RHSA-2015:2509", "name": "RHSA-2015:2509",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html"
}, },
{ {
"name" : "RHSA-2015:1919", "name": "1033884",
"refsource" : "REDHAT", "refsource": "SECTRACK",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1919.html" "url": "http://www.securitytracker.com/id/1033884"
},
{
"name" : "RHSA-2015:1920",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1920.html"
},
{
"name" : "RHSA-2015:1921",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1921.html"
},
{
"name" : "RHSA-2015:1926",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1926.html"
},
{
"name" : "RHSA-2015:1927",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1927.html"
},
{
"name" : "RHSA-2015:1928",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1928.html"
},
{
"name" : "SUSE-SU-2016:0113",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"
},
{
"name" : "openSUSE-SU-2016:0270",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
}, },
{ {
"name": "SUSE-SU-2015:2166", "name": "SUSE-SU-2015:2166",
@ -153,39 +123,24 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"
}, },
{ {
"name" : "SUSE-SU-2015:2168", "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
}, },
{ {
"name" : "SUSE-SU-2015:2182", "name": "openSUSE-SU-2016:0270",
"refsource": "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
}, },
{ {
"name" : "SUSE-SU-2015:2192", "name": "RHSA-2015:1919",
"refsource" : "SUSE", "refsource": "REDHAT",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-1919.html"
}, },
{ {
"name" : "SUSE-SU-2015:2216", "name": "GLSA-201603-11",
"refsource" : "SUSE", "refsource": "GENTOO",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" "url": "https://security.gentoo.org/glsa/201603-11"
},
{
"name" : "SUSE-SU-2015:2268",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"
},
{
"name" : "SUSE-SU-2015:1874",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"
},
{
"name" : "SUSE-SU-2015:1875",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"
}, },
{ {
"name": "openSUSE-SU-2015:1902", "name": "openSUSE-SU-2015:1902",
@ -193,39 +148,84 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"
}, },
{ {
"name" : "openSUSE-SU-2015:1905", "name": "RHSA-2015:1920",
"refsource" : "SUSE", "refsource": "REDHAT",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-1920.html"
}, },
{ {
"name" : "openSUSE-SU-2015:1906", "name": "GLSA-201603-14",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201603-14"
},
{
"name": "SUSE-SU-2015:2216",
"refsource": "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"
},
{
"name": "RHSA-2015:1927",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html"
}, },
{ {
"name": "openSUSE-SU-2015:1971", "name": "openSUSE-SU-2015:1971",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"
}, },
{
"name": "SUSE-SU-2015:2268",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"
},
{
"name": "SUSE-SU-2015:2168",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"
},
{
"name": "RHSA-2015:1921",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1921.html"
},
{
"name": "SUSE-SU-2015:1874",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"
},
{
"name": "DSA-3381",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3381"
},
{
"name": "RHSA-2015:1926",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html"
},
{
"name": "SUSE-SU-2015:1875",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10141",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10141"
},
{
"name": "RHSA-2015:2508",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2508.html"
},
{
"name": "SUSE-SU-2016:0113",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"
},
{ {
"name": "USN-2827-1", "name": "USN-2827-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2827-1" "url": "http://www.ubuntu.com/usn/USN-2827-1"
},
{
"name" : "USN-2784-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2784-1"
},
{
"name" : "77200",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/77200"
},
{
"name" : "1033884",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1033884"
} }
] ]
} }

View File

@ -53,29 +53,49 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://support.ntp.org/bin/view/Main/NtpBug2948", "name": "DSA-3629",
"refsource" : "CONFIRM", "refsource": "DEBIAN",
"url" : "http://support.ntp.org/bin/view/Main/NtpBug2948" "url": "http://www.debian.org/security/2016/dsa-3629"
},
{
"name" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us"
}, },
{ {
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us", "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us" "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us"
}, },
{
"name": "1034782",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034782"
},
{
"name": "VU#718152",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/718152"
},
{
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us"
},
{
"name": "RHSA-2016:2583",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2583.html"
},
{
"name": "81814",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/81814"
},
{ {
"name": "https://security.netapp.com/advisory/ntap-20171031-0001/", "name": "https://security.netapp.com/advisory/ntap-20171031-0001/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20171031-0001/" "url": "https://security.netapp.com/advisory/ntap-20171031-0001/"
}, },
{ {
"name" : "DSA-3629", "name": "http://support.ntp.org/bin/view/Main/NtpBug2948",
"refsource" : "DEBIAN", "refsource": "CONFIRM",
"url" : "http://www.debian.org/security/2016/dsa-3629" "url": "http://support.ntp.org/bin/view/Main/NtpBug2948"
}, },
{ {
"name": "FreeBSD-SA-16:09", "name": "FreeBSD-SA-16:09",
@ -86,26 +106,6 @@
"name": "GLSA-201607-15", "name": "GLSA-201607-15",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201607-15" "url": "https://security.gentoo.org/glsa/201607-15"
},
{
"name" : "RHSA-2016:2583",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2583.html"
},
{
"name" : "VU#718152",
"refsource" : "CERT-VN",
"url" : "https://www.kb.cert.org/vuls/id/718152"
},
{
"name" : "81814",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/81814"
},
{
"name" : "1034782",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034782"
} }
] ]
} }

View File

@ -52,45 +52,45 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[Fontconfig] 20160805 fontconfig: Branch 'master' - 3 commits",
"refsource" : "MLIST",
"url" : "https://lists.freedesktop.org/archives/fontconfig/2016-August/005792.html"
},
{
"name" : "https://cgit.freedesktop.org/fontconfig/commit/?id=7a4a5bd7897d216f0794ca9dbce0a4a5c9d14940",
"refsource" : "CONFIRM",
"url" : "https://cgit.freedesktop.org/fontconfig/commit/?id=7a4a5bd7897d216f0794ca9dbce0a4a5c9d14940"
},
{
"name" : "DSA-3644",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3644"
},
{ {
"name": "FEDORA-2016-e23ab56ce3", "name": "FEDORA-2016-e23ab56ce3",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GGOS4YYB7UYAWX5AEXJZHDIX4ZMSXSW5/" "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GGOS4YYB7UYAWX5AEXJZHDIX4ZMSXSW5/"
}, },
{
"name" : "FEDORA-2016-6802f2e52a",
"refsource" : "FEDORA",
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CJ45VRAMCIISHOVKFVOQYQUSTUJP7FC/"
},
{
"name" : "RHSA-2016:2601",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2601.html"
},
{ {
"name": "USN-3063-1", "name": "USN-3063-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3063-1" "url": "http://www.ubuntu.com/usn/USN-3063-1"
}, },
{
"name": "[Fontconfig] 20160805 fontconfig: Branch 'master' - 3 commits",
"refsource": "MLIST",
"url": "https://lists.freedesktop.org/archives/fontconfig/2016-August/005792.html"
},
{
"name": "RHSA-2016:2601",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2601.html"
},
{
"name": "https://cgit.freedesktop.org/fontconfig/commit/?id=7a4a5bd7897d216f0794ca9dbce0a4a5c9d14940",
"refsource": "CONFIRM",
"url": "https://cgit.freedesktop.org/fontconfig/commit/?id=7a4a5bd7897d216f0794ca9dbce0a4a5c9d14940"
},
{ {
"name": "92339", "name": "92339",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/92339" "url": "http://www.securityfocus.com/bid/92339"
},
{
"name": "DSA-3644",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3644"
},
{
"name": "FEDORA-2016-6802f2e52a",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CJ45VRAMCIISHOVKFVOQYQUSTUJP7FC/"
} }
] ]
} }

View File

@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1349540", "name": "99097",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1349540" "url": "http://www.securityfocus.com/bid/99097"
}, },
{ {
"name": "RHSA-2016:2594", "name": "RHSA-2016:2594",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2594.html" "url": "http://rhn.redhat.com/errata/RHSA-2016-2594.html"
}, },
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1349540",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349540"
},
{ {
"name": "RHSA-2016:2765", "name": "RHSA-2016:2765",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2765.html" "url": "http://rhn.redhat.com/errata/RHSA-2016-2765.html"
},
{
"name" : "99097",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/99097"
} }
] ]
} }

View File

@ -53,34 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20160615 CVE Request: heap overflow in Python zipimport module", "name": "http://www.splunk.com/view/SP-CAAAPUE",
"refsource" : "MLIST", "refsource": "CONFIRM",
"url" : "http://www.openwall.com/lists/oss-security/2016/06/15/15" "url": "http://www.splunk.com/view/SP-CAAAPUE"
}, },
{ {
"name": "[oss-security] 20160616 Re: CVE Request: heap overflow in Python zipimport module", "name": "[oss-security] 20160616 Re: CVE Request: heap overflow in Python zipimport module",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/06/16/1" "url": "http://www.openwall.com/lists/oss-security/2016/06/16/1"
}, },
{
"name": "http://www.splunk.com/view/SP-CAAAPSV",
"refsource": "CONFIRM",
"url": "http://www.splunk.com/view/SP-CAAAPSV"
},
{ {
"name": "[debian-lts-announce] 20190207 [SECURITY] [DLA 1663-1] python3.4 security update", "name": "[debian-lts-announce] 20190207 [SECURITY] [DLA 1663-1] python3.4 security update",
"refsource": "MLIST", "refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html"
}, },
{
"name" : "https://bugs.python.org/issue26171",
"refsource" : "CONFIRM",
"url" : "https://bugs.python.org/issue26171"
},
{ {
"name": "https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5", "name": "https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5" "url": "https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5"
}, },
{ {
"name" : "https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2", "name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2" "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"name": "https://bugs.python.org/issue26171",
"refsource": "CONFIRM",
"url": "https://bugs.python.org/issue26171"
}, },
{ {
"name": "https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS", "name": "https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS",
@ -88,29 +93,9 @@
"url": "https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS" "url": "https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", "name": "1038138",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" "url": "http://www.securitytracker.com/id/1038138"
},
{
"name" : "http://www.splunk.com/view/SP-CAAAPSV",
"refsource" : "CONFIRM",
"url" : "http://www.splunk.com/view/SP-CAAAPSV"
},
{
"name" : "http://www.splunk.com/view/SP-CAAAPUE",
"refsource" : "CONFIRM",
"url" : "http://www.splunk.com/view/SP-CAAAPUE"
},
{
"name" : "GLSA-201701-18",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201701-18"
},
{
"name" : "RHSA-2016:2586",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2586.html"
}, },
{ {
"name": "91247", "name": "91247",
@ -118,9 +103,24 @@
"url": "http://www.securityfocus.com/bid/91247" "url": "http://www.securityfocus.com/bid/91247"
}, },
{ {
"name" : "1038138", "name": "GLSA-201701-18",
"refsource" : "SECTRACK", "refsource": "GENTOO",
"url" : "http://www.securitytracker.com/id/1038138" "url": "https://security.gentoo.org/glsa/201701-18"
},
{
"name": "https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2",
"refsource": "CONFIRM",
"url": "https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2"
},
{
"name": "[oss-security] 20160615 CVE Request: heap overflow in Python zipimport module",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/06/15/15"
},
{
"name": "RHSA-2016:2586",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2586.html"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-2278", "ID": "CVE-2018-2278",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-2294", "ID": "CVE-2018-2294",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -66,9 +66,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[debian-lts-announce] 20180403 [SECURITY] [DLA 1339-1] openjdk-7 security update", "name": "RHSA-2018:0351",
"refsource" : "MLIST", "refsource": "REDHAT",
"url" : "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html" "url": "https://access.redhat.com/errata/RHSA-2018:0351"
}, },
{ {
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", "name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
@ -81,19 +81,9 @@
"url": "https://security.netapp.com/advisory/ntap-20180117-0001/" "url": "https://security.netapp.com/advisory/ntap-20180117-0001/"
}, },
{ {
"name" : "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", "name": "USN-3614-1",
"refsource" : "CONFIRM", "refsource": "UBUNTU",
"url" : "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" "url": "https://usn.ubuntu.com/3614-1/"
},
{
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
"refsource" : "CONFIRM",
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"
},
{
"name" : "DSA-4144",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4144"
}, },
{ {
"name": "DSA-4166", "name": "DSA-4166",
@ -106,39 +96,9 @@
"url": "https://access.redhat.com/errata/RHSA-2018:0095" "url": "https://access.redhat.com/errata/RHSA-2018:0095"
}, },
{ {
"name" : "RHSA-2018:0099", "name": "DSA-4144",
"refsource" : "REDHAT", "refsource": "DEBIAN",
"url" : "https://access.redhat.com/errata/RHSA-2018:0099" "url": "https://www.debian.org/security/2018/dsa-4144"
},
{
"name" : "RHSA-2018:0100",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:0100"
},
{
"name" : "RHSA-2018:0115",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:0115"
},
{
"name" : "RHSA-2018:0349",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:0349"
},
{
"name" : "RHSA-2018:0351",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:0351"
},
{
"name" : "RHSA-2018:0352",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:0352"
},
{
"name" : "RHSA-2018:0458",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:0458"
}, },
{ {
"name": "RHSA-2018:0521", "name": "RHSA-2018:0521",
@ -146,9 +106,24 @@
"url": "https://access.redhat.com/errata/RHSA-2018:0521" "url": "https://access.redhat.com/errata/RHSA-2018:0521"
}, },
{ {
"name" : "RHSA-2018:1463", "name": "RHSA-2018:0352",
"refsource": "REDHAT", "refsource": "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:1463" "url": "https://access.redhat.com/errata/RHSA-2018:0352"
},
{
"name": "RHSA-2018:0115",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0115"
},
{
"name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource": "CONFIRM",
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"name": "[debian-lts-announce] 20180403 [SECURITY] [DLA 1339-1] openjdk-7 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"
}, },
{ {
"name": "RHSA-2018:1812", "name": "RHSA-2018:1812",
@ -156,24 +131,49 @@
"url": "https://access.redhat.com/errata/RHSA-2018:1812" "url": "https://access.redhat.com/errata/RHSA-2018:1812"
}, },
{ {
"name" : "USN-3613-1", "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
"refsource" : "UBUNTU", "refsource": "CONFIRM",
"url" : "https://usn.ubuntu.com/3613-1/" "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"
}, },
{ {
"name" : "USN-3614-1", "name": "RHSA-2018:0099",
"refsource" : "UBUNTU", "refsource": "REDHAT",
"url" : "https://usn.ubuntu.com/3614-1/" "url": "https://access.redhat.com/errata/RHSA-2018:0099"
},
{
"name": "RHSA-2018:1463",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1463"
}, },
{ {
"name": "102661", "name": "102661",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/102661" "url": "http://www.securityfocus.com/bid/102661"
}, },
{
"name": "RHSA-2018:0458",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0458"
},
{
"name": "RHSA-2018:0349",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0349"
},
{ {
"name": "1040203", "name": "1040203",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040203" "url": "http://www.securitytracker.com/id/1040203"
},
{
"name": "USN-3613-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3613-1/"
},
{
"name": "RHSA-2018:0100",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0100"
} }
] ]
} }

View File

@ -62,15 +62,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
}, },
{
"name" : "102692",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/102692"
},
{ {
"name": "1040202", "name": "1040202",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040202" "url": "http://www.securitytracker.com/id/1040202"
},
{
"name": "102692",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102692"
} }
] ]
} }

View File

@ -58,15 +58,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
}, },
{
"name" : "102683",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/102683"
},
{ {
"name": "1040214", "name": "1040214",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040214" "url": "http://www.securitytracker.com/id/1040214"
},
{
"name": "102683",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102683"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@microfocus.com", "ASSIGNER": "security@suse.com",
"DATE_PUBLIC": "2018-09-19T16:00:00.000Z", "DATE_PUBLIC": "2018-09-19T16:00:00.000Z",
"ID": "CVE-2018-6505", "ID": "CVE-2018-6505",
"STATE": "PUBLIC", "STATE": "PUBLIC",

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-6988", "ID": "CVE-2018-6988",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[debian-lts-announce] 20180409 [SECURITY] [DLA 1343-1] ming security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/04/msg00008.html"
},
{ {
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892260", "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892260",
"refsource": "MISC", "refsource": "MISC",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892260" "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892260"
}, },
{
"name": "[debian-lts-announce] 20180409 [SECURITY] [DLA 1343-1] ming security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00008.html"
},
{ {
"name": "https://github.com/libming/libming/issues/120", "name": "https://github.com/libming/libming/issues/120",
"refsource": "MISC", "refsource": "MISC",

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "46156", "name": "106408",
"refsource" : "EXPLOIT-DB", "refsource": "BID",
"url" : "https://www.exploit-db.com/exploits/46156/" "url": "http://www.securityfocus.com/bid/106408"
}, },
{ {
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0543", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0543",
@ -63,9 +63,9 @@
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0543" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0543"
}, },
{ {
"name" : "106408", "name": "46156",
"refsource" : "BID", "refsource": "EXPLOIT-DB",
"url" : "http://www.securityfocus.com/bid/106408" "url": "https://www.exploit-db.com/exploits/46156/"
} }
] ]
} }