"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 02:25:52 +00:00
parent ae274a3c64
commit 856935b7e3
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
45 changed files with 3554 additions and 3554 deletions

View File

@ -53,45 +53,45 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060126 [eVuln] \"my little homepage\" products [link] BBCode XSS Vulnerability", "name": "20060130 My Little Homepage - source verify of different products",
"refsource" : "BUGTRAQ", "refsource": "VIM",
"url" : "http://www.securityfocus.com/archive/1/423167/100/0/threaded" "url": "http://attrition.org/pipermail/vim/2006-January/000520.html"
},
{
"name": "18628",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18628"
}, },
{ {
"name": "http://evuln.com/vulns/51/summary.html", "name": "http://evuln.com/vulns/51/summary.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://evuln.com/vulns/51/summary.html" "url": "http://evuln.com/vulns/51/summary.html"
}, },
{
"name" : "20060130 My Little Homepage - source verify of different products",
"refsource" : "VIM",
"url" : "http://attrition.org/pipermail/vim/2006-January/000520.html"
},
{
"name" : "http://evuln.com/vulns/51/",
"refsource" : "MISC",
"url" : "http://evuln.com/vulns/51/"
},
{ {
"name": "16395", "name": "16395",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/16395" "url": "http://www.securityfocus.com/bid/16395"
}, },
{
"name": "20060126 [eVuln] \"my little homepage\" products [link] BBCode XSS Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/423167/100/0/threaded"
},
{ {
"name": "ADV-2006-0349", "name": "ADV-2006-0349",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0349" "url": "http://www.vupen.com/english/advisories/2006/0349"
}, },
{
"name": "http://evuln.com/vulns/51/",
"refsource": "MISC",
"url": "http://evuln.com/vulns/51/"
},
{ {
"name": "22855", "name": "22855",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/22855" "url": "http://www.osvdb.org/22855"
}, },
{
"name" : "18628",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18628"
},
{ {
"name": "mylittlehomepage-link-tag-xss(24310)", "name": "mylittlehomepage-link-tag-xss(24310)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "http://fuzzymonkey.net/forum/viewtopic.php?t=856",
"refsource": "CONFIRM",
"url": "http://fuzzymonkey.net/forum/viewtopic.php?t=856"
},
{ {
"name": "20060215 [eVuln] My Blog BBCode XSS Vulnerabilities", "name": "20060215 [eVuln] My Blog BBCode XSS Vulnerabilities",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -62,65 +67,60 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://evuln.com/vulns/79/summary.html" "url": "http://evuln.com/vulns/79/summary.html"
}, },
{
"name" : "20060215 [eVuln] M. Blom HTML::BBCode perl module XSS Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/425113/100/0/threaded"
},
{
"name" : "http://www.evuln.com/vulns/80/summary.html",
"refsource" : "MISC",
"url" : "http://www.evuln.com/vulns/80/summary.html"
},
{
"name" : "http://menno.b10m.net/perl/HTML-BBCode/Changes",
"refsource" : "CONFIRM",
"url" : "http://menno.b10m.net/perl/HTML-BBCode/Changes"
},
{
"name" : "http://menno.b10m.net/perl/dists/HTML-BBCode-1.05.tar.gz",
"refsource" : "CONFIRM",
"url" : "http://menno.b10m.net/perl/dists/HTML-BBCode-1.05.tar.gz"
},
{
"name" : "http://fuzzymonkey.net/forum/viewtopic.php?t=856",
"refsource" : "CONFIRM",
"url" : "http://fuzzymonkey.net/forum/viewtopic.php?t=856"
},
{ {
"name": "http://evuln.com/vulns/80/summary.html", "name": "http://evuln.com/vulns/80/summary.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://evuln.com/vulns/80/summary.html" "url": "http://evuln.com/vulns/80/summary.html"
}, },
{
"name" : "16659",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16659"
},
{
"name" : "ADV-2006-0614",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0614"
},
{
"name" : "ADV-2006-0642",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0642"
},
{ {
"name": "18905", "name": "18905",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18905" "url": "http://secunia.com/advisories/18905"
}, },
{
"name": "myblog-bbcode-xss(24668)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24668"
},
{
"name": "ADV-2006-0642",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0642"
},
{
"name": "16659",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16659"
},
{
"name": "http://www.evuln.com/vulns/80/summary.html",
"refsource": "MISC",
"url": "http://www.evuln.com/vulns/80/summary.html"
},
{
"name": "http://menno.b10m.net/perl/dists/HTML-BBCode-1.05.tar.gz",
"refsource": "CONFIRM",
"url": "http://menno.b10m.net/perl/dists/HTML-BBCode-1.05.tar.gz"
},
{ {
"name": "18925", "name": "18925",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18925" "url": "http://secunia.com/advisories/18925"
}, },
{ {
"name" : "myblog-bbcode-xss(24668)", "name": "20060215 [eVuln] M. Blom HTML::BBCode perl module XSS Vulnerabilities",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24668" "url": "http://www.securityfocus.com/archive/1/425113/100/0/threaded"
},
{
"name": "ADV-2006-0614",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0614"
},
{
"name": "http://menno.b10m.net/perl/HTML-BBCode/Changes",
"refsource": "CONFIRM",
"url": "http://menno.b10m.net/perl/HTML-BBCode/Changes"
} }
] ]
} }

View File

@ -53,49 +53,49 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060215 [BuHa-Security] Multiple Vulnerabilities in Mantis 1.00rc4", "name": "16657",
"refsource" : "BUGTRAQ", "refsource": "BID",
"url" : "http://www.securityfocus.com/archive/1/425046/100/0/threaded" "url": "http://www.securityfocus.com/bid/16657"
},
{
"name" : "http://morph3us.org/advisories/20060214-mantis-100rc4.txt",
"refsource" : "MISC",
"url" : "http://morph3us.org/advisories/20060214-mantis-100rc4.txt"
},
{
"name" : "http://sourceforge.net/project/showfiles.php?group_id=14963&package_id=12175&release_id=386059",
"refsource" : "MISC",
"url" : "http://sourceforge.net/project/showfiles.php?group_id=14963&package_id=12175&release_id=386059"
}, },
{ {
"name": "http://sourceforge.net/project/shownotes.php?release_id=386059&group_id=14963", "name": "http://sourceforge.net/project/shownotes.php?release_id=386059&group_id=14963",
"refsource": "MISC", "refsource": "MISC",
"url": "http://sourceforge.net/project/shownotes.php?release_id=386059&group_id=14963" "url": "http://sourceforge.net/project/shownotes.php?release_id=386059&group_id=14963"
}, },
{
"name": "21400",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21400"
},
{ {
"name": "DSA-1133", "name": "DSA-1133",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1133" "url": "http://www.debian.org/security/2006/dsa-1133"
}, },
{ {
"name" : "16657", "name": "20060215 [BuHa-Security] Multiple Vulnerabilities in Mantis 1.00rc4",
"refsource" : "BID", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/bid/16657" "url": "http://www.securityfocus.com/archive/1/425046/100/0/threaded"
}, },
{ {
"name": "23248", "name": "23248",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/23248" "url": "http://www.osvdb.org/23248"
}, },
{
"name": "http://morph3us.org/advisories/20060214-mantis-100rc4.txt",
"refsource": "MISC",
"url": "http://morph3us.org/advisories/20060214-mantis-100rc4.txt"
},
{ {
"name": "22487", "name": "22487",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/22487" "url": "http://www.osvdb.org/22487"
}, },
{ {
"name" : "21400", "name": "http://sourceforge.net/project/showfiles.php?group_id=14963&package_id=12175&release_id=386059",
"refsource" : "SECUNIA", "refsource": "MISC",
"url" : "http://secunia.com/advisories/21400" "url": "http://sourceforge.net/project/showfiles.php?group_id=14963&package_id=12175&release_id=386059"
} }
] ]
} }

View File

@ -52,21 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.joomla.org/content/view/938/78/",
"refsource" : "CONFIRM",
"url" : "http://www.joomla.org/content/view/938/78/"
},
{ {
"name": "ADV-2006-0818", "name": "ADV-2006-0818",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0818" "url": "http://www.vupen.com/english/advisories/2006/0818"
}, },
{
"name" : "23822",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/23822"
},
{ {
"name": "19105", "name": "19105",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -76,6 +66,16 @@
"name": "joomla-multiple-bypass-security(25033)", "name": "joomla-multiple-bypass-security(25033)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25033" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25033"
},
{
"name": "http://www.joomla.org/content/view/938/78/",
"refsource": "CONFIRM",
"url": "http://www.joomla.org/content/view/938/78/"
},
{
"name": "23822",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/23822"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2006-1171", "ID": "CVE-2006-1171",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,26 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060306 link bank code execution and xss",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/426932/100/0/threaded"
},
{
"name" : "17004",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17004"
},
{
"name" : "ADV-2006-0885",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0885"
},
{
"name" : "23750",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/23750"
},
{ {
"name": "19154", "name": "19154",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -81,6 +61,26 @@
"name": "553", "name": "553",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/553" "url": "http://securityreason.com/securityalert/553"
},
{
"name": "23750",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/23750"
},
{
"name": "17004",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17004"
},
{
"name": "20060306 link bank code execution and xss",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/426932/100/0/threaded"
},
{
"name": "ADV-2006-0885",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0885"
} }
] ]
} }

View File

@ -53,9 +53,19 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.security-protocols.com/sp-x24-advisory.php", "name": "17951",
"refsource" : "MISC", "refsource": "BID",
"url" : "http://www.security-protocols.com/sp-x24-advisory.php" "url": "http://www.securityfocus.com/bid/17951"
},
{
"name": "ADV-2006-1779",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1779"
},
{
"name": "TA06-132A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA06-132A.html"
}, },
{ {
"name": "http://docs.info.apple.com/article.html?artnum=303411", "name": "http://docs.info.apple.com/article.html?artnum=303411",
@ -67,35 +77,30 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.security-protocols.com/modules.php?name=News&file=article&sid=3233" "url": "http://www.security-protocols.com/modules.php?name=News&file=article&sid=3233"
}, },
{
"name": "http://www.security-protocols.com/sp-x24-advisory.php",
"refsource": "MISC",
"url": "http://www.security-protocols.com/sp-x24-advisory.php"
},
{ {
"name": "APPLE-SA-2006-05-11", "name": "APPLE-SA-2006-05-11",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2006/May/msg00003.html" "url": "http://lists.apple.com/archives/security-announce/2006/May/msg00003.html"
}, },
{
"name" : "TA06-132A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-132A.html"
},
{
"name" : "17634",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17634"
},
{
"name" : "17951",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17951"
},
{ {
"name": "ADV-2006-1452", "name": "ADV-2006-1452",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1452" "url": "http://www.vupen.com/english/advisories/2006/1452"
}, },
{ {
"name" : "ADV-2006-1779", "name": "17634",
"refsource" : "VUPEN", "refsource": "BID",
"url" : "http://www.vupen.com/english/advisories/2006/1779" "url": "http://www.securityfocus.com/bid/17634"
},
{
"name": "20077",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20077"
}, },
{ {
"name": "31837", "name": "31837",
@ -106,11 +111,6 @@
"name": "19686", "name": "19686",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19686" "url": "http://secunia.com/advisories/19686"
},
{
"name" : "20077",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20077"
} }
] ]
} }

View File

@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[security-announce] 20060815 Proxy Generation Tool Vulnerability",
"refsource" : "MLIST",
"url" : "http://www.globus.org/mail_archive/security-announce/2006/08/msg00000.html"
},
{
"name" : "19549",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19549"
},
{ {
"name": "ADV-2006-3290", "name": "ADV-2006-3290",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3290" "url": "http://www.vupen.com/english/advisories/2006/3290"
}, },
{
"name": "globus-grid-proxy-race-condition(28408)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28408"
},
{
"name": "[security-announce] 20060815 Proxy Generation Tool Vulnerability",
"refsource": "MLIST",
"url": "http://www.globus.org/mail_archive/security-announce/2006/08/msg00000.html"
},
{ {
"name": "21516", "name": "21516",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21516" "url": "http://secunia.com/advisories/21516"
}, },
{ {
"name" : "globus-grid-proxy-race-condition(28408)", "name": "19549",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28408" "url": "http://www.securityfocus.com/bid/19549"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060916 PHP-Post Multiple Input Validation Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/446318/100/0/threaded"
},
{ {
"name": "20061", "name": "20061",
"refsource": "BID", "refsource": "BID",
@ -67,16 +62,16 @@
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3688" "url": "http://www.vupen.com/english/advisories/2006/3688"
}, },
{
"name" : "28965",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/28965"
},
{ {
"name": "28966", "name": "28966",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/28966" "url": "http://www.osvdb.org/28966"
}, },
{
"name": "1607",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1607"
},
{ {
"name": "28967", "name": "28967",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -88,9 +83,14 @@
"url": "http://secunia.com/advisories/22014" "url": "http://secunia.com/advisories/22014"
}, },
{ {
"name" : "1607", "name": "20060916 PHP-Post Multiple Input Validation Vulnerabilities",
"refsource" : "SREASON", "refsource": "BUGTRAQ",
"url" : "http://securityreason.com/securityalert/1607" "url": "http://www.securityfocus.com/archive/1/446318/100/0/threaded"
},
{
"name": "28965",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/28965"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "2389",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/2389"
},
{ {
"name": "20088", "name": "20088",
"refsource": "BID", "refsource": "BID",
@ -67,6 +62,11 @@
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3684" "url": "http://www.vupen.com/english/advisories/2006/3684"
}, },
{
"name": "2389",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2389"
},
{ {
"name": "21961", "name": "21961",
"refsource": "SECUNIA", "refsource": "SECUNIA",

View File

@ -57,21 +57,11 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/449248/100/200/threaded" "url": "http://www.securityfocus.com/archive/1/449248/100/200/threaded"
}, },
{
"name" : "http://csirt.fe.up.pt/docs/TORQUE-audit.pdf",
"refsource" : "MISC",
"url" : "http://csirt.fe.up.pt/docs/TORQUE-audit.pdf"
},
{ {
"name": "GLSA-200611-14", "name": "GLSA-200611-14",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200611-14.xml" "url": "http://security.gentoo.org/glsa/glsa-200611-14.xml"
}, },
{
"name" : "20632",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/20632"
},
{ {
"name": "ADV-2006-4651", "name": "ADV-2006-4651",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -81,6 +71,16 @@
"name": "1820", "name": "1820",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1820" "url": "http://securityreason.com/securityalert/1820"
},
{
"name": "20632",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20632"
},
{
"name": "http://csirt.fe.up.pt/docs/TORQUE-audit.pdf",
"refsource": "MISC",
"url": "http://csirt.fe.up.pt/docs/TORQUE-audit.pdf"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://packetstormsecurity.org/1002-exploits/esmile-sql.txt", "name": "62272",
"refsource" : "MISC", "refsource": "OSVDB",
"url" : "http://packetstormsecurity.org/1002-exploits/esmile-sql.txt" "url": "http://osvdb.org/62272"
}, },
{ {
"name": "11382", "name": "11382",
@ -63,9 +63,9 @@
"url": "http://www.exploit-db.com/exploits/11382" "url": "http://www.exploit-db.com/exploits/11382"
}, },
{ {
"name" : "62272", "name": "esmile-index-sql-injection(56206)",
"refsource" : "OSVDB", "refsource": "XF",
"url" : "http://osvdb.org/62272" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56206"
}, },
{ {
"name": "38548", "name": "38548",
@ -73,9 +73,9 @@
"url": "http://secunia.com/advisories/38548" "url": "http://secunia.com/advisories/38548"
}, },
{ {
"name" : "esmile-index-sql-injection(56206)", "name": "http://packetstormsecurity.org/1002-exploits/esmile-sql.txt",
"refsource" : "XF", "refsource": "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/56206" "url": "http://packetstormsecurity.org/1002-exploits/esmile-sql.txt"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://code.google.com/p/chromium/issues/detail?id=16535",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/chromium/issues/detail?id=16535"
},
{ {
"name": "http://googlechromereleases.blogspot.com/2010/05/stable-channel-update.html", "name": "http://googlechromereleases.blogspot.com/2010/05/stable-channel-update.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2010/05/stable-channel-update.html" "url": "http://googlechromereleases.blogspot.com/2010/05/stable-channel-update.html"
}, },
{
"name": "http://code.google.com/p/chromium/issues/detail?id=16535",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=16535"
},
{ {
"name": "oval:org.mitre.oval:def:11644", "name": "oval:org.mitre.oval:def:11644",
"refsource": "OVAL", "refsource": "OVAL",

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2010-2972", "ID": "CVE-2010-2972",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20101203 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/514995/100/0/threaded"
},
{ {
"name": "[security-announce] 20101202 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues", "name": "[security-announce] 20101202 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues",
"refsource": "MLIST", "refsource": "MLIST",
@ -72,6 +67,11 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/45169" "url": "http://www.securityfocus.com/bid/45169"
}, },
{
"name": "20101203 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/514995/100/0/threaded"
},
{ {
"name": "69596", "name": "69596",
"refsource": "OSVDB", "refsource": "OSVDB",

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20101203 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/514995/100/0/threaded"
},
{ {
"name": "[security-announce] 20101202 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues", "name": "[security-announce] 20101202 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://lists.vmware.com/pipermail/security-announce/2010/000112.html" "url": "http://lists.vmware.com/pipermail/security-announce/2010/000112.html"
}, },
{
"name": "69585",
"refsource": "OSVDB",
"url": "http://osvdb.org/69585"
},
{ {
"name": "http://www.vmware.com/security/advisories/VMSA-2010-0018.html", "name": "http://www.vmware.com/security/advisories/VMSA-2010-0018.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -73,25 +73,20 @@
"url": "http://www.securityfocus.com/bid/45167" "url": "http://www.securityfocus.com/bid/45167"
}, },
{ {
"name" : "69585", "name": "20101203 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues",
"refsource" : "OSVDB", "refsource": "BUGTRAQ",
"url" : "http://osvdb.org/69585" "url": "http://www.securityfocus.com/archive/1/514995/100/0/threaded"
},
{
"name" : "1024819",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1024819"
},
{
"name" : "1024820",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1024820"
}, },
{ {
"name": "42453", "name": "42453",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42453" "url": "http://secunia.com/advisories/42453"
}, },
{
"name": "1024819",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024819"
},
{ {
"name": "42482", "name": "42482",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -101,6 +96,11 @@
"name": "ADV-2010-3116", "name": "ADV-2010-3116",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3116" "url": "http://www.vupen.com/english/advisories/2010/3116"
},
{
"name": "1024820",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024820"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20101210 Novell Vibe 3 BETA OnPrem Stored Cross-site Scripting Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/515147/100/0/threaded"
},
{ {
"name": "http://www.solutionary.com/index/SERT/Vuln-Disclosures/Novell-Vibe-Beta-3-XSS-vulnerability.html", "name": "http://www.solutionary.com/index/SERT/Vuln-Disclosures/Novell-Vibe-Beta-3-XSS-vulnerability.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.solutionary.com/index/SERT/Vuln-Disclosures/Novell-Vibe-Beta-3-XSS-vulnerability.html" "url": "http://www.solutionary.com/index/SERT/Vuln-Disclosures/Novell-Vibe-Beta-3-XSS-vulnerability.html"
},
{
"name": "20101210 Novell Vibe 3 BETA OnPrem Stored Cross-site Scripting Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/515147/100/0/threaded"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-3022", "ID": "CVE-2014-3022",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,25 +53,15 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21681249", "name": "PI09594",
"refsource" : "CONFIRM", "refsource": "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21681249" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI09594"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676091",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676091"
}, },
{ {
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676092", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676092",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676092" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676092"
}, },
{
"name" : "PI09594",
"refsource" : "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1PI09594"
},
{ {
"name": "68211", "name": "68211",
"refsource": "BID", "refsource": "BID",
@ -81,6 +71,16 @@
"name": "ibm-was-cve20143022-info-disc(93060)", "name": "ibm-was-cve20143022-info-disc(93060)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/93060" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/93060"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676091",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676091"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21681249",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21681249"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-3466", "ID": "CVE-2014-3466",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,45 +52,45 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/",
"refsource" : "MISC",
"url" : "http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/"
},
{ {
"name": "http://www.gnutls.org/security.html", "name": "http://www.gnutls.org/security.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.gnutls.org/security.html" "url": "http://www.gnutls.org/security.html"
}, },
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1101932",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1101932"
},
{
"name" : "https://www.gitorious.org/gnutls/gnutls/commit/688ea6428a432c39203d00acd1af0e7684e5ddfd",
"refsource" : "CONFIRM",
"url" : "https://www.gitorious.org/gnutls/gnutls/commit/688ea6428a432c39203d00acd1af0e7684e5ddfd"
},
{
"name" : "http://linux.oracle.com/errata/ELSA-2014-0595.html",
"refsource" : "CONFIRM",
"url" : "http://linux.oracle.com/errata/ELSA-2014-0595.html"
},
{
"name" : "http://linux.oracle.com/errata/ELSA-2014-0594.html",
"refsource" : "CONFIRM",
"url" : "http://linux.oracle.com/errata/ELSA-2014-0594.html"
},
{ {
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21678776", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21678776",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678776" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678776"
}, },
{ {
"name" : "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096155", "name": "DSA-2944",
"refsource" : "CONFIRM", "refsource": "DEBIAN",
"url" : "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096155" "url": "http://www.debian.org/security/2014/dsa-2944"
},
{
"name": "58340",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/58340"
},
{
"name": "RHSA-2014:0595",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0595.html"
},
{
"name": "USN-2229-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2229-1"
},
{
"name": "58642",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/58642"
},
{
"name": "67741",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/67741"
}, },
{ {
"name": "http://www.novell.com/support/kb/doc.php?id=7015302", "name": "http://www.novell.com/support/kb/doc.php?id=7015302",
@ -98,29 +98,29 @@
"url": "http://www.novell.com/support/kb/doc.php?id=7015302" "url": "http://www.novell.com/support/kb/doc.php?id=7015302"
}, },
{ {
"name" : "http://www.novell.com/support/kb/doc.php?id=7015303", "name": "59057",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59057"
},
{
"name": "http://linux.oracle.com/errata/ELSA-2014-0595.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.novell.com/support/kb/doc.php?id=7015303" "url": "http://linux.oracle.com/errata/ELSA-2014-0595.html"
}, },
{ {
"name" : "DSA-2944", "name": "59086",
"refsource" : "DEBIAN", "refsource": "SECUNIA",
"url" : "http://www.debian.org/security/2014/dsa-2944" "url": "http://secunia.com/advisories/59086"
}, },
{ {
"name" : "RHSA-2014:0594", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1101932",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0594.html" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101932"
}, },
{ {
"name" : "RHSA-2014:0815", "name": "SUSE-SU-2014:0758",
"refsource" : "REDHAT", "refsource": "SUSE",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0815.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html"
},
{
"name" : "RHSA-2014:0595",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0595.html"
}, },
{ {
"name": "RHSA-2014:0684", "name": "RHSA-2014:0684",
@ -133,39 +133,29 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00007.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00007.html"
}, },
{ {
"name" : "openSUSE-SU-2014:0767", "name": "59021",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00010.html"
},
{
"name" : "SUSE-SU-2014:0758",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html"
},
{
"name" : "SUSE-SU-2014:0788",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html"
},
{
"name" : "USN-2229-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2229-1"
},
{
"name" : "67741",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/67741"
},
{
"name" : "1030314",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030314"
},
{
"name" : "58340",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/58340" "url": "http://secunia.com/advisories/59021"
},
{
"name": "RHSA-2014:0815",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0815.html"
},
{
"name": "http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/",
"refsource": "MISC",
"url": "http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/"
},
{
"name": "http://www.novell.com/support/kb/doc.php?id=7015303",
"refsource": "CONFIRM",
"url": "http://www.novell.com/support/kb/doc.php?id=7015303"
},
{
"name": "http://linux.oracle.com/errata/ELSA-2014-0594.html",
"refsource": "CONFIRM",
"url": "http://linux.oracle.com/errata/ELSA-2014-0594.html"
}, },
{ {
"name": "58598", "name": "58598",
@ -173,49 +163,59 @@
"url": "http://secunia.com/advisories/58598" "url": "http://secunia.com/advisories/58598"
}, },
{ {
"name" : "58601", "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096155",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/58601" "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096155"
},
{
"name" : "58642",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/58642"
},
{
"name" : "59016",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59016"
},
{
"name" : "59057",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59057"
},
{
"name" : "59086",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59086"
},
{
"name" : "59021",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59021"
}, },
{ {
"name": "59838", "name": "59838",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59838" "url": "http://secunia.com/advisories/59838"
}, },
{
"name": "SUSE-SU-2014:0788",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html"
},
{ {
"name": "60384", "name": "60384",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60384" "url": "http://secunia.com/advisories/60384"
}, },
{
"name": "RHSA-2014:0594",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0594.html"
},
{
"name": "59016",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59016"
},
{
"name": "openSUSE-SU-2014:0767",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00010.html"
},
{
"name": "58601",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/58601"
},
{ {
"name": "59408", "name": "59408",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59408" "url": "http://secunia.com/advisories/59408"
},
{
"name": "https://www.gitorious.org/gnutls/gnutls/commit/688ea6428a432c39203d00acd1af0e7684e5ddfd",
"refsource": "CONFIRM",
"url": "https://www.gitorious.org/gnutls/gnutls/commit/688ea6428a432c39203d00acd1af0e7684e5ddfd"
},
{
"name": "1030314",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030314"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-3909", "ID": "CVE-2014-3909",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://service.falconsc.com/service/product/patch/index.html",
"refsource" : "MISC",
"url" : "https://service.falconsc.com/service/product/patch/index.html"
},
{ {
"name": "JVN#49672671", "name": "JVN#49672671",
"refsource": "JVN", "refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN49672671/index.html" "url": "http://jvn.jp/en/jp/JVN49672671/index.html"
}, },
{
"name": "https://service.falconsc.com/service/product/patch/index.html",
"refsource": "MISC",
"url": "https://service.falconsc.com/service/product/patch/index.html"
},
{ {
"name": "JVNDB-2014-000084", "name": "JVNDB-2014-000084",
"refsource": "JVNDB", "refsource": "JVNDB",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2014-4479", "ID": "CVE-2014-4479",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://support.apple.com/HT204243", "name": "1031647",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "http://support.apple.com/HT204243" "url": "http://www.securitytracker.com/id/1031647"
}, },
{ {
"name": "http://support.apple.com/HT204245", "name": "http://support.apple.com/HT204245",
@ -68,14 +68,14 @@
"url": "http://support.apple.com/HT204246" "url": "http://support.apple.com/HT204246"
}, },
{ {
"name" : "https://support.apple.com/kb/HT204949", "name": "APPLE-SA-2015-06-30-6",
"refsource" : "CONFIRM", "refsource": "APPLE",
"url" : "https://support.apple.com/kb/HT204949" "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html"
}, },
{ {
"name" : "APPLE-SA-2015-01-27-1", "name": "http://support.apple.com/HT204243",
"refsource" : "APPLE", "refsource": "CONFIRM",
"url" : "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html" "url": "http://support.apple.com/HT204243"
}, },
{ {
"name": "APPLE-SA-2015-01-27-2", "name": "APPLE-SA-2015-01-27-2",
@ -88,9 +88,9 @@
"url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00002.html" "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00002.html"
}, },
{ {
"name" : "APPLE-SA-2015-06-30-6", "name": "https://support.apple.com/kb/HT204949",
"refsource" : "APPLE", "refsource": "CONFIRM",
"url" : "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html" "url": "https://support.apple.com/kb/HT204949"
}, },
{ {
"name": "72330", "name": "72330",
@ -98,9 +98,9 @@
"url": "http://www.securityfocus.com/bid/72330" "url": "http://www.securityfocus.com/bid/72330"
}, },
{ {
"name" : "1031647", "name": "APPLE-SA-2015-01-27-1",
"refsource" : "SECTRACK", "refsource": "APPLE",
"url" : "http://www.securitytracker.com/id/1031647" "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html"
} }
] ]
} }

View File

@ -52,60 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20140627 Re: CVE request -- Linux kernel: sctp: sk_ack_backlog wrap-around problem",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/06/27/11"
},
{
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d3217b15a19a4779c39b212358a5c71d725822ee",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d3217b15a19a4779c39b212358a5c71d725822ee"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1113967",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1113967"
},
{ {
"name": "https://github.com/torvalds/linux/commit/d3217b15a19a4779c39b212358a5c71d725822ee", "name": "https://github.com/torvalds/linux/commit/d3217b15a19a4779c39b212358a5c71d725822ee",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/d3217b15a19a4779c39b212358a5c71d725822ee" "url": "https://github.com/torvalds/linux/commit/d3217b15a19a4779c39b212358a5c71d725822ee"
}, },
{
"name" : "http://linux.oracle.com/errata/ELSA-2014-3068.html",
"refsource" : "CONFIRM",
"url" : "http://linux.oracle.com/errata/ELSA-2014-3068.html"
},
{
"name" : "http://linux.oracle.com/errata/ELSA-2014-3069.html",
"refsource" : "CONFIRM",
"url" : "http://linux.oracle.com/errata/ELSA-2014-3069.html"
},
{
"name" : "DSA-2992",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-2992"
},
{ {
"name": "SUSE-SU-2014:1316", "name": "SUSE-SU-2014:1316",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html"
}, },
{ {
"name" : "SUSE-SU-2014:1319", "name": "[oss-security] 20140627 Re: CVE request -- Linux kernel: sctp: sk_ack_backlog wrap-around problem",
"refsource" : "SUSE", "refsource": "MLIST",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" "url": "http://www.openwall.com/lists/oss-security/2014/06/27/11"
}, },
{ {
"name" : "SUSE-SU-2015:0812", "name": "59790",
"refsource" : "SUSE", "refsource": "SECUNIA",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" "url": "http://secunia.com/advisories/59790"
},
{
"name": "USN-2335-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2335-1"
}, },
{ {
"name": "USN-2334-1", "name": "USN-2334-1",
@ -113,9 +83,14 @@
"url": "http://www.ubuntu.com/usn/USN-2334-1" "url": "http://www.ubuntu.com/usn/USN-2334-1"
}, },
{ {
"name" : "USN-2335-1", "name": "SUSE-SU-2014:1319",
"refsource" : "UBUNTU", "refsource": "SUSE",
"url" : "http://www.ubuntu.com/usn/USN-2335-1" "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html"
},
{
"name": "60564",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60564"
}, },
{ {
"name": "68224", "name": "68224",
@ -127,20 +102,45 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59777" "url": "http://secunia.com/advisories/59777"
}, },
{
"name" : "60564",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/60564"
},
{
"name" : "59790",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59790"
},
{ {
"name": "60596", "name": "60596",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60596" "url": "http://secunia.com/advisories/60596"
},
{
"name": "http://linux.oracle.com/errata/ELSA-2014-3068.html",
"refsource": "CONFIRM",
"url": "http://linux.oracle.com/errata/ELSA-2014-3068.html"
},
{
"name": "http://linux.oracle.com/errata/ELSA-2014-3069.html",
"refsource": "CONFIRM",
"url": "http://linux.oracle.com/errata/ELSA-2014-3069.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1113967",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1113967"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2"
},
{
"name": "DSA-2992",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2992"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d3217b15a19a4779c39b212358a5c71d725822ee",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d3217b15a19a4779c39b212358a5c71d725822ee"
},
{
"name": "SUSE-SU-2015:0812",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20141120 CVE-2014-8349 LIFERAY Portal Stored XSS", "name": "1031255",
"refsource" : "FULLDISC", "refsource": "SECTRACK",
"url" : "http://seclists.org/fulldisclosure/2014/Nov/61" "url": "http://www.securitytracker.com/id/1031255"
}, },
{ {
"name": "http://packetstormsecurity.com/files/129199/Liferay-Portal-6.2-EE-SP8-Cross-Site-Scripting.html", "name": "http://packetstormsecurity.com/files/129199/Liferay-Portal-6.2-EE-SP8-Cross-Site-Scripting.html",
@ -63,9 +63,9 @@
"url": "http://packetstormsecurity.com/files/129199/Liferay-Portal-6.2-EE-SP8-Cross-Site-Scripting.html" "url": "http://packetstormsecurity.com/files/129199/Liferay-Portal-6.2-EE-SP8-Cross-Site-Scripting.html"
}, },
{ {
"name" : "1031255", "name": "20141120 CVE-2014-8349 LIFERAY Portal Stored XSS",
"refsource" : "SECTRACK", "refsource": "FULLDISC",
"url" : "http://www.securitytracker.com/id/1031255" "url": "http://seclists.org/fulldisclosure/2014/Nov/61"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2014-8448", "ID": "CVE-2014-8448",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-8862", "ID": "CVE-2014-8862",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-9248", "ID": "CVE-2014-9248",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing",
"refsource" : "CONFIRM",
"url" : "https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing"
},
{ {
"name": "VU#449452", "name": "VU#449452",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/449452" "url": "http://www.kb.cert.org/vuls/id/449452"
},
{
"name": "https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing",
"refsource": "CONFIRM",
"url": "https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "35463",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/35463"
},
{ {
"name": "http://packetstormsecurity.com/files/129390/Advertise-With-Pleasure-AWP-6.6-SQL-Injection.html", "name": "http://packetstormsecurity.com/files/129390/Advertise-With-Pleasure-AWP-6.6-SQL-Injection.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/129390/Advertise-With-Pleasure-AWP-6.6-SQL-Injection.html" "url": "http://packetstormsecurity.com/files/129390/Advertise-With-Pleasure-AWP-6.6-SQL-Injection.html"
}, },
{
"name": "35463",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/35463"
},
{ {
"name": "115317", "name": "115317",
"refsource": "OSVDB", "refsource": "OSVDB",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"ID": "CVE-2014-9951", "ID": "CVE-2014-9951",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://source.android.com/security/bulletin/2017-05-01",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2017-05-01"
},
{ {
"name": "98252", "name": "98252",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/98252" "url": "http://www.securityfocus.com/bid/98252"
},
{
"name": "https://source.android.com/security/bulletin/2017-05-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-05-01"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@debian.org",
"ID": "CVE-2016-2222", "ID": "CVE-2016-2222",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,25 +53,30 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://hackerone.com/reports/110801", "name": "https://codex.wordpress.org/Version_4.4.2",
"refsource" : "MISC", "refsource": "CONFIRM",
"url" : "https://hackerone.com/reports/110801" "url": "https://codex.wordpress.org/Version_4.4.2"
},
{
"name": "1034933",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034933"
}, },
{ {
"name": "https://wpvulndb.com/vulnerabilities/8376", "name": "https://wpvulndb.com/vulnerabilities/8376",
"refsource": "MISC", "refsource": "MISC",
"url": "https://wpvulndb.com/vulnerabilities/8376" "url": "https://wpvulndb.com/vulnerabilities/8376"
}, },
{
"name" : "https://codex.wordpress.org/Version_4.4.2",
"refsource" : "CONFIRM",
"url" : "https://codex.wordpress.org/Version_4.4.2"
},
{ {
"name": "https://core.trac.wordpress.org/changeset/36435", "name": "https://core.trac.wordpress.org/changeset/36435",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://core.trac.wordpress.org/changeset/36435" "url": "https://core.trac.wordpress.org/changeset/36435"
}, },
{
"name": "82454",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/82454"
},
{ {
"name": "https://wordpress.org/news/2016/02/wordpress-4-4-2-security-and-maintenance-release/", "name": "https://wordpress.org/news/2016/02/wordpress-4-4-2-security-and-maintenance-release/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -83,14 +88,9 @@
"url": "http://www.debian.org/security/2016/dsa-3472" "url": "http://www.debian.org/security/2016/dsa-3472"
}, },
{ {
"name" : "82454", "name": "https://hackerone.com/reports/110801",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/82454" "url": "https://hackerone.com/reports/110801"
},
{
"name" : "1034933",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034933"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2016-2298", "ID": "CVE-2016-2298",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,70 +52,70 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20160724 Re: Fwd: CVE for PHP 5.5.38 issues",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2016/07/24/2"
},
{
"name" : "http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities",
"refsource" : "MISC",
"url" : "http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities"
},
{
"name" : "http://git.php.net/?p=php-src.git;a=commit;h=81406c0c1d45f75fcc7972ed974d2597abb0b9e9",
"refsource" : "CONFIRM",
"url" : "http://git.php.net/?p=php-src.git;a=commit;h=81406c0c1d45f75fcc7972ed974d2597abb0b9e9"
},
{
"name" : "http://php.net/ChangeLog-5.php",
"refsource" : "CONFIRM",
"url" : "http://php.net/ChangeLog-5.php"
},
{
"name" : "http://php.net/ChangeLog-7.php",
"refsource" : "CONFIRM",
"url" : "http://php.net/ChangeLog-7.php"
},
{
"name" : "https://bugs.php.net/72520",
"refsource" : "CONFIRM",
"url" : "https://bugs.php.net/72520"
},
{
"name" : "https://support.apple.com/HT207170",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT207170"
},
{ {
"name": "APPLE-SA-2016-09-20", "name": "APPLE-SA-2016-09-20",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html" "url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html"
}, },
{
"name" : "DSA-3631",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3631"
},
{ {
"name": "GLSA-201611-22", "name": "GLSA-201611-22",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201611-22" "url": "https://security.gentoo.org/glsa/201611-22"
}, },
{
"name": "https://bugs.php.net/72520",
"refsource": "CONFIRM",
"url": "https://bugs.php.net/72520"
},
{ {
"name": "RHSA-2016:2750", "name": "RHSA-2016:2750",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html" "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
}, },
{ {
"name" : "92099", "name": "http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/92099" "url": "http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities"
},
{
"name": "http://php.net/ChangeLog-5.php",
"refsource": "CONFIRM",
"url": "http://php.net/ChangeLog-5.php"
}, },
{ {
"name": "1036430", "name": "1036430",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036430" "url": "http://www.securitytracker.com/id/1036430"
},
{
"name": "DSA-3631",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3631"
},
{
"name": "http://php.net/ChangeLog-7.php",
"refsource": "CONFIRM",
"url": "http://php.net/ChangeLog-7.php"
},
{
"name": "http://git.php.net/?p=php-src.git;a=commit;h=81406c0c1d45f75fcc7972ed974d2597abb0b9e9",
"refsource": "CONFIRM",
"url": "http://git.php.net/?p=php-src.git;a=commit;h=81406c0c1d45f75fcc7972ed974d2597abb0b9e9"
},
{
"name": "[oss-security] 20160724 Re: Fwd: CVE for PHP 5.5.38 issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2016/07/24/2"
},
{
"name": "https://support.apple.com/HT207170",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207170"
},
{
"name": "92099",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92099"
} }
] ]
} }

View File

@ -63,9 +63,9 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1363710" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1363710"
}, },
{ {
"name" : "https://git.busybox.net/busybox/commit/?id=150dc7a2b483b8338a3e185c478b4b23ee884e71", "name": "92277",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "https://git.busybox.net/busybox/commit/?id=150dc7a2b483b8338a3e185c478b4b23ee884e71" "url": "http://www.securityfocus.com/bid/92277"
}, },
{ {
"name": "GLSA-201701-05", "name": "GLSA-201701-05",
@ -73,9 +73,9 @@
"url": "https://security.gentoo.org/glsa/201701-05" "url": "https://security.gentoo.org/glsa/201701-05"
}, },
{ {
"name" : "92277", "name": "https://git.busybox.net/busybox/commit/?id=150dc7a2b483b8338a3e185c478b4b23ee884e71",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/92277" "url": "https://git.busybox.net/busybox/commit/?id=150dc7a2b483b8338a3e185c478b4b23ee884e71"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "40196",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/40196/"
},
{ {
"name": "[oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases", "name": "[oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2016/07/28/3" "url": "http://openwall.com/lists/oss-security/2016/07/28/3"
}, },
{
"name": "92162",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92162"
},
{ {
"name": "http://www.wireshark.org/security/wnpa-sec-2016-39.html", "name": "http://www.wireshark.org/security/wnpa-sec-2016-39.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -77,15 +77,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=581a17af40b84ef0c9e7f41ed0795af345b61ce1" "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=581a17af40b84ef0c9e7f41ed0795af345b61ce1"
}, },
{
"name" : "92162",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/92162"
},
{ {
"name": "1036480", "name": "1036480",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036480" "url": "http://www.securitytracker.com/id/1036480"
},
{
"name": "40196",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40196/"
} }
] ]
} }

View File

@ -53,6 +53,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "93773",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93773"
},
{ {
"name": "https://struts.apache.org/docs/s2-042.html", "name": "https://struts.apache.org/docs/s2-042.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -62,11 +67,6 @@
"name": "https://security.netapp.com/advisory/ntap-20180629-0003/", "name": "https://security.netapp.com/advisory/ntap-20180629-0003/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180629-0003/" "url": "https://security.netapp.com/advisory/ntap-20180629-0003/"
},
{
"name" : "93773",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/93773"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-6971", "ID": "CVE-2016-6971",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-33.html", "name": "1036986",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-33.html" "url": "http://www.securitytracker.com/id/1036986"
}, },
{ {
"name": "93491", "name": "93491",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/93491" "url": "http://www.securityfocus.com/bid/93491"
}, },
{ {
"name" : "1036986", "name": "https://helpx.adobe.com/security/products/acrobat/apsb16-33.html",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1036986" "url": "https://helpx.adobe.com/security/products/acrobat/apsb16-33.html"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS16-144",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-144"
},
{
"name" : "MS16-145",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-145"
},
{ {
"name": "94724", "name": "94724",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/94724" "url": "http://www.securityfocus.com/bid/94724"
}, },
{
"name": "MS16-144",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-144"
},
{ {
"name": "1037444", "name": "1037444",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037444" "url": "http://www.securitytracker.com/id/1037444"
},
{
"name": "MS16-145",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-145"
} }
] ]
} }