"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 22:56:27 +00:00
parent 34b4fddf0d
commit 72679d754c
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
59 changed files with 3985 additions and 3985 deletions

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070120 Paypal Subscription Manager Multiple HTML Injections",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/457506/100/0/threaded"
},
{
"name" : "33560",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33560"
"name": "2168",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2168"
},
{
"name": "36103",
@ -68,14 +63,19 @@
"url": "http://osvdb.org/36103"
},
{
"name" : "2168",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2168"
"name": "20070120 Paypal Subscription Manager Multiple HTML Injections",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/457506/100/0/threaded"
},
{
"name": "psm-memberlist-sql-injection(31616)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31616"
},
{
"name": "33560",
"refsource": "OSVDB",
"url": "http://osvdb.org/33560"
}
]
}

View File

@ -53,29 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070124 Re: Safari Improperly Parses HTML Documents & BlogSpot XSS vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/457924/100/0/threaded"
},
{
"name" : "http://www.kde.org/info/security/advisory-20070206-1.txt",
"refsource" : "CONFIRM",
"url" : "http://www.kde.org/info/security/advisory-20070206-1.txt"
},
{
"name" : "https://issues.rpath.com/browse/RPL-1117",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-1117"
},
{
"name" : "GLSA-200703-10",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200703-10.xml"
},
{
"name" : "MDKSA-2007:031",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:031"
"name": "RHSA-2007:0909",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html"
},
{
"name": "MDKSA-2007:157",
@ -83,44 +63,9 @@
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:157"
},
{
"name" : "RHSA-2007:0909",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0909.html"
},
{
"name" : "SUSE-SR:2007:006",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_6_sr.html"
},
{
"name" : "USN-420-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-420-1"
},
{
"name" : "22428",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22428"
},
{
"name" : "oval:org.mitre.oval:def:10244",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10244"
},
{
"name" : "ADV-2007-0505",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0505"
},
{
"name" : "32975",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/32975"
},
{
"name" : "1017591",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1017591"
"name": "24889",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24889"
},
{
"name": "23932",
@ -128,19 +73,44 @@
"url": "http://secunia.com/advisories/23932"
},
{
"name" : "24013",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24013"
"name": "SUSE-SR:2007:006",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_6_sr.html"
},
{
"name" : "24065",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24065"
"name": "http://www.kde.org/info/security/advisory-20070206-1.txt",
"refsource": "CONFIRM",
"url": "http://www.kde.org/info/security/advisory-20070206-1.txt"
},
{
"name" : "24442",
"name": "32975",
"refsource": "OSVDB",
"url": "http://osvdb.org/32975"
},
{
"name": "GLSA-200703-10",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200703-10.xml"
},
{
"name": "20070124 Re: Safari Improperly Parses HTML Documents & BlogSpot XSS vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/457924/100/0/threaded"
},
{
"name": "USN-420-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-420-1"
},
{
"name": "27108",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/24442"
"url": "http://secunia.com/advisories/27108"
},
{
"name": "https://issues.rpath.com/browse/RPL-1117",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1117"
},
{
"name": "24463",
@ -148,14 +118,44 @@
"url": "http://secunia.com/advisories/24463"
},
{
"name" : "24889",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24889"
"name": "1017591",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017591"
},
{
"name" : "27108",
"name": "24065",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/27108"
"url": "http://secunia.com/advisories/24065"
},
{
"name": "24013",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24013"
},
{
"name": "oval:org.mitre.oval:def:10244",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10244"
},
{
"name": "MDKSA-2007:031",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:031"
},
{
"name": "ADV-2007-0505",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0505"
},
{
"name": "22428",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22428"
},
{
"name": "24442",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24442"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://security-protocols.com/sp-x43-advisory.php",
"refsource" : "MISC",
"url" : "http://security-protocols.com/sp-x43-advisory.php"
},
{
"name" : "http://docs.info.apple.com/article.html?artnum=305214",
"refsource" : "CONFIRM",
"url" : "http://docs.info.apple.com/article.html?artnum=305214"
"name": "TA07-072A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
},
{
"name": "APPLE-SA-2007-03-13",
@ -68,30 +63,35 @@
"url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
},
{
"name" : "TA07-072A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
"name": "http://docs.info.apple.com/article.html?artnum=305214",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=305214"
},
{
"name" : "VU#396820",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/396820"
"name": "http://security-protocols.com/sp-x43-advisory.php",
"refsource": "MISC",
"url": "http://security-protocols.com/sp-x43-advisory.php"
},
{
"name": "22228",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22228"
},
{
"name" : "ADV-2007-0930",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0930"
},
{
"name": "33365",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/33365"
},
{
"name": "VU#396820",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/396820"
},
{
"name": "ADV-2007-0930",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0930"
},
{
"name": "1017760",
"refsource": "SECTRACK",

View File

@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/archive/1/459264/100/0/threaded"
},
{
"name" : "22295",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22295"
"name": "2217",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2217"
},
{
"name": "ADV-2007-0407",
@ -73,9 +73,9 @@
"url": "http://www.vupen.com/english/advisories/2007/0407"
},
{
"name" : "2217",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2217"
"name": "22295",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22295"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "2216",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2216"
},
{
"name": "33672",
"refsource": "OSVDB",
"url": "http://osvdb.org/33672"
},
{
"name": "20070203 Wap Portal Serve 1.* <= Remote File Inclusion",
"refsource": "BUGTRAQ",
@ -62,21 +72,11 @@
"refsource": "OSVDB",
"url": "http://osvdb.org/33671"
},
{
"name" : "33672",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33672"
},
{
"name": "35770",
"refsource": "OSVDB",
"url": "http://osvdb.org/35770"
},
{
"name" : "2216",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2216"
},
{
"name": "wapportal-index-file-include(32196)",
"refsource": "XF",

View File

@ -58,9 +58,14 @@
"url": "http://typo3.org/teams/security/security-bulletins/typo3-20070221-1"
},
{
"name" : "22668",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22668"
"name": "typo3-t3libformmail-header-injection(32630)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32630"
},
{
"name": "24207",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24207"
},
{
"name": "ADV-2007-0697",
@ -73,14 +78,9 @@
"url": "http://osvdb.org/33471"
},
{
"name" : "24207",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24207"
},
{
"name" : "typo3-t3libformmail-header-injection(32630)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32630"
"name": "22668",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22668"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "DSA-1318",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1318"
},
{
"name": "24600",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24600"
},
{
"name": "ekg-ocr-function-dos(35136)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35136"
},
{
"name": "45379",
"refsource": "OSVDB",
"url": "http://osvdb.org/45379"
},
{
"name" : "ekg-ocr-function-dos(35136)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35136"
"name": "DSA-1318",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1318"
}
]
}

View File

@ -53,20 +53,15 @@
"references": {
"reference_data": [
{
"name" : "http://www.hitachi-support.com/security_e/vuls_e/HS07-006_e/index-e.html",
"refsource" : "CONFIRM",
"url" : "http://www.hitachi-support.com/security_e/vuls_e/HS07-006_e/index-e.html"
"name": "ADV-2007-1170",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1170"
},
{
"name": "23213",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23213"
},
{
"name" : "ADV-2007-1170",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1170"
},
{
"name": "34768",
"refsource": "OSVDB",
@ -81,6 +76,11 @@
"name": "hitachi-container-information-disclosure(33318)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33318"
},
{
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS07-006_e/index-e.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-006_e/index-e.html"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20070410 EEYE: Windows VDM Zero Page Race Condition Privilege Escalation",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/465232/100/0/threaded"
},
{
"name" : "http://research.eeye.com/html/advisories/published/AD20070410a.html",
"refsource" : "MISC",
"url" : "http://research.eeye.com/html/advisories/published/AD20070410a.html"
},
{
"name": "37635",
"refsource": "OSVDB",
@ -71,6 +61,16 @@
"name": "2563",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2563"
},
{
"name": "20070410 EEYE: Windows VDM Zero Page Race Condition Privilege Escalation",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/465232/100/0/threaded"
},
{
"name": "http://research.eeye.com/html/advisories/published/AD20070410a.html",
"refsource": "MISC",
"url": "http://research.eeye.com/html/advisories/published/AD20070410a.html"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "ftp://freevms.nvg.org/pub/vms/freevms/freevms-0_3_6.tgz",
"refsource" : "CONFIRM",
"url" : "ftp://freevms.nvg.org/pub/vms/freevms/freevms-0_3_6.tgz"
},
{
"name" : "24333",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24333"
},
{
"name": "35521",
"refsource": "OSVDB",
@ -71,6 +61,16 @@
"name": "freevms-vmsbackup-bo(34820)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34820"
},
{
"name": "24333",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24333"
},
{
"name": "ftp://freevms.nvg.org/pub/vms/freevms/freevms-0_3_6.tgz",
"refsource": "CONFIRM",
"url": "ftp://freevms.nvg.org/pub/vms/freevms/freevms-0_3_6.tgz"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "4255",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4255"
"name": "chilkataspstring-savetofile-code-execution(35812)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35812"
},
{
"name": "25205",
@ -68,9 +68,9 @@
"url": "http://osvdb.org/40110"
},
{
"name" : "chilkataspstring-savetofile-code-execution(35812)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35812"
"name": "4255",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4255"
}
]
}

View File

@ -53,29 +53,29 @@
"references": {
"reference_data": [
{
"name" : "http://forums.invisionpower.com/index.php?act=attach&type=post&id=11870",
"refsource" : "CONFIRM",
"url" : "http://forums.invisionpower.com/index.php?act=attach&type=post&id=11870"
},
{
"name" : "http://forums.invisionpower.com/index.php?showtopic=237075",
"refsource" : "CONFIRM",
"url" : "http://forums.invisionpower.com/index.php?showtopic=237075"
"name": "ipb-profile-xss(36589)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36589"
},
{
"name": "25656",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25656"
},
{
"name": "http://forums.invisionpower.com/index.php?act=attach&type=post&id=11870",
"refsource": "CONFIRM",
"url": "http://forums.invisionpower.com/index.php?act=attach&type=post&id=11870"
},
{
"name": "26788",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26788"
},
{
"name" : "ipb-profile-xss(36589)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36589"
"name": "http://forums.invisionpower.com/index.php?showtopic=237075",
"refsource": "CONFIRM",
"url": "http://forums.invisionpower.com/index.php?showtopic=237075"
}
]
}

View File

@ -52,60 +52,60 @@
},
"references": {
"reference_data": [
{
"name": "kwsphp-memberspace-index-sql-injection(36635)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36635"
},
{
"name": "4412",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4412"
},
{
"name" : "4413",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4413"
},
{
"name" : "4414",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4414"
},
{
"name": "http://koogar.alorys-hebergement.com/kwsphp/index.php?mod=news&ac=commentaires&id=29",
"refsource": "MISC",
"url": "http://koogar.alorys-hebergement.com/kwsphp/index.php?mod=news&ac=commentaires&id=29"
},
{
"name" : "25679",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25679"
},
{
"name" : "37180",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/37180"
},
{
"name" : "37182",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/37182"
},
{
"name" : "26850",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26850"
},
{
"name" : "kwsphp-memberspace-index-sql-injection(36635)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36635"
"name": "4413",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4413"
},
{
"name": "kwsphp-stats-index-sql-injection(36634)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36634"
},
{
"name": "4414",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4414"
},
{
"name": "kwsphp-login-sql-injection(36636)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36636"
},
{
"name": "25679",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25679"
},
{
"name": "26850",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26850"
},
{
"name": "37182",
"refsource": "OSVDB",
"url": "http://osvdb.org/37182"
},
{
"name": "37180",
"refsource": "OSVDB",
"url": "http://osvdb.org/37180"
}
]
}

View File

@ -53,9 +53,24 @@
"references": {
"reference_data": [
{
"name" : "4411",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4411"
"name": "chupix-download-directory-traversal(36641)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36641"
},
{
"name": "38882",
"refsource": "OSVDB",
"url": "http://osvdb.org/38882"
},
{
"name": "38881",
"refsource": "OSVDB",
"url": "http://osvdb.org/38881"
},
{
"name": "26851",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26851"
},
{
"name": "25681",
@ -68,24 +83,9 @@
"url": "http://www.vupen.com/english/advisories/2007/3180"
},
{
"name" : "38881",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/38881"
},
{
"name" : "38882",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/38882"
},
{
"name" : "26851",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26851"
},
{
"name" : "chupix-download-directory-traversal(36641)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36641"
"name": "4411",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4411"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-2570",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1032124",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032124"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "74116",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/74116"
},
{
"name" : "1032124",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1032124"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2015-2849",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-6064",
"STATE": "PUBLIC"
},
@ -52,26 +52,11 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-15-538",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-538"
},
{
"name" : "MS15-112",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-112"
},
{
"name": "MS15-113",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-113"
},
{
"name" : "77470",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/77470"
},
{
"name": "1034112",
"refsource": "SECTRACK",
@ -81,6 +66,21 @@
"name": "1034113",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034113"
},
{
"name": "77470",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/77470"
},
{
"name": "MS15-112",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-112"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-538",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-538"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-6108",
"STATE": "PUBLIC"
},
@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "1034333",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034333"
},
{
"name": "1034331",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034331"
},
{
"name": "MS15-128",
"refsource": "MS",
@ -67,21 +77,11 @@
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034330"
},
{
"name" : "1034331",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034331"
},
{
"name": "1034332",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034332"
},
{
"name" : "1034333",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034333"
},
{
"name": "1034336",
"refsource": "SECTRACK",

View File

@ -52,55 +52,55 @@
},
"references": {
"reference_data": [
{
"name" : "https://www.drupal.org/SA-CORE-2015-003",
"refsource" : "CONFIRM",
"url" : "https://www.drupal.org/SA-CORE-2015-003"
},
{
"name" : "DSA-3346",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3346"
},
{
"name" : "FEDORA-2015-13916",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165704.html"
},
{
"name" : "FEDORA-2015-13917",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165733.html"
},
{
"name": "FEDORA-2015-14442",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165723.html"
},
{
"name" : "FEDORA-2015-14443",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165840.html"
},
{
"name" : "FEDORA-2015-14444",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165690.html"
},
{
"name": "FEDORA-2015-13915",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165061.html"
},
{
"name": "1033358",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033358"
},
{
"name": "FEDORA-2015-14443",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165840.html"
},
{
"name": "FEDORA-2015-13917",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165733.html"
},
{
"name": "76432",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/76432"
},
{
"name" : "1033358",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1033358"
"name": "DSA-3346",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3346"
},
{
"name": "https://www.drupal.org/SA-CORE-2015-003",
"refsource": "CONFIRM",
"url": "https://www.drupal.org/SA-CORE-2015-003"
},
{
"name": "FEDORA-2015-14444",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165690.html"
},
{
"name": "FEDORA-2015-13916",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165704.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-6976",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://support.apple.com/HT205370",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205370"
},
{
"name" : "https://support.apple.com/HT205375",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205375"
"name": "APPLE-SA-2015-10-21-4",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html"
},
{
"name": "APPLE-SA-2015-10-21-1",
@ -68,9 +63,14 @@
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html"
},
{
"name" : "APPLE-SA-2015-10-21-4",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html"
"name": "https://support.apple.com/HT205375",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205375"
},
{
"name": "https://support.apple.com/HT205370",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205370"
},
{
"name": "77263",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2015-7769",
"STATE": "PUBLIC"
},

View File

@ -52,85 +52,40 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20151010 Re: CVE request - Android OS - Using the PPP character device driver caused the system to restart - Linux kernel",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/10/10/3"
},
{
"name" : "https://code.google.com/p/android/issues/detail?id=187973",
"refsource" : "MISC",
"url" : "https://code.google.com/p/android/issues/detail?id=187973"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1271134",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1271134"
},
{
"name" : "DSA-3426",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3426"
},
{
"name" : "SUSE-SU-2016:2074",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html"
},
{
"name" : "openSUSE-SU-2016:1008",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html"
},
{
"name" : "SUSE-SU-2015:2194",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html"
},
{
"name": "SUSE-SU-2015:2292",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html"
},
{
"name" : "SUSE-SU-2015:2339",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html"
},
{
"name" : "SUSE-SU-2015:2350",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html"
},
{
"name" : "openSUSE-SU-2015:2232",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html"
},
{
"name" : "USN-2886-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2886-1"
},
{
"name" : "USN-2841-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2841-1"
},
{
"name": "USN-2841-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2841-2"
},
{
"name" : "USN-2842-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2842-1"
"name": "77033",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/77033"
},
{
"name" : "USN-2842-2",
"name": "SUSE-SU-2015:2350",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html"
},
{
"name": "1033809",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033809"
},
{
"name": "https://code.google.com/p/android/issues/detail?id=187973",
"refsource": "MISC",
"url": "https://code.google.com/p/android/issues/detail?id=187973"
},
{
"name": "USN-2886-1",
"refsource": "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2842-2"
"url": "http://www.ubuntu.com/usn/USN-2886-1"
},
{
"name": "USN-2843-1",
@ -138,14 +93,9 @@
"url": "http://www.ubuntu.com/usn/USN-2843-1"
},
{
"name" : "USN-2843-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2843-2"
},
{
"name" : "USN-2843-3",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2843-3"
"name": "SUSE-SU-2015:2194",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html"
},
{
"name": "USN-2844-1",
@ -153,14 +103,64 @@
"url": "http://www.ubuntu.com/usn/USN-2844-1"
},
{
"name" : "77033",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/77033"
"name": "openSUSE-SU-2015:2232",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html"
},
{
"name" : "1033809",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1033809"
"name": "USN-2842-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2842-2"
},
{
"name": "USN-2843-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2843-2"
},
{
"name": "SUSE-SU-2015:2339",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html"
},
{
"name": "USN-2842-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2842-1"
},
{
"name": "[oss-security] 20151010 Re: CVE request - Android OS - Using the PPP character device driver caused the system to restart - Linux kernel",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/10/10/3"
},
{
"name": "SUSE-SU-2016:2074",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1271134",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271134"
},
{
"name": "USN-2841-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2841-1"
},
{
"name": "DSA-3426",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3426"
},
{
"name": "USN-2843-3",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2843-3"
},
{
"name": "openSUSE-SU-2016:1008",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html"
}
]
}

View File

@ -58,34 +58,9 @@
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21980826"
},
{
"name" : "IV84035",
"refsource" : "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IV84035"
},
{
"name" : "RHSA-2016:0701",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0701.html"
},
{
"name" : "RHSA-2016:0702",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0702.html"
},
{
"name" : "RHSA-2016:0708",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0708.html"
},
{
"name" : "RHSA-2016:0716",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0716.html"
},
{
"name" : "RHSA-2016:1430",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1430"
"name": "SUSE-SU-2016:1299",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"
},
{
"name": "RHSA-2016:1039",
@ -93,14 +68,19 @@
"url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html"
},
{
"name" : "RHSA-2017:1216",
"name": "RHSA-2016:0701",
"refsource": "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1216"
"url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html"
},
{
"name" : "SUSE-SU-2016:1299",
"name": "SUSE-SU-2016:1303",
"refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"
},
{
"name": "SUSE-SU-2016:1475",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"
},
{
"name": "SUSE-SU-2016:1300",
@ -108,9 +88,14 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"
},
{
"name" : "SUSE-SU-2016:1303",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"
"name": "RHSA-2016:1430",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1430"
},
{
"name": "RHSA-2016:0708",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html"
},
{
"name": "SUSE-SU-2016:1378",
@ -122,25 +107,40 @@
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"
},
{
"name" : "SUSE-SU-2016:1388",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"
},
{
"name": "SUSE-SU-2016:1458",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"
},
{
"name" : "SUSE-SU-2016:1475",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"
"name": "IV84035",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV84035"
},
{
"name": "RHSA-2016:0716",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html"
},
{
"name": "1035953",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035953"
},
{
"name": "SUSE-SU-2016:1388",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"
},
{
"name": "RHSA-2016:0702",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html"
},
{
"name": "RHSA-2017:1216",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1216"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0412",
"STATE": "PUBLIC"
},

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-0630",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-0996",
"STATE": "PUBLIC"
},
@ -53,14 +53,19 @@
"references": {
"reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-16-193/",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-16-193/"
"name": "openSUSE-SU-2016:0734",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html"
},
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-08.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-08.html"
"name": "1035251",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035251"
},
{
"name": "openSUSE-SU-2016:0719",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html"
},
{
"name": "GLSA-201603-07",
@ -73,19 +78,9 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html"
},
{
"name" : "SUSE-SU-2016:0716",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html"
},
{
"name" : "openSUSE-SU-2016:0719",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html"
},
{
"name" : "openSUSE-SU-2016:0734",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html"
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-08.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-08.html"
},
{
"name": "84312",
@ -93,9 +88,14 @@
"url": "http://www.securityfocus.com/bid/84312"
},
{
"name" : "1035251",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035251"
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-193/",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-193/"
},
{
"name": "SUSE-SU-2016:0716",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2016-1151",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "JVNDB-2016-000024",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000024"
},
{
"name": "https://cs.cybozu.co.jp/2016/006111.html",
"refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "JVN#64209269",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN64209269/index.html"
},
{
"name" : "JVNDB-2016-000024",
"refsource" : "JVNDB",
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000024"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2016-1642",
"STATE": "PUBLIC"
},
@ -52,71 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html"
},
{
"name" : "https://bugs.chromium.org/p/chromium/issues/detail?id=472147",
"refsource" : "CONFIRM",
"url" : "https://bugs.chromium.org/p/chromium/issues/detail?id=472147"
},
{
"name": "https://bugs.chromium.org/p/chromium/issues/detail?id=563964",
"refsource": "CONFIRM",
"url": "https://bugs.chromium.org/p/chromium/issues/detail?id=563964"
},
{
"name" : "https://bugs.chromium.org/p/chromium/issues/detail?id=565416",
"refsource" : "CONFIRM",
"url" : "https://bugs.chromium.org/p/chromium/issues/detail?id=565416"
},
{
"name" : "https://bugs.chromium.org/p/chromium/issues/detail?id=565424",
"refsource" : "CONFIRM",
"url" : "https://bugs.chromium.org/p/chromium/issues/detail?id=565424"
},
{
"name" : "https://bugs.chromium.org/p/chromium/issues/detail?id=582470",
"refsource" : "CONFIRM",
"url" : "https://bugs.chromium.org/p/chromium/issues/detail?id=582470"
},
{
"name" : "https://bugs.chromium.org/p/chromium/issues/detail?id=582697",
"refsource" : "CONFIRM",
"url" : "https://bugs.chromium.org/p/chromium/issues/detail?id=582697"
},
{
"name" : "https://bugs.chromium.org/p/chromium/issues/detail?id=582701",
"refsource" : "CONFIRM",
"url" : "https://bugs.chromium.org/p/chromium/issues/detail?id=582701"
},
{
"name": "https://bugs.chromium.org/p/chromium/issues/detail?id=582707",
"refsource": "CONFIRM",
"url": "https://bugs.chromium.org/p/chromium/issues/detail?id=582707"
},
{
"name" : "https://bugs.chromium.org/p/chromium/issues/detail?id=589186",
"refsource" : "CONFIRM",
"url" : "https://bugs.chromium.org/p/chromium/issues/detail?id=589186"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=591402",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=591402"
},
{
"name" : "DSA-3507",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3507"
},
{
"name" : "SUSE-SU-2016:0665",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html"
},
{
"name": "openSUSE-SU-2016:0664",
"refsource": "SUSE",
@ -127,25 +72,80 @@
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html"
},
{
"name": "84008",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/84008"
},
{
"name": "DSA-3507",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3507"
},
{
"name": "https://bugs.chromium.org/p/chromium/issues/detail?id=565416",
"refsource": "CONFIRM",
"url": "https://bugs.chromium.org/p/chromium/issues/detail?id=565416"
},
{
"name": "1035185",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035185"
},
{
"name": "https://bugs.chromium.org/p/chromium/issues/detail?id=472147",
"refsource": "CONFIRM",
"url": "https://bugs.chromium.org/p/chromium/issues/detail?id=472147"
},
{
"name": "https://bugs.chromium.org/p/chromium/issues/detail?id=582697",
"refsource": "CONFIRM",
"url": "https://bugs.chromium.org/p/chromium/issues/detail?id=582697"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=591402",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=591402"
},
{
"name": "https://bugs.chromium.org/p/chromium/issues/detail?id=582701",
"refsource": "CONFIRM",
"url": "https://bugs.chromium.org/p/chromium/issues/detail?id=582701"
},
{
"name": "openSUSE-SU-2016:0729",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html"
},
{
"name": "SUSE-SU-2016:0665",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html"
},
{
"name": "https://bugs.chromium.org/p/chromium/issues/detail?id=565424",
"refsource": "CONFIRM",
"url": "https://bugs.chromium.org/p/chromium/issues/detail?id=565424"
},
{
"name": "https://bugs.chromium.org/p/chromium/issues/detail?id=582470",
"refsource": "CONFIRM",
"url": "https://bugs.chromium.org/p/chromium/issues/detail?id=582470"
},
{
"name": "https://bugs.chromium.org/p/chromium/issues/detail?id=589186",
"refsource": "CONFIRM",
"url": "https://bugs.chromium.org/p/chromium/issues/detail?id=589186"
},
{
"name": "USN-2920-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2920-1"
},
{
"name" : "84008",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/84008"
},
{
"name" : "1035185",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035185"
"name": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2016-1667",
"STATE": "PUBLIC"
},
@ -52,56 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html"
},
{
"name" : "https://codereview.chromium.org/1953323002/",
"refsource" : "CONFIRM",
"url" : "https://codereview.chromium.org/1953323002/"
},
{
"name" : "https://crbug.com/605766",
"refsource" : "CONFIRM",
"url" : "https://crbug.com/605766"
},
{
"name" : "DSA-3590",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3590"
},
{
"name" : "GLSA-201605-02",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201605-02"
},
{
"name" : "RHSA-2016:1080",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1080.html"
},
{
"name" : "openSUSE-SU-2016:1655",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html"
},
{
"name" : "openSUSE-SU-2016:1304",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html"
},
{
"name" : "openSUSE-SU-2016:1319",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html"
},
{
"name" : "USN-2960-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2960-1"
},
{
"name": "90584",
"refsource": "BID",
@ -111,6 +61,56 @@
"name": "1035872",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035872"
},
{
"name": "RHSA-2016:1080",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1080.html"
},
{
"name": "openSUSE-SU-2016:1304",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html"
},
{
"name": "https://codereview.chromium.org/1953323002/",
"refsource": "CONFIRM",
"url": "https://codereview.chromium.org/1953323002/"
},
{
"name": "openSUSE-SU-2016:1655",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html"
},
{
"name": "DSA-3590",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3590"
},
{
"name": "USN-2960-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2960-1"
},
{
"name": "https://crbug.com/605766",
"refsource": "CONFIRM",
"url": "https://crbug.com/605766"
},
{
"name": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html"
},
{
"name": "openSUSE-SU-2016:1319",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html"
},
{
"name": "GLSA-201605-02",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201605-02"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2016-1836",
"STATE": "PUBLIC"
},
@ -52,175 +52,175 @@
},
"references": {
"reference_data": [
{
"name" : "https://support.apple.com/HT206564",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206564"
},
{
"name" : "https://support.apple.com/HT206566",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206566"
},
{
"name" : "https://support.apple.com/HT206567",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206567"
},
{
"name" : "https://support.apple.com/HT206568",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206568"
},
{
"name" : "https://support.apple.com/HT206899",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206899"
},
{
"name" : "https://support.apple.com/HT206901",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206901"
},
{
"name" : "https://support.apple.com/HT206902",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206902"
},
{
"name" : "https://support.apple.com/HT206903",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206903"
},
{
"name" : "https://support.apple.com/HT206904",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206904"
},
{
"name" : "https://support.apple.com/HT206905",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206905"
},
{
"name" : "http://xmlsoft.org/news.html",
"refsource" : "CONFIRM",
"url" : "http://xmlsoft.org/news.html"
},
{
"name" : "https://bugzilla.gnome.org/show_bug.cgi?id=759398",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.gnome.org/show_bug.cgi?id=759398"
},
{
"name" : "https://git.gnome.org/browse/libxml2/commit/?id=45752d2c334b50016666d8f0ec3691e2d680f0a0",
"refsource" : "CONFIRM",
"url" : "https://git.gnome.org/browse/libxml2/commit/?id=45752d2c334b50016666d8f0ec3691e2d680f0a0"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10170",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10170"
},
{
"name" : "https://www.tenable.com/security/tns-2016-18",
"refsource" : "CONFIRM",
"url" : "https://www.tenable.com/security/tns-2016-18"
},
{
"name" : "APPLE-SA-2016-05-16-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/May/msg00001.html"
},
{
"name" : "APPLE-SA-2016-05-16-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html"
},
{
"name" : "APPLE-SA-2016-05-16-3",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/May/msg00003.html"
},
{
"name" : "APPLE-SA-2016-05-16-4",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html"
},
{
"name" : "APPLE-SA-2016-07-18-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html"
},
{
"name" : "APPLE-SA-2016-07-18-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html"
},
{
"name" : "APPLE-SA-2016-07-18-3",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html"
},
{
"name" : "APPLE-SA-2016-07-18-4",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html"
},
{
"name" : "APPLE-SA-2016-07-18-6",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html"
},
{
"name" : "DSA-3593",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2016/dsa-3593"
},
{
"name" : "GLSA-201701-37",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201701-37"
},
{
"name": "RHSA-2016:1292",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1292"
},
{
"name" : "RHSA-2016:2957",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2957.html"
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
},
{
"name" : "USN-2994-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2994-1"
"name": "https://support.apple.com/HT206567",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206567"
},
{
"name": "90691",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/90691"
},
{
"name": "DSA-3593",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2016/dsa-3593"
},
{
"name": "APPLE-SA-2016-07-18-4",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html"
},
{
"name": "APPLE-SA-2016-07-18-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html"
},
{
"name": "APPLE-SA-2016-07-18-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html"
},
{
"name": "https://git.gnome.org/browse/libxml2/commit/?id=45752d2c334b50016666d8f0ec3691e2d680f0a0",
"refsource": "CONFIRM",
"url": "https://git.gnome.org/browse/libxml2/commit/?id=45752d2c334b50016666d8f0ec3691e2d680f0a0"
},
{
"name": "http://xmlsoft.org/news.html",
"refsource": "CONFIRM",
"url": "http://xmlsoft.org/news.html"
},
{
"name": "https://support.apple.com/HT206901",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206901"
},
{
"name": "APPLE-SA-2016-05-16-4",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html"
},
{
"name": "USN-2994-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2994-1"
},
{
"name": "https://support.apple.com/HT206566",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206566"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"name": "APPLE-SA-2016-07-18-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html"
},
{
"name": "APPLE-SA-2016-07-18-6",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html"
},
{
"name": "https://www.tenable.com/security/tns-2016-18",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2016-18"
},
{
"name": "APPLE-SA-2016-05-16-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/May/msg00003.html"
},
{
"name": "https://support.apple.com/HT206564",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206564"
},
{
"name": "RHSA-2016:2957",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html"
},
{
"name": "GLSA-201701-37",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-37"
},
{
"name": "1035890",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035890"
},
{
"name": "https://support.apple.com/HT206905",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206905"
},
{
"name": "APPLE-SA-2016-05-16-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html"
},
{
"name": "https://support.apple.com/HT206903",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206903"
},
{
"name": "https://support.apple.com/HT206902",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206902"
},
{
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=759398",
"refsource": "CONFIRM",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=759398"
},
{
"name": "https://support.apple.com/HT206904",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206904"
},
{
"name": "https://support.apple.com/HT206568",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206568"
},
{
"name": "APPLE-SA-2016-05-16-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/May/msg00001.html"
},
{
"name": "https://support.apple.com/HT206899",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206899"
}
]
}

View File

@ -52,16 +52,41 @@
},
"references": {
"reference_data": [
{
"name": "RHSA-2017:0794",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0794.html"
},
{
"name": "GLSA-201701-48",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-48"
},
{
"name": "1035699",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035699"
},
{
"name": "[oss-security] 20160427 CVE-2016-4049: Denial of Service Vulnerability in Quagga BGP Routing Daemon (bgpd)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/04/27/7"
},
{
"name": "openSUSE-SU-2016:1313",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00062.html"
},
{
"name": "[quagga-dev] 20160125 [quagga-dev 14619] SIGABRT while dumping BGP routes (bgpd)",
"refsource": "MLIST",
"url": "https://lists.quagga.net/pipermail/quagga-dev/2016-January/014699.html"
},
{
"name": "88561",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/88561"
},
{
"name": "[quagga-dev] 20160203 [quagga-dev 14663] Re: SIGABRT while dumping BGP routes (bgpd)",
"refsource": "MLIST",
@ -71,31 +96,6 @@
"name": "DSA-3654",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3654"
},
{
"name" : "GLSA-201701-48",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201701-48"
},
{
"name" : "RHSA-2017:0794",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0794.html"
},
{
"name" : "openSUSE-SU-2016:1313",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-05/msg00062.html"
},
{
"name" : "88561",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/88561"
},
{
"name" : "1035699",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035699"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4156",
"STATE": "PUBLIC"
},
@ -53,39 +53,39 @@
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html"
"name": "1036117",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036117"
},
{
"name": "MS16-083",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083"
},
{
"name": "openSUSE-SU-2016:1625",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html"
},
{
"name": "RHSA-2016:1238",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1238"
},
{
"name" : "SUSE-SU-2016:1613",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html"
},
{
"name": "openSUSE-SU-2016:1621",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html"
},
{
"name" : "openSUSE-SU-2016:1625",
"name": "SUSE-SU-2016:1613",
"refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html"
},
{
"name" : "1036117",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036117"
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-16-496",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-16-496"
},
{
"name" : "https://support.apple.com/HT206903",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206903"
"name": "91824",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91824"
},
{
"name": "APPLE-SA-2016-07-18-1",
@ -68,14 +63,19 @@
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html"
},
{
"name" : "91824",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/91824"
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-496",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-496"
},
{
"name": "1036348",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036348"
},
{
"name": "https://support.apple.com/HT206903",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206903"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "https://salsa.debian.org/debian/cron/commit/40791b93",
"refsource": "MISC",
"url": "https://salsa.debian.org/debian/cron/commit/40791b93"
},
{
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809167",
"refsource": "MISC",
@ -61,11 +66,6 @@
"name": "https://packages.qa.debian.org/c/cron/news/20190311T170403Z.html",
"refsource": "MISC",
"url": "https://packages.qa.debian.org/c/cron/news/20190311T170403Z.html"
},
{
"name" : "https://salsa.debian.org/debian/cron/commit/40791b93",
"refsource" : "MISC",
"url" : "https://salsa.debian.org/debian/cron/commit/40791b93"
}
]
}