"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 03:32:36 +00:00
parent ddb0d46780
commit 8778677cac
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
59 changed files with 4025 additions and 4025 deletions

View File

@ -52,26 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://bugs.cubecart.com/?do=details&id=459",
"refsource" : "MISC",
"url" : "http://bugs.cubecart.com/?do=details&id=459"
},
{
"name" : "http://lostmon.blogspot.com/2006/01/cubecart-307-pl1-indexphp-multiple.html",
"refsource" : "MISC",
"url" : "http://lostmon.blogspot.com/2006/01/cubecart-307-pl1-indexphp-multiple.html"
},
{
"name" : "16259",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16259"
},
{ {
"name": "ADV-2006-0227", "name": "ADV-2006-0227",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0227" "url": "http://www.vupen.com/english/advisories/2006/0227"
}, },
{
"name": "cubecart-index-script-xss(24177)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24177"
},
{
"name": "http://bugs.cubecart.com/?do=details&id=459",
"refsource": "MISC",
"url": "http://bugs.cubecart.com/?do=details&id=459"
},
{ {
"name": "22471", "name": "22471",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -83,9 +78,14 @@
"url": "http://secunia.com/advisories/18519" "url": "http://secunia.com/advisories/18519"
}, },
{ {
"name" : "cubecart-index-script-xss(24177)", "name": "16259",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24177" "url": "http://www.securityfocus.com/bid/16259"
},
{
"name": "http://lostmon.blogspot.com/2006/01/cubecart-307-pl1-indexphp-multiple.html",
"refsource": "MISC",
"url": "http://lostmon.blogspot.com/2006/01/cubecart-307-pl1-indexphp-multiple.html"
} }
] ]
} }

View File

@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060114 [NMRC Advisory] Microsoft Windows Wireless Exposure on Laptops",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/421868/100/0/threaded"
},
{
"name" : "http://www.securiteam.com/windowsntfocus/5YP0D2KHHO.html",
"refsource" : "MISC",
"url" : "http://www.securiteam.com/windowsntfocus/5YP0D2KHHO.html"
},
{
"name" : "http://www.nmrc.org/pub/advise/20060114.txt",
"refsource" : "MISC",
"url" : "http://www.nmrc.org/pub/advise/20060114.txt"
},
{ {
"name": "http://www.theta44.org/karma/", "name": "http://www.theta44.org/karma/",
"refsource": "MISC", "refsource": "MISC",
@ -82,10 +67,25 @@
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/349" "url": "http://securityreason.com/securityalert/349"
}, },
{
"name": "http://www.nmrc.org/pub/advise/20060114.txt",
"refsource": "MISC",
"url": "http://www.nmrc.org/pub/advise/20060114.txt"
},
{ {
"name": "windows-wireless-adhoc-unauth-access(24157)", "name": "windows-wireless-adhoc-unauth-access(24157)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24157" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24157"
},
{
"name": "http://www.securiteam.com/windowsntfocus/5YP0D2KHHO.html",
"refsource": "MISC",
"url": "http://www.securiteam.com/windowsntfocus/5YP0D2KHHO.html"
},
{
"name": "20060114 [NMRC Advisory] Microsoft Windows Wireless Exposure on Laptops",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/421868/100/0/threaded"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_001.pdf",
"refsource" : "CONFIRM",
"url" : "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_001.pdf"
},
{
"name" : "16723",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16723"
},
{ {
"name": "ADV-2006-0668", "name": "ADV-2006-0668",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -77,10 +67,20 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18952" "url": "http://secunia.com/advisories/18952"
}, },
{
"name": "16723",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16723"
},
{ {
"name": "xerox-workcentre-postscript-dos(24805)", "name": "xerox-workcentre-postscript-dos(24805)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24805" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24805"
},
{
"name": "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_001.pdf",
"refsource": "CONFIRM",
"url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_001.pdf"
} }
] ]
} }

View File

@ -52,26 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060223 NOCC Webmail <= 1.0 multiple vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2006-02/0418.html"
},
{
"name" : "http://retrogod.altervista.org/noccw_10_incl_xpl.html",
"refsource" : "MISC",
"url" : "http://retrogod.altervista.org/noccw_10_incl_xpl.html"
},
{
"name" : "16793",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16793"
},
{
"name" : "23420",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/23420"
},
{ {
"name": "23422", "name": "23422",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -82,10 +62,30 @@
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015671" "url": "http://securitytracker.com/id?1015671"
}, },
{
"name": "20060223 NOCC Webmail <= 1.0 multiple vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2006-02/0418.html"
},
{
"name": "23420",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/23420"
},
{ {
"name": "16921", "name": "16921",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/16921" "url": "http://secunia.com/advisories/16921"
},
{
"name": "http://retrogod.altervista.org/noccw_10_incl_xpl.html",
"refsource": "MISC",
"url": "http://retrogod.altervista.org/noccw_10_incl_xpl.html"
},
{
"name": "16793",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16793"
} }
] ]
} }

View File

@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "blanknberg-index-directory-traversal(25617)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25617"
},
{ {
"name": "http://www.silitix.com/bnb.php", "name": "http://www.silitix.com/bnb.php",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.silitix.com/bnb.php" "url": "http://www.silitix.com/bnb.php"
}, },
{
"name" : "17345",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17345"
},
{
"name" : "24373",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/24373"
},
{ {
"name": "1015854", "name": "1015854",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015854" "url": "http://securitytracker.com/id?1015854"
}, },
{
"name": "17345",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17345"
},
{ {
"name": "19520", "name": "19520",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19520" "url": "http://secunia.com/advisories/19520"
}, },
{ {
"name" : "blanknberg-index-directory-traversal(25617)", "name": "24373",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25617" "url": "http://www.osvdb.org/24373"
} }
] ]
} }

View File

@ -53,15 +53,20 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060807 [vuln.sg] Lhaz LHA Long Filename Buffer Overflow Vulnerability", "name": "lhaz-error-bo(28283)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/442445/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28283"
}, },
{ {
"name": "http://vuln.sg/lhaz131-en.html", "name": "http://vuln.sg/lhaz131-en.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://vuln.sg/lhaz131-en.html" "url": "http://vuln.sg/lhaz131-en.html"
}, },
{
"name": "20060807 [vuln.sg] Lhaz LHA Long Filename Buffer Overflow Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/442445/100/0/threaded"
},
{ {
"name": "http://www.chitora.jp/lhaz.html", "name": "http://www.chitora.jp/lhaz.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -78,9 +83,9 @@
"url": "http://www.vupen.com/english/advisories/2006/3173" "url": "http://www.vupen.com/english/advisories/2006/3173"
}, },
{ {
"name" : "21348", "name": "lhaz-long-filename-bo(28282)",
"refsource" : "SECUNIA", "refsource": "XF",
"url" : "http://secunia.com/advisories/21348" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28282"
}, },
{ {
"name": "1378", "name": "1378",
@ -88,14 +93,9 @@
"url": "http://securityreason.com/securityalert/1378" "url": "http://securityreason.com/securityalert/1378"
}, },
{ {
"name" : "lhaz-error-bo(28283)", "name": "21348",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28283" "url": "http://secunia.com/advisories/21348"
},
{
"name" : "lhaz-long-filename-bo(28282)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28282"
} }
] ]
} }

View File

@ -52,6 +52,36 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "20060814 Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability",
"refsource": "VIM",
"url": "http://www.attrition.org/pipermail/vim/2006-August/000975.html"
},
{
"name": "calendarix-calconfig-file-include(28349)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28349"
},
{
"name": "20060815 Re: Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/443292/100/0/threaded"
},
{
"name": "20060814 Re: Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/443225/100/0/threaded"
},
{
"name": "1016694",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016694"
},
{
"name": "28284",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/28284"
},
{ {
"name": "20060812 Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability", "name": "20060812 Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -61,36 +91,6 @@
"name": "20060813 Re: Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability", "name": "20060813 Re: Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/443152/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/443152/100/0/threaded"
},
{
"name" : "20060814 Re: Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/443225/100/0/threaded"
},
{
"name" : "20060815 Re: Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/443292/100/0/threaded"
},
{
"name" : "20060814 Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability",
"refsource" : "VIM",
"url" : "http://www.attrition.org/pipermail/vim/2006-August/000975.html"
},
{
"name" : "28284",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/28284"
},
{
"name" : "1016694",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016694"
},
{
"name" : "calendarix-calconfig-file-include(28349)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28349"
} }
] ]
} }

View File

@ -53,74 +53,54 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060815 [XSec-06-02]: Internet Explorer (IMSKDIC.DLL) COM Object Instantiation Vulnerability", "name": "ie-msoe-dos(28439)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/443290/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28439"
},
{
"name" : "20060815 [XSec-06-03]: Internet Explorer (CHTSKDIC.DLL) COM Object Instantiation Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/443295/100/0/threaded"
},
{
"name" : "20060815 [XSec-06-04]: Internet Explorer (msoe.dll) COM Object Instantiation Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/443299/100/0/threaded"
},
{
"name" : "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=10",
"refsource" : "MISC",
"url" : "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=10"
},
{
"name" : "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=8",
"refsource" : "MISC",
"url" : "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=8"
},
{
"name" : "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=9",
"refsource" : "MISC",
"url" : "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=9"
},
{
"name" : "19521",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19521"
},
{
"name" : "19529",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19529"
},
{
"name" : "19530",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19530"
},
{
"name" : "29345",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/29345"
},
{
"name" : "29346",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/29346"
}, },
{ {
"name": "29347", "name": "29347",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/29347" "url": "http://www.osvdb.org/29347"
}, },
{
"name": "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=8",
"refsource": "MISC",
"url": "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=8"
},
{
"name": "29345",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29345"
},
{
"name": "20060815 [XSec-06-03]: Internet Explorer (CHTSKDIC.DLL) COM Object Instantiation Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/443295/100/0/threaded"
},
{ {
"name": "1402", "name": "1402",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1402" "url": "http://securityreason.com/securityalert/1402"
}, },
{ {
"name" : "ie-chtskdic-dos(28438)", "name": "19530",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28438" "url": "http://www.securityfocus.com/bid/19530"
},
{
"name": "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=10",
"refsource": "MISC",
"url": "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=10"
},
{
"name": "20060815 [XSec-06-02]: Internet Explorer (IMSKDIC.DLL) COM Object Instantiation Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/443290/100/0/threaded"
},
{
"name": "19521",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19521"
}, },
{ {
"name": "ie-imskdic-dos(28436)", "name": "ie-imskdic-dos(28436)",
@ -128,9 +108,29 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28436" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28436"
}, },
{ {
"name" : "ie-msoe-dos(28439)", "name": "19529",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19529"
},
{
"name": "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=9",
"refsource": "MISC",
"url": "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=9"
},
{
"name": "29346",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29346"
},
{
"name": "20060815 [XSec-06-04]: Internet Explorer (msoe.dll) COM Object Instantiation Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/443299/100/0/threaded"
},
{
"name": "ie-chtskdic-dos(28438)",
"refsource": "XF", "refsource": "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28439" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28438"
} }
] ]
} }

View File

@ -52,6 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "jamroommediacms-login-xss(29131)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29131"
},
{
"name": "1649",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1649"
},
{
"name": "22077",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22077"
},
{ {
"name": "20060923 Jamroom Media Content Management System Login.php Xss Vuln.", "name": "20060923 Jamroom Media Content Management System Login.php Xss Vuln.",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -66,21 +81,6 @@
"name": "ADV-2006-3766", "name": "ADV-2006-3766",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3766" "url": "http://www.vupen.com/english/advisories/2006/3766"
},
{
"name" : "22077",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22077"
},
{
"name" : "1649",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1649"
},
{
"name" : "jamroommediacms-login-xss(29131)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29131"
} }
] ]
} }

View File

@ -52,36 +52,36 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://kernel-32.blogspot.com/2006/09/tagmin-cc-21b-remote-file-include.html",
"refsource" : "MISC",
"url" : "http://kernel-32.blogspot.com/2006/09/tagmin-cc-21b-remote-file-include.html"
},
{ {
"name": "2450", "name": "2450",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2450" "url": "https://www.exploit-db.com/exploits/2450"
}, },
{
"name" : "20260",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/20260"
},
{ {
"name": "ADV-2006-3850", "name": "ADV-2006-3850",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3850" "url": "http://www.vupen.com/english/advisories/2006/3850"
}, },
{ {
"name" : "29293", "name": "20260",
"refsource" : "OSVDB", "refsource": "BID",
"url" : "http://www.osvdb.org/29293" "url": "http://www.securityfocus.com/bid/20260"
}, },
{ {
"name": "22189", "name": "22189",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22189" "url": "http://secunia.com/advisories/22189"
}, },
{
"name": "http://kernel-32.blogspot.com/2006/09/tagmin-cc-21b-remote-file-include.html",
"refsource": "MISC",
"url": "http://kernel-32.blogspot.com/2006/09/tagmin-cc-21b-remote-file-include.html"
},
{
"name": "29293",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29293"
},
{ {
"name": "tagit-index-file-include(29257)", "name": "tagit-index-file-include(29257)",
"refsource": "XF", "refsource": "XF",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2010-2204", "ID": "CVE-2010-2204",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "ADV-2010-1636",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1636"
},
{ {
"name": "http://www.adobe.com/support/security/bulletins/apsb10-15.html", "name": "http://www.adobe.com/support/security/bulletins/apsb10-15.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb10-15.html" "url": "http://www.adobe.com/support/security/bulletins/apsb10-15.html"
}, },
{
"name" : "41231",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/41231"
},
{ {
"name": "oval:org.mitre.oval:def:7242", "name": "oval:org.mitre.oval:def:7242",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7242" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7242"
}, },
{
"name": "41231",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/41231"
},
{ {
"name": "1024159", "name": "1024159",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024159" "url": "http://www.securitytracker.com/id?1024159"
},
{
"name" : "ADV-2010-1636",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1636"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2010-2710", "ID": "CVE-2010-2710",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,12 +53,12 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "HPSBMA02477", "name": "SSRT090177",
"refsource": "HP", "refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01926980" "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01926980"
}, },
{ {
"name" : "SSRT090177", "name": "HPSBMA02477",
"refsource": "HP", "refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01926980" "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01926980"
} }

View File

@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "14296", "name": "41508",
"refsource" : "EXPLOIT-DB", "refsource": "BID",
"url" : "http://www.exploit-db.com/exploits/14296" "url": "http://www.securityfocus.com/bid/41508"
}, },
{ {
"name": "http://packetstormsecurity.org/1007-exploits/joomlaquickfaq-sql.txt", "name": "http://packetstormsecurity.org/1007-exploits/joomlaquickfaq-sql.txt",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.org/1007-exploits/joomlaquickfaq-sql.txt" "url": "http://packetstormsecurity.org/1007-exploits/joomlaquickfaq-sql.txt"
}, },
{
"name" : "41508",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/41508"
},
{ {
"name": "quickfaqcom-index-sql-injection(60236)", "name": "quickfaqcom-index-sql-injection(60236)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60236" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60236"
},
{
"name": "14296",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/14296"
} }
] ]
} }

View File

@ -57,11 +57,6 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=42736" "url": "http://code.google.com/p/chromium/issues/detail?id=42736"
}, },
{
"name" : "http://googlechromereleases.blogspot.com/2010/07/stable-channel-update_26.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2010/07/stable-channel-update_26.html"
},
{ {
"name": "oval:org.mitre.oval:def:12048", "name": "oval:org.mitre.oval:def:12048",
"refsource": "OVAL", "refsource": "OVAL",
@ -71,6 +66,11 @@
"name": "40743", "name": "40743",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40743" "url": "http://secunia.com/advisories/40743"
},
{
"name": "http://googlechromereleases.blogspot.com/2010/07/stable-channel-update_26.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2010/07/stable-channel-update_26.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2010-3011", "ID": "CVE-2010-3011",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "41490",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41490"
},
{ {
"name": "HPSBMA02568", "name": "HPSBMA02568",
"refsource": "HP", "refsource": "HP",
@ -66,11 +71,6 @@
"name": "41480", "name": "41480",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41480" "url": "http://secunia.com/advisories/41480"
},
{
"name" : "41490",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/41490"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2010-3224", "ID": "CVE-2010-3224",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2010-3537", "ID": "CVE-2010-3537",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -62,15 +62,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2010/11/stable-channel-update.html" "url": "http://googlechromereleases.blogspot.com/2010/11/stable-channel-update.html"
}, },
{
"name" : "oval:org.mitre.oval:def:14277",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14277"
},
{ {
"name": "42109", "name": "42109",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42109" "url": "http://secunia.com/advisories/42109"
},
{
"name": "oval:org.mitre.oval:def:14277",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14277"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg27020327",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg27020327"
},
{ {
"name": "IZ86207", "name": "IZ86207",
"refsource": "AIXAPAR", "refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ86207" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ86207"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg27020327",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg27020327"
} }
] ]
} }

View File

@ -57,35 +57,35 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/514479/100/100/threaded" "url": "http://www.securityfocus.com/archive/1/514479/100/100/threaded"
}, },
{
"name": "bloofoxcms-name-sql-injection(62810)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62810"
},
{ {
"name": "15328", "name": "15328",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/15328" "url": "http://www.exploit-db.com/exploits/15328"
}, },
{
"name" : "http://packetstormsecurity.org/1010-exploits/bloofoxcms-sql.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/1010-exploits/bloofoxcms-sql.txt"
},
{
"name" : "http://www.htbridge.ch/advisory/sql_injection_in_bloofoxcms_registration_plugin.html",
"refsource" : "MISC",
"url" : "http://www.htbridge.ch/advisory/sql_injection_in_bloofoxcms_registration_plugin.html"
},
{
"name" : "44464",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/44464"
},
{ {
"name": "8427", "name": "8427",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8427" "url": "http://securityreason.com/securityalert/8427"
}, },
{ {
"name" : "bloofoxcms-name-sql-injection(62810)", "name": "http://packetstormsecurity.org/1010-exploits/bloofoxcms-sql.txt",
"refsource" : "XF", "refsource": "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/62810" "url": "http://packetstormsecurity.org/1010-exploits/bloofoxcms-sql.txt"
},
{
"name": "44464",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/44464"
},
{
"name": "http://www.htbridge.ch/advisory/sql_injection_in_bloofoxcms_registration_plugin.html",
"refsource": "MISC",
"url": "http://www.htbridge.ch/advisory/sql_injection_in_bloofoxcms_registration_plugin.html"
} }
] ]
} }

View File

@ -52,31 +52,31 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20100907 Security problems in Zenphoto version 1.3",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/513525/100/0/threaded"
},
{ {
"name": "http://packetstormsecurity.org/1009-exploits/zenphoto-sqlxss.txt", "name": "http://packetstormsecurity.org/1009-exploits/zenphoto-sqlxss.txt",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.org/1009-exploits/zenphoto-sqlxss.txt" "url": "http://packetstormsecurity.org/1009-exploits/zenphoto-sqlxss.txt"
}, },
{
"name" : "http://www.acunetix.com/blog/web-security-zone/articles/zenphoto-13-advisory/",
"refsource" : "MISC",
"url" : "http://www.acunetix.com/blog/web-security-zone/articles/zenphoto-13-advisory/"
},
{ {
"name": "43021", "name": "43021",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/43021" "url": "http://www.securityfocus.com/bid/43021"
}, },
{
"name": "20100907 Security problems in Zenphoto version 1.3",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/513525/100/0/threaded"
},
{ {
"name": "41350", "name": "41350",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41350" "url": "http://secunia.com/advisories/41350"
}, },
{
"name": "http://www.acunetix.com/blog/web-security-zone/articles/zenphoto-13-advisory/",
"refsource": "MISC",
"url": "http://www.acunetix.com/blog/web-security-zone/articles/zenphoto-13-advisory/"
},
{ {
"name": "8442", "name": "8442",
"refsource": "SREASON", "refsource": "SREASON",

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "31142", "name": "simple-edocument-login-sql-injection(90711)",
"refsource" : "EXPLOIT-DB", "refsource": "XF",
"url" : "http://www.exploit-db.com/exploits/31142" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90711"
},
{
"name" : "http://packetstormsecurity.com/files/124914",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/124914"
}, },
{ {
"name": "102458", "name": "102458",
@ -68,9 +63,14 @@
"url": "http://osvdb.org/102458" "url": "http://osvdb.org/102458"
}, },
{ {
"name" : "simple-edocument-login-sql-injection(90711)", "name": "http://packetstormsecurity.com/files/124914",
"refsource" : "XF", "refsource": "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/90711" "url": "http://packetstormsecurity.com/files/124914"
},
{
"name": "31142",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/31142"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-3602", "ID": "CVE-2014-3602",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "RHSA-2014:1796",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1796.html"
},
{ {
"name": "RHSA-2014:1906", "name": "RHSA-2014:1906",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1906.html" "url": "http://rhn.redhat.com/errata/RHSA-2014-1906.html"
},
{
"name": "RHSA-2014:1796",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1796.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-3882", "ID": "CVE-2014-3882",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,6 +57,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://12net.jp/news/n20140623_01.html" "url": "http://12net.jp/news/n20140623_01.html"
}, },
{
"name": "JVNDB-2014-000062",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000062"
},
{ {
"name": "http://wordpress.org/plugins/login-rebuilder/changelog/", "name": "http://wordpress.org/plugins/login-rebuilder/changelog/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,11 +71,6 @@
"name": "JVN#05329568", "name": "JVN#05329568",
"refsource": "JVN", "refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN05329568/index.html" "url": "http://jvn.jp/en/jp/JVN05329568/index.html"
},
{
"name" : "JVNDB-2014-000062",
"refsource" : "JVNDB",
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000062"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-3900", "ID": "CVE-2014-3900",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,16 +57,16 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://piwigo.org/bugs/view.php?id=3089" "url": "http://piwigo.org/bugs/view.php?id=3089"
}, },
{
"name" : "http://piwigo.org/dev/changeset/28678",
"refsource" : "CONFIRM",
"url" : "http://piwigo.org/dev/changeset/28678"
},
{ {
"name": "JVN#09717399", "name": "JVN#09717399",
"refsource": "JVN", "refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN09717399/index.html" "url": "http://jvn.jp/en/jp/JVN09717399/index.html"
}, },
{
"name": "http://piwigo.org/dev/changeset/28678",
"refsource": "CONFIRM",
"url": "http://piwigo.org/dev/changeset/28678"
},
{ {
"name": "JVNDB-2014-000093", "name": "JVNDB-2014-000093",
"refsource": "JVNDB", "refsource": "JVNDB",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-8246", "ID": "CVE-2014-8246",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,25 +53,25 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20141215 CA20141215-01: Security Notice for CA LISA Release Automation", "name": "http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20141215-01-security-notice-for-ca-lisa-release-automation.aspx",
"refsource" : "BUGTRAQ", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/archive/1/534246/100/0/threaded" "url": "http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20141215-01-security-notice-for-ca-lisa-release-automation.aspx"
}, },
{ {
"name": "20141216 CA20141215-01: Security Notice for CA LISA Release Automation", "name": "20141216 CA20141215-01: Security Notice for CA LISA Release Automation",
"refsource": "FULLDISC", "refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Dec/55" "url": "http://seclists.org/fulldisclosure/2014/Dec/55"
}, },
{
"name" : "http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20141215-01-security-notice-for-ca-lisa-release-automation.aspx",
"refsource" : "CONFIRM",
"url" : "http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20141215-01-security-notice-for-ca-lisa-release-automation.aspx"
},
{ {
"name": "VU#343060", "name": "VU#343060",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/343060" "url": "http://www.kb.cert.org/vuls/id/343060"
}, },
{
"name": "20141215 CA20141215-01: Security Notice for CA LISA Release Automation",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/534246/100/0/threaded"
},
{ {
"name": "1031375", "name": "1031375",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20141008 [Onapsis Security Advisory 2014-032] SAP BusinessObjects Persistent Cross Site Scripting", "name": "https://service.sap.com/sap/support/notes/1941562",
"refsource" : "BUGTRAQ", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/archive/1/533649/100/0/threaded" "url": "https://service.sap.com/sap/support/notes/1941562"
},
{
"name" : "20141008 [Onapsis Security Advisory 2014-032] SAP BusinessObjects Persistent Cross Site Scripting",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Oct/41"
}, },
{ {
"name": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-032", "name": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-032",
@ -68,9 +63,14 @@
"url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-032" "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-032"
}, },
{ {
"name" : "http://packetstormsecurity.com/files/128602/SAP-BusinessObjects-Persistent-Cross-Site-Scripting.html", "name": "20141008 [Onapsis Security Advisory 2014-032] SAP BusinessObjects Persistent Cross Site Scripting",
"refsource" : "MISC", "refsource": "FULLDISC",
"url" : "http://packetstormsecurity.com/files/128602/SAP-BusinessObjects-Persistent-Cross-Site-Scripting.html" "url": "http://seclists.org/fulldisclosure/2014/Oct/41"
},
{
"name": "sap-businessobjects-web-page-xss(96873)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96873"
}, },
{ {
"name": "http://scn.sap.com/docs/DOC-8218", "name": "http://scn.sap.com/docs/DOC-8218",
@ -78,9 +78,9 @@
"url": "http://scn.sap.com/docs/DOC-8218" "url": "http://scn.sap.com/docs/DOC-8218"
}, },
{ {
"name" : "https://service.sap.com/sap/support/notes/1941562", "name": "20141008 [Onapsis Security Advisory 2014-032] SAP BusinessObjects Persistent Cross Site Scripting",
"refsource" : "CONFIRM", "refsource": "BUGTRAQ",
"url" : "https://service.sap.com/sap/support/notes/1941562" "url": "http://www.securityfocus.com/archive/1/533649/100/0/threaded"
}, },
{ {
"name": "70290", "name": "70290",
@ -88,9 +88,9 @@
"url": "http://www.securityfocus.com/bid/70290" "url": "http://www.securityfocus.com/bid/70290"
}, },
{ {
"name" : "sap-businessobjects-web-page-xss(96873)", "name": "http://packetstormsecurity.com/files/128602/SAP-BusinessObjects-Persistent-Cross-Site-Scripting.html",
"refsource" : "XF", "refsource": "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/96873" "url": "http://packetstormsecurity.com/files/128602/SAP-BusinessObjects-Persistent-Cross-Site-Scripting.html"
} }
] ]
} }

View File

@ -52,30 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20141106 CVE-Request: dpkg handling of 'control' and warnings format string vulnerability",
"refsource" : "MLIST",
"url" : "http://seclists.org/oss-sec/2014/q4/539"
},
{ {
"name": "[oss-security] 20141106 Re: CVE-Request: dpkg handling of 'control' and warnings format string vulnerability", "name": "[oss-security] 20141106 Re: CVE-Request: dpkg handling of 'control' and warnings format string vulnerability",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2014/q4/551" "url": "http://seclists.org/oss-sec/2014/q4/551"
}, },
{ {
"name" : "[oss-security] 20141106 Re: CVE-Request: dpkg handling of 'control' and warnings format string vulnerability", "name": "dpkg-format-sting(98551)",
"refsource" : "MLIST", "refsource": "XF",
"url" : "http://seclists.org/oss-sec/2014/q4/622" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98551"
},
{
"name" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768485",
"refsource" : "CONFIRM",
"url" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768485"
},
{
"name" : "https://bugs.launchpad.net/ubuntu/+source/dpkg/+bug/1389135",
"refsource" : "CONFIRM",
"url" : "https://bugs.launchpad.net/ubuntu/+source/dpkg/+bug/1389135"
}, },
{ {
"name": "FEDORA-2015-6974", "name": "FEDORA-2015-6974",
@ -83,9 +68,24 @@
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157387.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157387.html"
}, },
{ {
"name" : "dpkg-format-sting(98551)", "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768485",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/98551" "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768485"
},
{
"name": "[oss-security] 20141106 CVE-Request: dpkg handling of 'control' and warnings format string vulnerability",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2014/q4/539"
},
{
"name": "https://bugs.launchpad.net/ubuntu/+source/dpkg/+bug/1389135",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/ubuntu/+source/dpkg/+bug/1389135"
},
{
"name": "[oss-security] 20141106 Re: CVE-Request: dpkg handling of 'control' and warnings format string vulnerability",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2014/q4/622"
} }
] ]
} }

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "75726",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/75726"
},
{
"name": "http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSS-SQL-Injection-Traversal.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSS-SQL-Injection-Traversal.html"
},
{ {
"name": "37604", "name": "37604",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
@ -61,16 +71,6 @@
"name": "20150708 SOPlanning - Simple Online Planning Tool multiple vulnerabilities", "name": "20150708 SOPlanning - Simple Online Planning Tool multiple vulnerabilities",
"refsource": "FULLDISC", "refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Jul/44" "url": "http://seclists.org/fulldisclosure/2015/Jul/44"
},
{
"name" : "http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSS-SQL-Injection-Traversal.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSS-SQL-Injection-Traversal.html"
},
{
"name" : "75726",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/75726"
} }
] ]
} }

View File

@ -57,6 +57,11 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/533968/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/533968/100/0/threaded"
}, },
{
"name": "71059",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/71059"
},
{ {
"name": "20141113 Re: CVE-2014-8731 - RCE in phpMemcachedAdmin <=1.2.2", "name": "20141113 Re: CVE-2014-8731 - RCE in phpMemcachedAdmin <=1.2.2",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -67,11 +72,6 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/129089/PHPMemcachedAdmin-1.2.2-Remote-Code-Execution.html" "url": "http://packetstormsecurity.com/files/129089/PHPMemcachedAdmin-1.2.2-Remote-Code-Execution.html"
}, },
{
"name" : "71059",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/71059"
},
{ {
"name": "phpmemcachedadmin-cve20148731-code-exec(98638)", "name": "phpmemcachedadmin-cve20148731-code-exec(98638)",
"refsource": "XF", "refsource": "XF",

View File

@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "35371", "name": "wp-googledocembedder-sql-injection(98944)",
"refsource" : "EXPLOIT-DB", "refsource": "XF",
"url" : "http://www.exploit-db.com/exploits/35371" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98944"
},
{
"name" : "http://security.szurek.pl/google-doc-embedder-2514-sql-injection.html",
"refsource" : "MISC",
"url" : "http://security.szurek.pl/google-doc-embedder-2514-sql-injection.html"
}, },
{ {
"name": "https://plugins.trac.wordpress.org/changeset/1023572/google-document-embedder", "name": "https://plugins.trac.wordpress.org/changeset/1023572/google-document-embedder",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://plugins.trac.wordpress.org/changeset/1023572/google-document-embedder" "url": "https://plugins.trac.wordpress.org/changeset/1023572/google-document-embedder"
}, },
{
"name": "http://security.szurek.pl/google-doc-embedder-2514-sql-injection.html",
"refsource": "MISC",
"url": "http://security.szurek.pl/google-doc-embedder-2514-sql-injection.html"
},
{
"name": "35371",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/35371"
},
{ {
"name": "115044", "name": "115044",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/show/osvdb/115044" "url": "http://osvdb.org/show/osvdb/115044"
},
{
"name" : "wp-googledocembedder-sql-injection(98944)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/98944"
} }
] ]
} }

View File

@ -53,9 +53,19 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20141216 \"Ettercap 8.0 - 8.1\" multiple vulnerabilities", "name": "GLSA-201505-01",
"refsource" : "BUGTRAQ", "refsource": "GENTOO",
"url" : "http://www.securityfocus.com/archive/1/534248/100/0/threaded" "url": "https://security.gentoo.org/glsa/201505-01"
},
{
"name": "https://github.com/Ettercap/ettercap/pull/606",
"refsource": "CONFIRM",
"url": "https://github.com/Ettercap/ettercap/pull/606"
},
{
"name": "71696",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/71696"
}, },
{ {
"name": "https://www.obrela.com/home/security-labs/advisories/osi-advisory-osi-1402/", "name": "https://www.obrela.com/home/security-labs/advisories/osi-advisory-osi-1402/",
@ -73,24 +83,14 @@
"url": "https://github.com/Ettercap/ettercap/pull/605" "url": "https://github.com/Ettercap/ettercap/pull/605"
}, },
{ {
"name" : "https://github.com/Ettercap/ettercap/pull/606", "name": "20141216 \"Ettercap 8.0 - 8.1\" multiple vulnerabilities",
"refsource" : "CONFIRM", "refsource": "BUGTRAQ",
"url" : "https://github.com/Ettercap/ettercap/pull/606" "url": "http://www.securityfocus.com/archive/1/534248/100/0/threaded"
}, },
{ {
"name": "https://github.com/Ettercap/ettercap/pull/609", "name": "https://github.com/Ettercap/ettercap/pull/609",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/Ettercap/ettercap/pull/609" "url": "https://github.com/Ettercap/ettercap/pull/609"
},
{
"name" : "GLSA-201505-01",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201505-01"
},
{
"name" : "71696",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/71696"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/537441/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/537441/100/0/threaded"
}, },
{
"name" : "20160203 Security Advisories",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2016/Feb/8"
},
{ {
"name": "http://packetstormsecurity.com/files/135614/Viprinet-Multichannel-VPN-Router-300-Identity-Verification-Fail.html", "name": "http://packetstormsecurity.com/files/135614/Viprinet-Multichannel-VPN-Router-300-Identity-Verification-Fail.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/135614/Viprinet-Multichannel-VPN-Router-300-Identity-Verification-Fail.html" "url": "http://packetstormsecurity.com/files/135614/Viprinet-Multichannel-VPN-Router-300-Identity-Verification-Fail.html"
},
{
"name": "20160203 Security Advisories",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2016/Feb/8"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2014-9890", "ID": "CVE-2014-9890",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://source.android.com/security/bulletin/2016-06-01.html", "name": "https://www.codeaurora.org/multiple-vulnerabilities-msm-qdsp6-audio-driver-allow-kernel-memory-corruption-cve-2016-2064-cve",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "http://source.android.com/security/bulletin/2016-06-01.html" "url": "https://www.codeaurora.org/multiple-vulnerabilities-msm-qdsp6-audio-driver-allow-kernel-memory-corruption-cve-2016-2064-cve"
}, },
{ {
"name": "https://us.codeaurora.org/cgit/quic/la/kernel/msm-3.18/commit/?id=775fca8289eff931f91ff6e8c36cf2034ba59e88", "name": "https://us.codeaurora.org/cgit/quic/la/kernel/msm-3.18/commit/?id=775fca8289eff931f91ff6e8c36cf2034ba59e88",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://us.codeaurora.org/cgit/quic/la/kernel/msm-3.18/commit/?id=775fca8289eff931f91ff6e8c36cf2034ba59e88" "url": "https://us.codeaurora.org/cgit/quic/la/kernel/msm-3.18/commit/?id=775fca8289eff931f91ff6e8c36cf2034ba59e88"
}, },
{
"name" : "https://www.codeaurora.org/multiple-vulnerabilities-msm-qdsp6-audio-driver-allow-kernel-memory-corruption-cve-2016-2064-cve",
"refsource" : "CONFIRM",
"url" : "https://www.codeaurora.org/multiple-vulnerabilities-msm-qdsp6-audio-driver-allow-kernel-memory-corruption-cve-2016-2064-cve"
},
{ {
"name": "91046", "name": "91046",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/91046" "url": "http://www.securityfocus.com/bid/91046"
},
{
"name": "http://source.android.com/security/bulletin/2016-06-01.html",
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-06-01.html"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-2643", "ID": "CVE-2016-2643",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-2647", "ID": "CVE-2016-2647",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2016-2871", "ID": "CVE-2016-2871",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21987769",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21987769"
},
{ {
"name": "94861", "name": "94861",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/94861" "url": "http://www.securityfocus.com/bid/94861"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21987769",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987769"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2016-2929", "ID": "CVE-2016-2929",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21991880" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21991880"
}, },
{
"name" : "IV89789",
"refsource" : "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IV89789"
},
{ {
"name": "94560", "name": "94560",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/94560" "url": "http://www.securityfocus.com/bid/94560"
},
{
"name": "IV89789",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV89789"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-3575", "ID": "CVE-2016-3575",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,20 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
},
{ {
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21988009", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21988009",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21988009" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21988009"
}, },
{ {
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21988718", "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21988718" "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
}, },
{ {
"name": "91787", "name": "91787",
@ -73,14 +68,19 @@
"url": "http://www.securityfocus.com/bid/91787" "url": "http://www.securityfocus.com/bid/91787"
}, },
{ {
"name" : "91921", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21988718",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/91921" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21988718"
}, },
{ {
"name": "1036370", "name": "1036370",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036370" "url": "http://www.securitytracker.com/id/1036370"
},
{
"name": "91921",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91921"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20160819 Onapsis Security Advisory ONAPSIS-2016-037: SAP HANA Potential Remote Code Execution", "name": "http://packetstormsecurity.com/files/138450/SAP-HANA-DB-1.00.73.00.389160-Remote-Code-Execution.html",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2016/Aug/95"
},
{
"name" : "https://layersevensecurity.com/wp-content/uploads/2016/02/Layer-Seven-Security_SAP-Security-Notes_January-2016.pdf",
"refsource": "MISC", "refsource": "MISC",
"url" : "https://layersevensecurity.com/wp-content/uploads/2016/02/Layer-Seven-Security_SAP-Security-Notes_January-2016.pdf" "url": "http://packetstormsecurity.com/files/138450/SAP-HANA-DB-1.00.73.00.389160-Remote-Code-Execution.html"
}, },
{ {
"name": "https://www.onapsis.com/blog/analyzing-sap-security-notes-january-2016", "name": "https://www.onapsis.com/blog/analyzing-sap-security-notes-january-2016",
@ -68,9 +63,14 @@
"url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-january-2016" "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-january-2016"
}, },
{ {
"name" : "http://packetstormsecurity.com/files/138450/SAP-HANA-DB-1.00.73.00.389160-Remote-Code-Execution.html", "name": "https://layersevensecurity.com/wp-content/uploads/2016/02/Layer-Seven-Security_SAP-Security-Notes_January-2016.pdf",
"refsource": "MISC", "refsource": "MISC",
"url" : "http://packetstormsecurity.com/files/138450/SAP-HANA-DB-1.00.73.00.389160-Remote-Code-Execution.html" "url": "https://layersevensecurity.com/wp-content/uploads/2016/02/Layer-Seven-Security_SAP-Security-Notes_January-2016.pdf"
},
{
"name": "20160819 Onapsis Security Advisory ONAPSIS-2016-037: SAP HANA Potential Remote Code Execution",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2016/Aug/95"
}, },
{ {
"name": "92067", "name": "92067",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-6930", "ID": "CVE-2016-6930",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html"
},
{ {
"name": "GLSA-201610-10", "name": "GLSA-201610-10",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201610-10" "url": "https://security.gentoo.org/glsa/201610-10"
}, },
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html"
},
{ {
"name": "RHSA-2016:1865", "name": "RHSA-2016:1865",
"refsource": "REDHAT", "refsource": "REDHAT",

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-7496", "ID": "CVE-2016-7496",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,34 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html", "name": "SUSE-SU-2016:3148",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html"
},
{
"name" : "GLSA-201701-17",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201701-17"
}, },
{ {
"name": "MS16-154", "name": "MS16-154",
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-154" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-154"
}, },
{
"name": "GLSA-201701-17",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-17"
},
{
"name": "1037442",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037442"
},
{ {
"name": "RHSA-2016:2947", "name": "RHSA-2016:2947",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2947.html" "url": "http://rhn.redhat.com/errata/RHSA-2016-2947.html"
}, },
{ {
"name" : "SUSE-SU-2016:3148", "name": "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html" "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html"
},
{
"name" : "openSUSE-SU-2016:3160",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html"
}, },
{ {
"name": "94870", "name": "94870",
@ -88,9 +88,9 @@
"url": "http://www.securityfocus.com/bid/94870" "url": "http://www.securityfocus.com/bid/94870"
}, },
{ {
"name" : "1037442", "name": "openSUSE-SU-2016:3160",
"refsource" : "SECTRACK", "refsource": "SUSE",
"url" : "http://www.securitytracker.com/id/1037442" "url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html"
} }
] ]
} }