"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 22:45:56 +00:00
parent 5fcd708cc7
commit 6b20b6ddca
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
54 changed files with 4184 additions and 4184 deletions

View File

@ -57,6 +57,11 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://digitalparadox.org/advisories/sqc.txt" "url": "http://digitalparadox.org/advisories/sqc.txt"
}, },
{
"name": "squirrelcart-index-sql-injection(19904)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19904"
},
{ {
"name": "12944", "name": "12944",
"refsource": "BID", "refsource": "BID",
@ -66,11 +71,6 @@
"name": "14770", "name": "14770",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/14770" "url": "http://secunia.com/advisories/14770"
},
{
"name" : "squirrelcart-index-sql-injection(19904)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/19904"
} }
] ]
} }

View File

@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://digitalparadox.org/advisories/prodcart.txt",
"refsource" : "MISC",
"url" : "http://digitalparadox.org/advisories/prodcart.txt"
},
{
"name" : "12990",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/12990"
},
{
"name" : "14833",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/14833"
},
{ {
"name": "15264", "name": "15264",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/15264" "url": "http://www.osvdb.org/15264"
}, },
{
"name" : "15266",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/15266"
},
{ {
"name": "15267", "name": "15267",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/15267" "url": "http://www.osvdb.org/15267"
}, },
{
"name": "14833",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/14833"
},
{
"name": "12990",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/12990"
},
{ {
"name": "15268", "name": "15268",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/15268" "url": "http://www.osvdb.org/15268"
},
{
"name": "http://digitalparadox.org/advisories/prodcart.txt",
"refsource": "MISC",
"url": "http://digitalparadox.org/advisories/prodcart.txt"
},
{
"name": "15266",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/15266"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "13597",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/13597"
},
{ {
"name": "15268", "name": "15268",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/15268" "url": "http://secunia.com/advisories/15268"
},
{
"name": "13597",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/13597"
} }
] ]
} }

View File

@ -53,49 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060210 Secunia Research: Lotus Notes UUE File Handling Buffer Overflow", "name": "lotus-kvarcve-filename-bo(24635)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/424689/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24635"
},
{
"name" : "20060210 Secunia Research: Lotus Notes ZIP File Handling Buffer Overflow",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/424626/100/0/threaded"
},
{
"name" : "20060210 Secunia Research: Lotus Notes HTML Speed Reader Link BufferOverflows",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/424692/100/0/threaded"
},
{
"name" : "20060210 Secunia Research: Lotus Notes TAR Reader File Extraction BufferOverflow",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/424666/100/0/threaded"
},
{
"name" : "http://secunia.com/secunia_research/2005-66/advisory/",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2005-66/advisory/"
},
{
"name" : "http://secunia.com/secunia_research/2005-32/advisory/",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2005-32/advisory/"
},
{
"name" : "http://secunia.com/secunia_research/2005-34/advisory/",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2005-34/advisory/"
},
{
"name" : "http://secunia.com/secunia_research/2005-36/advisory/",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2005-36/advisory/"
},
{
"name" : "http://secunia.com/secunia_research/2005-37/advisory/",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2005-37/advisory/"
}, },
{ {
"name": "http://www-1.ibm.com/support/docview.wss?rs=475&uid=swg21229918", "name": "http://www-1.ibm.com/support/docview.wss?rs=475&uid=swg21229918",
@ -103,14 +63,19 @@
"url": "http://www-1.ibm.com/support/docview.wss?rs=475&uid=swg21229918" "url": "http://www-1.ibm.com/support/docview.wss?rs=475&uid=swg21229918"
}, },
{ {
"name" : "VU#884076", "name": "http://secunia.com/secunia_research/2005-34/advisory/",
"refsource" : "CERT-VN", "refsource": "MISC",
"url" : "http://www.kb.cert.org/vuls/id/884076" "url": "http://secunia.com/secunia_research/2005-34/advisory/"
}, },
{ {
"name" : "16576", "name": "23067",
"refsource" : "BID", "refsource": "OSVDB",
"url" : "http://www.securityfocus.com/bid/16576" "url": "http://www.osvdb.org/23067"
},
{
"name": "lotus-uudrdr-uue-bo(24636)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24636"
}, },
{ {
"name": "ADV-2006-0500", "name": "ADV-2006-0500",
@ -122,65 +87,100 @@
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0501" "url": "http://www.vupen.com/english/advisories/2006/0501"
}, },
{
"name": "20060210 Secunia Research: Lotus Notes ZIP File Handling Buffer Overflow",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/424626/100/0/threaded"
},
{ {
"name": "23064", "name": "23064",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/23064" "url": "http://www.osvdb.org/23064"
}, },
{
"name" : "23065",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/23065"
},
{ {
"name": "23066", "name": "23066",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/23066" "url": "http://www.osvdb.org/23066"
}, },
{
"name" : "23067",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/23067"
},
{
"name" : "23068",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/23068"
},
{ {
"name": "1015657", "name": "1015657",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015657" "url": "http://securitytracker.com/id?1015657"
}, },
{
"name": "http://secunia.com/secunia_research/2005-36/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2005-36/advisory/"
},
{
"name": "23065",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/23065"
},
{
"name": "16576",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16576"
},
{
"name": "20060210 Secunia Research: Lotus Notes UUE File Handling Buffer Overflow",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/424689/100/0/threaded"
},
{ {
"name": "16100", "name": "16100",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/16100" "url": "http://secunia.com/advisories/16100"
}, },
{
"name" : "16280",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/16280"
},
{ {
"name": "lotus-htmsr-link-bo(24639)", "name": "lotus-htmsr-link-bo(24639)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24639" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24639"
}, },
{
"name" : "lotus-kvarcve-filename-bo(24635)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24635"
},
{ {
"name": "lotus-tarrdr-filename-bo(24638)", "name": "lotus-tarrdr-filename-bo(24638)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24638" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24638"
}, },
{ {
"name" : "lotus-uudrdr-uue-bo(24636)", "name": "http://secunia.com/secunia_research/2005-32/advisory/",
"refsource" : "XF", "refsource": "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24636" "url": "http://secunia.com/secunia_research/2005-32/advisory/"
},
{
"name": "VU#884076",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/884076"
},
{
"name": "http://secunia.com/secunia_research/2005-66/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2005-66/advisory/"
},
{
"name": "20060210 Secunia Research: Lotus Notes HTML Speed Reader Link BufferOverflows",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/424692/100/0/threaded"
},
{
"name": "16280",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/16280"
},
{
"name": "23068",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/23068"
},
{
"name": "20060210 Secunia Research: Lotus Notes TAR Reader File Extraction BufferOverflow",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/424666/100/0/threaded"
},
{
"name": "http://secunia.com/secunia_research/2005-37/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2005-37/advisory/"
} }
] ]
} }

View File

@ -52,11 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "safari-data-uri-dos(22331)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22331"
},
{ {
"name": "20050917 Possible memory corruption problems in Apple Safari", "name": "20050917 Possible memory corruption problems in Apple Safari",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=112715234411672&w=2" "url": "http://marc.info/?l=bugtraq&m=112715234411672&w=2"
}, },
{
"name": "16875",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/16875/"
},
{ {
"name": "14868", "name": "14868",
"refsource": "BID", "refsource": "BID",
@ -66,16 +76,6 @@
"name": "19569", "name": "19569",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/19569" "url": "http://www.osvdb.org/19569"
},
{
"name" : "16875",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/16875/"
},
{
"name" : "safari-data-uri-dos(22331)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/22331"
} }
] ]
} }

View File

@ -52,55 +52,55 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "phpbb-multiple-variables-bypass-security(22914)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22914"
},
{ {
"name": "20051031 Advisory 17/2005: phpBB Multiple Vulnerabilities", "name": "20051031 Advisory 17/2005: phpBB Multiple Vulnerabilities",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=113081113317600&w=2" "url": "http://marc.info/?l=bugtraq&m=113081113317600&w=2"
}, },
{
"name" : "http://www.hardened-php.net/advisory_172005.75.html",
"refsource" : "MISC",
"url" : "http://www.hardened-php.net/advisory_172005.75.html"
},
{
"name" : "DSA-925",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2005/dsa-925"
},
{
"name" : "15243",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/15243"
},
{ {
"name": "20386", "name": "20386",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/20386" "url": "http://www.osvdb.org/20386"
}, },
{ {
"name" : "1015121", "name": "DSA-925",
"refsource" : "SECTRACK", "refsource": "DEBIAN",
"url" : "http://securitytracker.com/id?1015121" "url": "http://www.debian.org/security/2005/dsa-925"
}, },
{ {
"name": "17366", "name": "17366",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17366" "url": "http://secunia.com/advisories/17366"
}, },
{
"name" : "18098",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18098"
},
{ {
"name": "130", "name": "130",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/130" "url": "http://securityreason.com/securityalert/130"
}, },
{ {
"name" : "phpbb-multiple-variables-bypass-security(22914)", "name": "18098",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/22914" "url": "http://secunia.com/advisories/18098"
},
{
"name": "http://www.hardened-php.net/advisory_172005.75.html",
"refsource": "MISC",
"url": "http://www.hardened-php.net/advisory_172005.75.html"
},
{
"name": "1015121",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015121"
},
{
"name": "15243",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15243"
} }
] ]
} }

View File

@ -52,30 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20051115 Authentication vulnerability in Belkin wireless devices",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=113209977115233&w=2"
},
{
"name" : "20051115 Authentication vulnerability in Belkin wireless devices",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0489.html"
},
{ {
"name": "15444", "name": "15444",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/15444/" "url": "http://www.securityfocus.com/bid/15444/"
}, },
{ {
"name" : "ADV-2005-2453", "name": "20051115 Authentication vulnerability in Belkin wireless devices",
"refsource" : "VUPEN", "refsource": "FULLDISC",
"url" : "http://www.vupen.com/english/advisories/2005/2453" "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0489.html"
},
{
"name" : "20877",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/20877"
}, },
{ {
"name": "17601", "name": "17601",
@ -91,6 +76,21 @@
"name": "belkin-wireless-auth-bypass(23059)", "name": "belkin-wireless-auth-bypass(23059)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23059" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23059"
},
{
"name": "ADV-2005-2453",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/2453"
},
{
"name": "20877",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/20877"
},
{
"name": "20051115 Authentication vulnerability in Belkin wireless devices",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=113209977115233&w=2"
} }
] ]
} }

View File

@ -53,20 +53,15 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20051201 [DRUPAL-SA-2005-009] Drupal 4.6.4 / 4.5.6 fixes minor access control issue", "name": "ADV-2005-2684",
"refsource" : "BUGTRAQ", "refsource": "VUPEN",
"url" : "http://www.securityfocus.com/archive/1/418336/100/0/threaded" "url": "http://www.vupen.com/english/advisories/2005/2684"
}, },
{ {
"name": "http://drupal.org/files/sa-2005-009/4.6.3.patch", "name": "http://drupal.org/files/sa-2005-009/4.6.3.patch",
"refsource": "MISC", "refsource": "MISC",
"url": "http://drupal.org/files/sa-2005-009/4.6.3.patch" "url": "http://drupal.org/files/sa-2005-009/4.6.3.patch"
}, },
{
"name" : "http://drupal.org/files/sa-2005-009/advisory.txt",
"refsource" : "CONFIRM",
"url" : "http://drupal.org/files/sa-2005-009/advisory.txt"
},
{ {
"name": "DSA-958", "name": "DSA-958",
"refsource": "DEBIAN", "refsource": "DEBIAN",
@ -78,19 +73,24 @@
"url": "http://www.securityfocus.com/bid/15674" "url": "http://www.securityfocus.com/bid/15674"
}, },
{ {
"name" : "ADV-2005-2684", "name": "18630",
"refsource" : "VUPEN", "refsource": "SECUNIA",
"url" : "http://www.vupen.com/english/advisories/2005/2684" "url": "http://secunia.com/advisories/18630"
},
{
"name": "20051201 [DRUPAL-SA-2005-009] Drupal 4.6.4 / 4.5.6 fixes minor access control issue",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/418336/100/0/threaded"
},
{
"name": "http://drupal.org/files/sa-2005-009/advisory.txt",
"refsource": "CONFIRM",
"url": "http://drupal.org/files/sa-2005-009/advisory.txt"
}, },
{ {
"name": "17824", "name": "17824",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17824" "url": "http://secunia.com/advisories/17824"
},
{
"name" : "18630",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18630"
} }
] ]
} }

View File

@ -57,6 +57,11 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://pridels0.blogspot.com/2005/12/widget-property-vuln.html" "url": "http://pridels0.blogspot.com/2005/12/widget-property-vuln.html"
}, },
{
"name": "21426",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/21426"
},
{ {
"name": "15701", "name": "15701",
"refsource": "BID", "refsource": "BID",
@ -67,11 +72,6 @@
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/2741" "url": "http://www.vupen.com/english/advisories/2005/2741"
}, },
{
"name" : "21426",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/21426"
},
{ {
"name": "17829", "name": "17829",
"refsource": "SECUNIA", "refsource": "SECUNIA",

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://pridels0.blogspot.com/2005/12/contens-searchcfm-multiple-input.html", "name": "21825",
"refsource" : "MISC", "refsource": "OSVDB",
"url" : "http://pridels0.blogspot.com/2005/12/contens-searchcfm-multiple-input.html" "url": "http://www.osvdb.org/21825"
}, },
{ {
"name": "ADV-2005-2981", "name": "ADV-2005-2981",
@ -63,19 +63,19 @@
"url": "http://www.vupen.com/english/advisories/2005/2981" "url": "http://www.vupen.com/english/advisories/2005/2981"
}, },
{ {
"name" : "21825", "name": "contens-search-path-disclosure(23824)",
"refsource" : "OSVDB", "refsource": "XF",
"url" : "http://www.osvdb.org/21825" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23824"
},
{
"name": "http://pridels0.blogspot.com/2005/12/contens-searchcfm-multiple-input.html",
"refsource": "MISC",
"url": "http://pridels0.blogspot.com/2005/12/contens-searchcfm-multiple-input.html"
}, },
{ {
"name": "18143", "name": "18143",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18143" "url": "http://secunia.com/advisories/18143"
},
{
"name" : "contens-search-path-disclosure(23824)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/23824"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.punbb.org/changelogs/1.2.9_to_1.2.10.txt",
"refsource" : "CONFIRM",
"url" : "http://www.punbb.org/changelogs/1.2.9_to_1.2.10.txt"
},
{ {
"name": "15326", "name": "15326",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/15326" "url": "http://www.securityfocus.com/bid/15326"
}, },
{
"name" : "17425",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/17425"
},
{ {
"name": "17433", "name": "17433",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17433" "url": "http://secunia.com/advisories/17433"
},
{
"name": "http://www.punbb.org/changelogs/1.2.9_to_1.2.10.txt",
"refsource": "CONFIRM",
"url": "http://www.punbb.org/changelogs/1.2.9_to_1.2.10.txt"
},
{
"name": "17425",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17425"
} }
] ]
} }

View File

@ -53,9 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20090130 PR08-22: Persistent XSS on Novell GroupWise WebAccess", "name": "33744",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/500572/100/0/threaded" "url": "http://secunia.com/advisories/33744"
},
{
"name": "33541",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33541"
},
{
"name": "http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-23",
"refsource": "MISC",
"url": "http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-23"
},
{
"name": "33537",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33537"
},
{
"name": "http://www.novell.com/support/search.do?usemicrosite=true&searchString=7002320",
"refsource": "CONFIRM",
"url": "http://www.novell.com/support/search.do?usemicrosite=true&searchString=7002320"
}, },
{ {
"name": "20090130 PR08-23: XSS on Novell GroupWise WebAccess", "name": "20090130 PR08-23: XSS on Novell GroupWise WebAccess",
@ -67,35 +87,15 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-22" "url": "http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-22"
}, },
{
"name" : "http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-23",
"refsource" : "MISC",
"url" : "http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-23"
},
{
"name" : "http://www.novell.com/support/search.do?usemicrosite=true&searchString=7002320",
"refsource" : "CONFIRM",
"url" : "http://www.novell.com/support/search.do?usemicrosite=true&searchString=7002320"
},
{ {
"name": "http://www.novell.com/support/search.do?usemicrosite=true&searchString=7002321", "name": "http://www.novell.com/support/search.do?usemicrosite=true&searchString=7002321",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.novell.com/support/search.do?usemicrosite=true&searchString=7002321" "url": "http://www.novell.com/support/search.do?usemicrosite=true&searchString=7002321"
}, },
{ {
"name" : "33537", "name": "20090130 PR08-22: Persistent XSS on Novell GroupWise WebAccess",
"refsource" : "BID", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/bid/33537" "url": "http://www.securityfocus.com/archive/1/500572/100/0/threaded"
},
{
"name" : "33541",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/33541"
},
{
"name" : "33744",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33744"
} }
] ]
} }

View File

@ -57,16 +57,16 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/500492/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/500492/100/0/threaded"
}, },
{
"name" : "7902",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7902"
},
{ {
"name": "http://www.coresecurity.com/content/amaya-buffer-overflows", "name": "http://www.coresecurity.com/content/amaya-buffer-overflows",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.coresecurity.com/content/amaya-buffer-overflows" "url": "http://www.coresecurity.com/content/amaya-buffer-overflows"
}, },
{
"name": "7902",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7902"
},
{ {
"name": "amaya-html-tags-bo(48325)", "name": "amaya-html-tags-bo(48325)",
"refsource": "XF", "refsource": "XF",

View File

@ -57,25 +57,25 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7881" "url": "https://www.exploit-db.com/exploits/7881"
}, },
{
"name" : "33455",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/33455"
},
{
"name" : "ADV-2009-0249",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/0249"
},
{ {
"name": "33646", "name": "33646",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33646" "url": "http://secunia.com/advisories/33646"
}, },
{
"name": "33455",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33455"
},
{ {
"name": "flashmagazine-index-sql-injection(48226)", "name": "flashmagazine-index-sql-injection(48226)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48226" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48226"
},
{
"name": "ADV-2009-0249",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0249"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2009-0690", "ID": "CVE-2009-0690",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,26 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.foxitsoftware.com/pdf/reader/security.htm#0602",
"refsource" : "CONFIRM",
"url" : "http://www.foxitsoftware.com/pdf/reader/security.htm#0602"
},
{
"name" : "VU#251793",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/251793"
},
{ {
"name": "35442", "name": "35442",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/35442" "url": "http://www.securityfocus.com/bid/35442"
}, },
{
"name": "http://www.foxitsoftware.com/pdf/reader/security.htm#0602",
"refsource": "CONFIRM",
"url": "http://www.foxitsoftware.com/pdf/reader/security.htm#0602"
},
{ {
"name": "1022425", "name": "1022425",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1022425" "url": "http://securitytracker.com/id?1022425"
}, },
{
"name": "VU#251793",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/251793"
},
{ {
"name": "35512", "name": "35512",
"refsource": "SECUNIA", "refsource": "SECUNIA",

View File

@ -53,14 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20090312 [Suspected Spam][PT-2009-11] SlySoft Multiple Products ElbyCDIO.sys Denial of Service", "name": "34288",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/501713/100/0/threaded" "url": "http://secunia.com/advisories/34288"
}, },
{ {
"name" : "http://en.securitylab.ru/lab/PT-2009-11", "name": "http://www.slysoft.com/download/changes_clonedvd.txt",
"refsource" : "MISC", "refsource": "CONFIRM",
"url" : "http://en.securitylab.ru/lab/PT-2009-11" "url": "http://www.slysoft.com/download/changes_clonedvd.txt"
},
{
"name": "slysoft-elbycdio-dos(49232)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49232"
},
{
"name": "34289",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34289"
},
{
"name": "34269",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34269"
},
{
"name": "34287",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34287"
}, },
{ {
"name": "http://www.slysoft.com/download/changes_anydvd.txt", "name": "http://www.slysoft.com/download/changes_anydvd.txt",
@ -68,9 +88,9 @@
"url": "http://www.slysoft.com/download/changes_anydvd.txt" "url": "http://www.slysoft.com/download/changes_anydvd.txt"
}, },
{ {
"name" : "http://www.slysoft.com/download/changes_clonedvd.txt", "name": "http://en.securitylab.ru/lab/PT-2009-11",
"refsource" : "CONFIRM", "refsource": "MISC",
"url" : "http://www.slysoft.com/download/changes_clonedvd.txt" "url": "http://en.securitylab.ru/lab/PT-2009-11"
}, },
{ {
"name": "34103", "name": "34103",
@ -83,29 +103,9 @@
"url": "http://osvdb.org/52679" "url": "http://osvdb.org/52679"
}, },
{ {
"name" : "34269", "name": "20090312 [Suspected Spam][PT-2009-11] SlySoft Multiple Products ElbyCDIO.sys Denial of Service",
"refsource" : "SECUNIA", "refsource": "BUGTRAQ",
"url" : "http://secunia.com/advisories/34269" "url": "http://www.securityfocus.com/archive/1/501713/100/0/threaded"
},
{
"name" : "34288",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/34288"
},
{
"name" : "34289",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/34289"
},
{
"name" : "34287",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/34287"
},
{
"name" : "slysoft-elbycdio-dos(49232)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/49232"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20090817 CVE request: kernel: cfg80211: missing NULL pointer checks", "name": "36278",
"refsource" : "MLIST", "refsource": "SECUNIA",
"url" : "http://www.openwall.com/lists/oss-security/2009/08/17/1" "url": "http://secunia.com/advisories/36278"
},
{
"name" : "[oss-security] 20090817 Re: CVE request: kernel: cfg80211: missing NULL pointer checks",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2009/08/17/2"
}, },
{ {
"name": "http://jon.oberheide.org/files/cfg80211-remote-dos.c", "name": "http://jon.oberheide.org/files/cfg80211-remote-dos.c",
@ -73,9 +68,14 @@
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=cd3468bad96c00b5a512f551674f36776129520e" "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=cd3468bad96c00b5a512f551674f36776129520e"
}, },
{ {
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.5", "name": "[oss-security] 20090817 Re: CVE request: kernel: cfg80211: missing NULL pointer checks",
"refsource" : "CONFIRM", "refsource": "MLIST",
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.5" "url": "http://www.openwall.com/lists/oss-security/2009/08/17/2"
},
{
"name": "[oss-security] 20090817 CVE request: kernel: cfg80211: missing NULL pointer checks",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2009/08/17/1"
}, },
{ {
"name": "36052", "name": "36052",
@ -83,9 +83,9 @@
"url": "http://www.securityfocus.com/bid/36052" "url": "http://www.securityfocus.com/bid/36052"
}, },
{ {
"name" : "36278", "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.5",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/36278" "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.5"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20090818 Vtiger CRM 5.0.4 Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=125060676515670&w=2"
},
{
"name" : "9450",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/9450"
},
{ {
"name": "http://www.ush.it/2009/08/18/vtiger-crm-504-multiple-vulnerabilities/", "name": "http://www.ush.it/2009/08/18/vtiger-crm-504-multiple-vulnerabilities/",
"refsource": "MISC", "refsource": "MISC",
@ -72,6 +62,16 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.ush.it/team/ush/hack-vtigercrm_504/vtigercrm_504.txt" "url": "http://www.ush.it/team/ush/hack-vtigercrm_504/vtigercrm_504.txt"
}, },
{
"name": "9450",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/9450"
},
{
"name": "20090818 Vtiger CRM 5.0.4 Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=125060676515670&w=2"
},
{ {
"name": "36062", "name": "36062",
"refsource": "BID", "refsource": "BID",

View File

@ -52,21 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "9089",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/9089"
},
{ {
"name": "http://packetstormsecurity.org/0907-exploits/clearcontent-rfilfi.txt", "name": "http://packetstormsecurity.org/0907-exploits/clearcontent-rfilfi.txt",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.org/0907-exploits/clearcontent-rfilfi.txt" "url": "http://packetstormsecurity.org/0907-exploits/clearcontent-rfilfi.txt"
}, },
{
"name" : "55742",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/55742"
},
{ {
"name": "35726", "name": "35726",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -76,6 +66,16 @@
"name": "clearcontent-image-file-include(51629)", "name": "clearcontent-image-file-include(51629)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51629" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51629"
},
{
"name": "9089",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/9089"
},
{
"name": "55742",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/55742"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2009-3551", "ID": "CVE-2009-3551",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.wireshark.org/docs/relnotes/wireshark-1.2.3.html",
"refsource" : "CONFIRM",
"url" : "http://www.wireshark.org/docs/relnotes/wireshark-1.2.3.html"
},
{
"name" : "http://www.wireshark.org/security/wnpa-sec-2009-07.html",
"refsource" : "CONFIRM",
"url" : "http://www.wireshark.org/security/wnpa-sec-2009-07.html"
},
{ {
"name": "36846", "name": "36846",
"refsource": "BID", "refsource": "BID",
@ -73,9 +63,19 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6049" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6049"
}, },
{ {
"name" : "37175", "name": "ADV-2009-3061",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/37175" "url": "http://www.vupen.com/english/advisories/2009/3061"
},
{
"name": "http://www.wireshark.org/docs/relnotes/wireshark-1.2.3.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/docs/relnotes/wireshark-1.2.3.html"
},
{
"name": "wireshark-negprotresponse-dos(54018)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54018"
}, },
{ {
"name": "37409", "name": "37409",
@ -83,14 +83,14 @@
"url": "http://secunia.com/advisories/37409" "url": "http://secunia.com/advisories/37409"
}, },
{ {
"name" : "ADV-2009-3061", "name": "http://www.wireshark.org/security/wnpa-sec-2009-07.html",
"refsource" : "VUPEN", "refsource": "CONFIRM",
"url" : "http://www.vupen.com/english/advisories/2009/3061" "url": "http://www.wireshark.org/security/wnpa-sec-2009-07.html"
}, },
{ {
"name" : "wireshark-negprotresponse-dos(54018)", "name": "37175",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/54018" "url": "http://secunia.com/advisories/37175"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "ADV-2009-3206",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3206"
},
{ {
"name": "http://support.citrix.com/article/CTX123248", "name": "http://support.citrix.com/article/CTX123248",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -62,20 +67,15 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/37073" "url": "http://www.securityfocus.com/bid/37073"
}, },
{
"name" : "1023168",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1023168"
},
{ {
"name": "37319", "name": "37319",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37319" "url": "http://secunia.com/advisories/37319"
}, },
{ {
"name" : "ADV-2009-3206", "name": "1023168",
"refsource" : "VUPEN", "refsource": "SECTRACK",
"url" : "http://www.vupen.com/english/advisories/2009/3206" "url": "http://www.securitytracker.com/id?1023168"
}, },
{ {
"name": "citrix-ssl-spoofing(54213)", "name": "citrix-ssl-spoofing(54213)",

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-020/", "name": "typo3-nis-xss(54784)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-020/" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54784"
}, },
{ {
"name": "ADV-2009-3550", "name": "ADV-2009-3550",
@ -63,9 +63,9 @@
"url": "http://www.vupen.com/english/advisories/2009/3550" "url": "http://www.vupen.com/english/advisories/2009/3550"
}, },
{ {
"name" : "typo3-nis-xss(54784)", "name": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-020/",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/54784" "url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-020/"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "9397", "name": "56870",
"refsource" : "EXPLOIT-DB", "refsource": "OSVDB",
"url" : "http://www.exploit-db.com/exploits/9397" "url": "http://osvdb.org/56870"
}, },
{ {
"name": "35997", "name": "35997",
@ -68,29 +68,29 @@
"url": "http://osvdb.org/56869" "url": "http://osvdb.org/56869"
}, },
{ {
"name" : "56870", "name": "supportcenter-lang-file-include(52350)",
"refsource" : "OSVDB", "refsource": "XF",
"url" : "http://osvdb.org/56870" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52350"
},
{
"name" : "56871",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/56871"
}, },
{ {
"name": "36208", "name": "36208",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36208" "url": "http://secunia.com/advisories/36208"
}, },
{
"name": "9397",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/9397"
},
{
"name": "56871",
"refsource": "OSVDB",
"url": "http://osvdb.org/56871"
},
{ {
"name": "supportcenter-index-file-include(52352)", "name": "supportcenter-index-file-include(52352)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52352" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52352"
},
{
"name" : "supportcenter-lang-file-include(52350)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/52350"
} }
] ]
} }

View File

@ -53,54 +53,54 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17", "name": "fisheye-crucible-xml-dos(75682)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75682"
},
{
"name" : "http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17",
"refsource" : "CONFIRM",
"url" : "http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17"
},
{
"name" : "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17",
"refsource" : "CONFIRM",
"url" : "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17"
},
{
"name" : "http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17",
"refsource" : "CONFIRM",
"url" : "http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17"
},
{
"name" : "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17",
"refsource" : "CONFIRM",
"url" : "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17"
},
{
"name" : "53595",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/53595"
},
{
"name" : "81993",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/81993"
}, },
{ {
"name": "49146", "name": "49146",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49146" "url": "http://secunia.com/advisories/49146"
}, },
{
"name": "http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17",
"refsource": "CONFIRM",
"url": "http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17"
},
{
"name": "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17",
"refsource": "CONFIRM",
"url": "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17"
},
{
"name": "81993",
"refsource": "OSVDB",
"url": "http://osvdb.org/81993"
},
{
"name": "http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17",
"refsource": "CONFIRM",
"url": "http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17"
},
{
"name": "53595",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/53595"
},
{
"name": "http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17",
"refsource": "CONFIRM",
"url": "http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17"
},
{
"name": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17",
"refsource": "CONFIRM",
"url": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17"
},
{ {
"name": "jira-xml-dos(75697)", "name": "jira-xml-dos(75697)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697"
},
{
"name" : "fisheye-crucible-xml-dos(75682)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/75682"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2015-0168", "ID": "CVE-2015-0168",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-0325", "ID": "CVE-2015-0325",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,50 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html"
},
{
"name" : "https://technet.microsoft.com/library/security/2755801",
"refsource" : "CONFIRM",
"url" : "https://technet.microsoft.com/library/security/2755801"
},
{ {
"name": "GLSA-201502-02", "name": "GLSA-201502-02",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
}, },
{
"name" : "RHSA-2015:0140",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0140.html"
},
{
"name" : "SUSE-SU-2015:0236",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html"
},
{
"name" : "SUSE-SU-2015:0239",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html"
},
{
"name" : "openSUSE-SU-2015:0237",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html"
},
{ {
"name": "openSUSE-SU-2015:0238", "name": "openSUSE-SU-2015:0238",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00008.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00008.html"
}, },
{ {
"name" : "72514", "name": "62895",
"refsource" : "BID", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/bid/72514" "url": "http://secunia.com/advisories/62895"
},
{
"name": "adobe-flash-cve20150325-dos(100711)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100711"
}, },
{ {
"name": "1031706", "name": "1031706",
@ -108,14 +83,39 @@
"url": "http://secunia.com/advisories/62886" "url": "http://secunia.com/advisories/62886"
}, },
{ {
"name" : "62895", "name": "https://technet.microsoft.com/library/security/2755801",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/62895" "url": "https://technet.microsoft.com/library/security/2755801"
}, },
{ {
"name" : "adobe-flash-cve20150325-dos(100711)", "name": "openSUSE-SU-2015:0237",
"refsource" : "XF", "refsource": "SUSE",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/100711" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html"
},
{
"name": "SUSE-SU-2015:0236",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html"
},
{
"name": "72514",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72514"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html"
},
{
"name": "RHSA-2015:0140",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0140.html"
},
{
"name": "SUSE-SU-2015:0239",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-1196", "ID": "CVE-2015-1196",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,41 +52,41 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20150118 Re: CVE request: directory traversal flaw in patch",
"refsource" : "MLIST",
"url" : "http://seclists.org/oss-sec/2015/q1/173"
},
{ {
"name": "http://git.savannah.gnu.org/cgit/patch.git/commit/?id=4e9269a5fc1fe80a1095a92593dd85db871e1fd3", "name": "http://git.savannah.gnu.org/cgit/patch.git/commit/?id=4e9269a5fc1fe80a1095a92593dd85db871e1fd3",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://git.savannah.gnu.org/cgit/patch.git/commit/?id=4e9269a5fc1fe80a1095a92593dd85db871e1fd3" "url": "http://git.savannah.gnu.org/cgit/patch.git/commit/?id=4e9269a5fc1fe80a1095a92593dd85db871e1fd3"
}, },
{
"name" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775227",
"refsource" : "CONFIRM",
"url" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775227"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1182154",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1182154"
},
{ {
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", "name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html" "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"
}, },
{ {
"name" : "openSUSE-SU-2015:0199", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1182154",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-02/msg00013.html" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1182154"
}, },
{ {
"name": "72074", "name": "72074",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/72074" "url": "http://www.securityfocus.com/bid/72074"
}, },
{
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775227",
"refsource": "CONFIRM",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775227"
},
{
"name": "[oss-security] 20150118 Re: CVE request: directory traversal flaw in patch",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2015/q1/173"
},
{
"name": "openSUSE-SU-2015:0199",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00013.html"
},
{ {
"name": "gnupatch-unspecified-symlink(99967)", "name": "gnupatch-unspecified-symlink(99967)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,11 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://codereview.chromium.org/636233008",
"refsource": "CONFIRM",
"url": "https://codereview.chromium.org/636233008"
},
{ {
"name": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", "name": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html" "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html"
}, },
{
"name": "GLSA-201502-13",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201502-13.xml"
},
{ {
"name": "https://code.google.com/p/chromium/issues/detail?id=416289", "name": "https://code.google.com/p/chromium/issues/detail?id=416289",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,16 +76,6 @@
"name": "https://code.google.com/p/chromium/issues/detail?id=449894", "name": "https://code.google.com/p/chromium/issues/detail?id=449894",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=449894" "url": "https://code.google.com/p/chromium/issues/detail?id=449894"
},
{
"name" : "https://codereview.chromium.org/636233008",
"refsource" : "CONFIRM",
"url" : "https://codereview.chromium.org/636233008"
},
{
"name" : "GLSA-201502-13",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201502-13.xml"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-1781", "ID": "CVE-2015-1781",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,75 +52,75 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[libc-alpha] 20150814 The GNU C Library version 2.22 is now available",
"refsource" : "MLIST",
"url" : "https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html"
},
{
"name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=18287",
"refsource" : "CONFIRM",
"url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=18287"
},
{
"name" : "https://sourceware.org/git/?p=glibc.git;a=commit;h=2959eda9272a03386",
"refsource" : "CONFIRM",
"url" : "https://sourceware.org/git/?p=glibc.git;a=commit;h=2959eda9272a03386"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"name" : "DSA-3480",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3480"
},
{
"name" : "FEDORA-2016-0480defc94",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html"
},
{
"name" : "GLSA-201602-02",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201602-02"
},
{
"name" : "RHSA-2015:0863",
"refsource" : "REDHAT",
"url" : "https://rhn.redhat.com/errata/RHSA-2015-0863.html"
},
{ {
"name": "SUSE-SU-2015:1424", "name": "SUSE-SU-2015:1424",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html"
}, },
{
"name": "[libc-alpha] 20150814 The GNU C Library version 2.22 is now available",
"refsource": "MLIST",
"url": "https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html"
},
{ {
"name": "SUSE-SU-2016:0470", "name": "SUSE-SU-2016:0470",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html"
}, },
{
"name" : "USN-2985-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2985-1"
},
{ {
"name": "USN-2985-2", "name": "USN-2985-2",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2985-2" "url": "http://www.ubuntu.com/usn/USN-2985-2"
}, },
{ {
"name" : "74255", "name": "GLSA-201602-02",
"refsource" : "BID", "refsource": "GENTOO",
"url" : "http://www.securityfocus.com/bid/74255" "url": "https://security.gentoo.org/glsa/201602-02"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"name": "https://sourceware.org/git/?p=glibc.git;a=commit;h=2959eda9272a03386",
"refsource": "CONFIRM",
"url": "https://sourceware.org/git/?p=glibc.git;a=commit;h=2959eda9272a03386"
},
{
"name": "FEDORA-2016-0480defc94",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html"
},
{
"name": "RHSA-2015:0863",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2015-0863.html"
},
{
"name": "DSA-3480",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3480"
},
{
"name": "USN-2985-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2985-1"
},
{
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=18287",
"refsource": "CONFIRM",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18287"
}, },
{ {
"name": "1032178", "name": "1032178",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032178" "url": "http://www.securitytracker.com/id/1032178"
},
{
"name": "74255",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/74255"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://github.com/MISP/MISP/commit/812ac878c3645c02e2a599287117418424cbd4cf",
"refsource" : "CONFIRM",
"url" : "https://github.com/MISP/MISP/commit/812ac878c3645c02e2a599287117418424cbd4cf"
},
{ {
"name": "https://www.circl.lu/advisory/CVE-2015-5720/", "name": "https://www.circl.lu/advisory/CVE-2015-5720/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "92738", "name": "92738",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/92738" "url": "http://www.securityfocus.com/bid/92738"
},
{
"name": "https://github.com/MISP/MISP/commit/812ac878c3645c02e2a599287117418424cbd4cf",
"refsource": "CONFIRM",
"url": "https://github.com/MISP/MISP/commit/812ac878c3645c02e2a599287117418424cbd4cf"
} }
] ]
} }

View File

@ -53,119 +53,59 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://source.codeaurora.org/quic/la//platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=0a755b400876ab4d58151e98462d3fa8fe099f61", "name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=f11eeadd214e081a824f30aec5cb52d390ef576c",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la//platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=0a755b400876ab4d58151e98462d3fa8fe099f61" "url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=f11eeadd214e081a824f30aec5cb52d390ef576c"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=00022c12e0cad8b735f94d6ee3785a557b4a3df2",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=00022c12e0cad8b735f94d6ee3785a557b4a3df2"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=3815e870ef906409af4a228f66d9400081227b75",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=3815e870ef906409af4a228f66d9400081227b75"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=667b3108d10e9580bf9f6d337c759dc88a1a0bdc",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=667b3108d10e9580bf9f6d337c759dc88a1a0bdc"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=731ebf70a25ab2cdc32d2626dcebe60fe3b09481",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=731ebf70a25ab2cdc32d2626dcebe60fe3b09481"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=85ea1c126b05f133206cd9c6d8d9fbf137d81d27",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=85ea1c126b05f133206cd9c6d8d9fbf137d81d27"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=8ee65e3c9addab1d3c15ba013401f5698fb73594",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=8ee65e3c9addab1d3c15ba013401f5698fb73594"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=9a8f1aeb8055de80137e769fae637cd480495509",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=9a8f1aeb8055de80137e769fae637cd480495509"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=a009a84d04bfac2a5c01101f38a70d216960fac0",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=a009a84d04bfac2a5c01101f38a70d216960fac0"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=a4b4267f94802e0a4d93999649710bbf340796d5",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=a4b4267f94802e0a4d93999649710bbf340796d5"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=be70d02f12cb9a71a9b07b601f0efafc99718ec9",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=be70d02f12cb9a71a9b07b601f0efafc99718ec9"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=ebf1042efb9bd4517cd09a543bb4e3a164de8771",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=ebf1042efb9bd4517cd09a543bb4e3a164de8771"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=ec9896d0bc7521bbbe6dc28a198635dc281e7358",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=ec9896d0bc7521bbbe6dc28a198635dc281e7358"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=f9f86fd07af5606d0cb74c3eca5b2cbfda509345",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=f9f86fd07af5606d0cb74c3eca5b2cbfda509345"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?h=wlan-cld2.driver.lnx.1.0.r21-rel&id=391d37818aaa8038a06662075dd8893501452931",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?h=wlan-cld2.driver.lnx.1.0.r21-rel&id=391d37818aaa8038a06662075dd8893501452931"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=106f5c62b01b5a212bb53d13e3a3e70db2baedee",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=106f5c62b01b5a212bb53d13e3a3e70db2baedee"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=174c053d1aa1bf5395647e3927d718255f3cbe75",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=174c053d1aa1bf5395647e3927d718255f3cbe75"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=17f6fbb4b52a6acdd831ebaffdac9bbc88d2f423",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=17f6fbb4b52a6acdd831ebaffdac9bbc88d2f423"
}, },
{ {
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=191f02a7ec2a4cccaebbdac8d36897e1ae125244", "name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=191f02a7ec2a4cccaebbdac8d36897e1ae125244",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=191f02a7ec2a4cccaebbdac8d36897e1ae125244" "url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=191f02a7ec2a4cccaebbdac8d36897e1ae125244"
}, },
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=85ea1c126b05f133206cd9c6d8d9fbf137d81d27",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=85ea1c126b05f133206cd9c6d8d9fbf137d81d27"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=106f5c62b01b5a212bb53d13e3a3e70db2baedee",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=106f5c62b01b5a212bb53d13e3a3e70db2baedee"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=ee9797fbefb45eee88c92420a24cda838cff6b45",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=ee9797fbefb45eee88c92420a24cda838cff6b45"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=0c5a2ba407f23efd89cac6dc45e2ab9bdba3ada1",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=0c5a2ba407f23efd89cac6dc45e2ab9bdba3ada1"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=174c053d1aa1bf5395647e3927d718255f3cbe75",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=174c053d1aa1bf5395647e3927d718255f3cbe75"
},
{
"name": "https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-aurora-security-bulletin",
"refsource": "CONFIRM",
"url": "https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-aurora-security-bulletin"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=7af334bfc3375c9f85a330b84db17c0db1d6dade",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=7af334bfc3375c9f85a330b84db17c0db1d6dade"
},
{ {
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=335ae3f8b353b6c7260eacb6aa706bb30f8a6bdc", "name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=335ae3f8b353b6c7260eacb6aa706bb30f8a6bdc",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=335ae3f8b353b6c7260eacb6aa706bb30f8a6bdc" "url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=335ae3f8b353b6c7260eacb6aa706bb30f8a6bdc"
}, },
{ {
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=3ea5197d268c6f4ed08fb866b587349f7049c6d5", "name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=be70d02f12cb9a71a9b07b601f0efafc99718ec9",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=3ea5197d268c6f4ed08fb866b587349f7049c6d5" "url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=be70d02f12cb9a71a9b07b601f0efafc99718ec9"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=4aa30844e28eb4b410f86d97e970a39fcdfd797d",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=4aa30844e28eb4b410f86d97e970a39fcdfd797d"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=4abed07fd2380b6073f5cc9f2a701773e914f86f",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=4abed07fd2380b6073f5cc9f2a701773e914f86f"
}, },
{ {
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=54e7d8fa44202a8528ef33d85381bca63d7749a5", "name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=54e7d8fa44202a8528ef33d85381bca63d7749a5",
@ -177,125 +117,170 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=57a5e1f62cd3230fd046b199eee902507100e18c" "url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=57a5e1f62cd3230fd046b199eee902507100e18c"
}, },
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=8ee65e3c9addab1d3c15ba013401f5698fb73594",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=8ee65e3c9addab1d3c15ba013401f5698fb73594"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=00022c12e0cad8b735f94d6ee3785a557b4a3df2",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=00022c12e0cad8b735f94d6ee3785a557b4a3df2"
},
{ {
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=78a681f9d0d8e9843223dc42d02443e911b196a1", "name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=78a681f9d0d8e9843223dc42d02443e911b196a1",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=78a681f9d0d8e9843223dc42d02443e911b196a1" "url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=78a681f9d0d8e9843223dc42d02443e911b196a1"
}, },
{ {
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=846f561170f0f4f6345d6b0ce1c35bf7059126cb", "name": "https://source.codeaurora.org/quic/la//platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=0a755b400876ab4d58151e98462d3fa8fe099f61",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=846f561170f0f4f6345d6b0ce1c35bf7059126cb" "url": "https://source.codeaurora.org/quic/la//platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=0a755b400876ab4d58151e98462d3fa8fe099f61"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=8dc81c98ed72c99983660d5b94c2c8283bc1ff7f",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=8dc81c98ed72c99983660d5b94c2c8283bc1ff7f"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=9048145ff167fb8f9f8d2a9845ee1d1b45c4884c",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=9048145ff167fb8f9f8d2a9845ee1d1b45c4884c"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=99c0ddb04e8de0b8139778c7fb77b1957d113769",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=99c0ddb04e8de0b8139778c7fb77b1957d113769"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=9e040e43da5fe987747e16b305d7adf66977420f",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=9e040e43da5fe987747e16b305d7adf66977420f"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=a978afb1838273e0d7a7ec86dd8bc9db85dff49d",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=a978afb1838273e0d7a7ec86dd8bc9db85dff49d"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=b98f8aafb23cbc8e883870bcc9dac165b3d75ae6",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=b98f8aafb23cbc8e883870bcc9dac165b3d75ae6"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=d42e72aa69a02531396b5a37cadebf927a757aa6",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=d42e72aa69a02531396b5a37cadebf927a757aa6"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=eb72224cc57092448663fecc2c9bfa0f775eb770",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=eb72224cc57092448663fecc2c9bfa0f775eb770"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=fb2f07b3b0d637a403bb891c57e76b6345a92cf0",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=fb2f07b3b0d637a403bb891c57e76b6345a92cf0"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=002cb97a955832197f3ceebfa8b32bd12b946151",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=002cb97a955832197f3ceebfa8b32bd12b946151"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=0c5a2ba407f23efd89cac6dc45e2ab9bdba3ada1",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=0c5a2ba407f23efd89cac6dc45e2ab9bdba3ada1"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=17275491f327909b32945ec1f465968021d22a7f",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=17275491f327909b32945ec1f465968021d22a7f"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=239aba9a1a4a474d86bde9cb67bfb1b2d6379a7c",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=239aba9a1a4a474d86bde9cb67bfb1b2d6379a7c"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=7af334bfc3375c9f85a330b84db17c0db1d6dade",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=7af334bfc3375c9f85a330b84db17c0db1d6dade"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=9ab5a5a0b63075cfd095ed6bcf506b4704c523e1",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=9ab5a5a0b63075cfd095ed6bcf506b4704c523e1"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=a544494791b6307a2fe52fa282768083deb8a317",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=a544494791b6307a2fe52fa282768083deb8a317"
}, },
{ {
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=a6ace5b9ea34f22b136a35248087efc2ceb35fd4", "name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=a6ace5b9ea34f22b136a35248087efc2ceb35fd4",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=a6ace5b9ea34f22b136a35248087efc2ceb35fd4" "url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=a6ace5b9ea34f22b136a35248087efc2ceb35fd4"
}, },
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=17275491f327909b32945ec1f465968021d22a7f",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=17275491f327909b32945ec1f465968021d22a7f"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=a009a84d04bfac2a5c01101f38a70d216960fac0",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=a009a84d04bfac2a5c01101f38a70d216960fac0"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=4abed07fd2380b6073f5cc9f2a701773e914f86f",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=4abed07fd2380b6073f5cc9f2a701773e914f86f"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=a4b4267f94802e0a4d93999649710bbf340796d5",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=a4b4267f94802e0a4d93999649710bbf340796d5"
},
{ {
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=c13bdf105aa20559d2d783508051ad2dd3cfa65b", "name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=c13bdf105aa20559d2d783508051ad2dd3cfa65b",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=c13bdf105aa20559d2d783508051ad2dd3cfa65b" "url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=c13bdf105aa20559d2d783508051ad2dd3cfa65b"
}, },
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=99c0ddb04e8de0b8139778c7fb77b1957d113769",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=99c0ddb04e8de0b8139778c7fb77b1957d113769"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=3815e870ef906409af4a228f66d9400081227b75",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=3815e870ef906409af4a228f66d9400081227b75"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=a978afb1838273e0d7a7ec86dd8bc9db85dff49d",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=a978afb1838273e0d7a7ec86dd8bc9db85dff49d"
},
{ {
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=dd9ae2971b493909879cc2fd0fa97d12e1560762", "name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=dd9ae2971b493909879cc2fd0fa97d12e1560762",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=dd9ae2971b493909879cc2fd0fa97d12e1560762" "url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=dd9ae2971b493909879cc2fd0fa97d12e1560762"
}, },
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=846f561170f0f4f6345d6b0ce1c35bf7059126cb",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=846f561170f0f4f6345d6b0ce1c35bf7059126cb"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=239aba9a1a4a474d86bde9cb67bfb1b2d6379a7c",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=239aba9a1a4a474d86bde9cb67bfb1b2d6379a7c"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=f9f86fd07af5606d0cb74c3eca5b2cbfda509345",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=f9f86fd07af5606d0cb74c3eca5b2cbfda509345"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=4aa30844e28eb4b410f86d97e970a39fcdfd797d",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=4aa30844e28eb4b410f86d97e970a39fcdfd797d"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=9a8f1aeb8055de80137e769fae637cd480495509",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=9a8f1aeb8055de80137e769fae637cd480495509"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=a544494791b6307a2fe52fa282768083deb8a317",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=a544494791b6307a2fe52fa282768083deb8a317"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=d42e72aa69a02531396b5a37cadebf927a757aa6",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=d42e72aa69a02531396b5a37cadebf927a757aa6"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=002cb97a955832197f3ceebfa8b32bd12b946151",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=002cb97a955832197f3ceebfa8b32bd12b946151"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=8dc81c98ed72c99983660d5b94c2c8283bc1ff7f",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=8dc81c98ed72c99983660d5b94c2c8283bc1ff7f"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=9ab5a5a0b63075cfd095ed6bcf506b4704c523e1",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=9ab5a5a0b63075cfd095ed6bcf506b4704c523e1"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=731ebf70a25ab2cdc32d2626dcebe60fe3b09481",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=731ebf70a25ab2cdc32d2626dcebe60fe3b09481"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=3ea5197d268c6f4ed08fb866b587349f7049c6d5",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=3ea5197d268c6f4ed08fb866b587349f7049c6d5"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=ebf1042efb9bd4517cd09a543bb4e3a164de8771",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=ebf1042efb9bd4517cd09a543bb4e3a164de8771"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=9e040e43da5fe987747e16b305d7adf66977420f",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=9e040e43da5fe987747e16b305d7adf66977420f"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=b98f8aafb23cbc8e883870bcc9dac165b3d75ae6",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=b98f8aafb23cbc8e883870bcc9dac165b3d75ae6"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=eb72224cc57092448663fecc2c9bfa0f775eb770",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=eb72224cc57092448663fecc2c9bfa0f775eb770"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=17f6fbb4b52a6acdd831ebaffdac9bbc88d2f423",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=17f6fbb4b52a6acdd831ebaffdac9bbc88d2f423"
},
{ {
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=dda167ca8104de77f46fd29c66f66f807c63b309", "name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=dda167ca8104de77f46fd29c66f66f807c63b309",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=dda167ca8104de77f46fd29c66f66f807c63b309" "url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=dda167ca8104de77f46fd29c66f66f807c63b309"
}, },
{ {
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=ee9797fbefb45eee88c92420a24cda838cff6b45", "name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=9048145ff167fb8f9f8d2a9845ee1d1b45c4884c",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=ee9797fbefb45eee88c92420a24cda838cff6b45" "url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=9048145ff167fb8f9f8d2a9845ee1d1b45c4884c"
},
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=f11eeadd214e081a824f30aec5cb52d390ef576c",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=f11eeadd214e081a824f30aec5cb52d390ef576c"
}, },
{ {
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=f7ee321d5f31ce5bc6a4cbec72a965d272b3b77b", "name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=f7ee321d5f31ce5bc6a4cbec72a965d272b3b77b",
@ -303,9 +288,24 @@
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=f7ee321d5f31ce5bc6a4cbec72a965d272b3b77b" "url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=f7ee321d5f31ce5bc6a4cbec72a965d272b3b77b"
}, },
{ {
"name" : "https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-aurora-security-bulletin", "name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?h=wlan-cld2.driver.lnx.1.0.r21-rel&id=391d37818aaa8038a06662075dd8893501452931",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-aurora-security-bulletin" "url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?h=wlan-cld2.driver.lnx.1.0.r21-rel&id=391d37818aaa8038a06662075dd8893501452931"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=ec9896d0bc7521bbbe6dc28a198635dc281e7358",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=ec9896d0bc7521bbbe6dc28a198635dc281e7358"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=fb2f07b3b0d637a403bb891c57e76b6345a92cf0",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=fb2f07b3b0d637a403bb891c57e76b6345a92cf0"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=667b3108d10e9580bf9f6d337c759dc88a1a0bdc",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=667b3108d10e9580bf9f6d337c759dc88a1a0bdc"
} }
] ]
} }

View File

@ -58,14 +58,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "name": "1041888",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" "url": "http://www.securitytracker.com/id/1041888"
},
{
"name" : "https://security.netapp.com/advisory/ntap-20181018-0002/",
"refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20181018-0002/"
}, },
{ {
"name": "RHSA-2018:3655", "name": "RHSA-2018:3655",
@ -77,15 +72,20 @@
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3799-1/" "url": "https://usn.ubuntu.com/3799-1/"
}, },
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{ {
"name": "105594", "name": "105594",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/105594" "url": "http://www.securityfocus.com/bid/105594"
}, },
{ {
"name" : "1041888", "name": "https://security.netapp.com/advisory/ntap-20181018-0002/",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1041888" "url": "https://security.netapp.com/advisory/ntap-20181018-0002/"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{ {
"name": "106618", "name": "106618",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/106618" "url": "http://www.securityfocus.com/bid/106618"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "Secure@Microsoft.com", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2018-8492", "ID": "CVE-2018-8492",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -112,11 +112,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8492",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8492"
},
{ {
"name": "105455", "name": "105455",
"refsource": "BID", "refsource": "BID",
@ -126,6 +121,11 @@
"name": "1041842", "name": "1041842",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041842" "url": "http://www.securitytracker.com/id/1041842"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8492",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8492"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "Secure@Microsoft.com", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2018-8569", "ID": "CVE-2018-8569",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -53,11 +53,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-242-01",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-242-01"
},
{ {
"name": "https://www.usa.philips.com/healthcare/about/customer-support/product-security", "name": "https://www.usa.philips.com/healthcare/about/customer-support/product-security",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -67,6 +62,11 @@
"name": "105194", "name": "105194",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/105194" "url": "http://www.securityfocus.com/bid/105194"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-242-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-242-01"
} }
] ]
} }