"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 22:11:31 +00:00
parent 4137ea2631
commit 8edd1f8dbc
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
68 changed files with 4024 additions and 4024 deletions

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "2077",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/2077"
},
{
"name": "237",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/237"
},
{
"name": "2077",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2077"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.crosswinds.net/~fuseware/faq.html#8",
"refsource" : "CONFIRM",
"url" : "http://www.crosswinds.net/~fuseware/faq.html#8"
},
{
"name": "634",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/634"
},
{
"name": "http://www.crosswinds.net/~fuseware/faq.html#8",
"refsource": "CONFIRM",
"url": "http://www.crosswinds.net/~fuseware/faq.html#8"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "00165",
"refsource" : "SUN",
"url" : "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/165&type=0&nav=sec.sba"
"name": "sun-ndd(817)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/817"
},
{
"name": "433",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/433"
},
{
"name" : "sun-ndd(817)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/817"
"name": "00165",
"refsource": "SUN",
"url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/165&type=0&nav=sec.sba"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "Q160650",
"refsource" : "MSKB",
"url" : "http://support.microsoft.com/support/kb/articles/q160/6/50.asp"
},
{
"name": "nt-kernel-handle-dos(7402)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/7402.php"
},
{
"name": "Q160650",
"refsource": "MSKB",
"url": "http://support.microsoft.com/support/kb/articles/q160/6/50.asp"
}
]
}

View File

@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name" : "HPSBUX9812-090",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/advisories/1471"
},
{
"name": "ESB-98.186",
"refsource": "AUSCERT",
"url": "http://www.auscert.org.au/render.html?it=490"
},
{
"name" : "VU#13217",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/13217"
},
{
"name": "J-022",
"refsource": "CIAC",
"url": "http://www.ciac.org/ciac/bulletins/j-022.shtml"
},
{
"name" : "oval:org.mitre.oval:def:5550",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5550"
"name": "HPSBUX9812-090",
"refsource": "HP",
"url": "http://www.securityfocus.com/advisories/1471"
},
{
"name": "hp-rcmnds-gain-privileges(7860)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7860"
},
{
"name": "VU#13217",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/13217"
},
{
"name": "oval:org.mitre.oval:def:5550",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5550"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20000314 Oracle Web Listener 4.0.x",
"refsource" : "NTBUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/ntbugtraq/2000-q1/0211.html"
},
{
"name": "1053",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/1053"
},
{
"name": "20000314 Oracle Web Listener 4.0.x",
"refsource": "NTBUGTRAQ",
"url": "http://archives.neohapsis.com/archives/ntbugtraq/2000-q1/0211.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "HPSBUX0004-112",
"refsource" : "HP",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-04/0021.html"
},
{
"name": "1090",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/1090"
},
{
"name": "HPSBUX0004-112",
"refsource": "HP",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-04/0021.html"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "CSSA-1999-015.0",
"refsource" : "CALDERA",
"url" : "ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-015.0.txt"
},
{
"name": "RHSA-1999:015-01",
"refsource": "REDHAT",
@ -66,6 +61,11 @@
"name": "kde-kvt(2266)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2266"
},
{
"name": "CSSA-1999-015.0",
"refsource": "CALDERA",
"url": "ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-015.0.txt"
}
]
}

View File

@ -62,15 +62,15 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/1506"
},
{
"name" : "wftpd-stat-dos(5003)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5003"
},
{
"name": "1477",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/1477"
},
{
"name": "wftpd-stat-dos(5003)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5003"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "MS00-061",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-061"
},
{
"name": "1615",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/1615"
},
{
"name": "MS00-061",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-061"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "CA-2000-21",
"refsource": "CERT",
"url": "http://www.cert.org/advisories/CA-2000-21.html"
},
{
"name": "20001130 The NAPTHA DoS vulnerabilities",
"refsource": "BINDVIEW",
@ -63,19 +68,14 @@
"url": "http://archives.neohapsis.com/archives/win2ksecadvice/2000-q4/0105.html"
},
{
"name" : "CA-2000-21",
"refsource" : "CERT",
"url" : "http://www.cert.org/advisories/CA-2000-21.html"
"name": "2022",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2022"
},
{
"name": "MS00-091",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-091"
},
{
"name" : "2022",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/2022"
}
]
}

View File

@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "DSA-851",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2005/dsa-851"
"name": "17103",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17103"
},
{
"name": "http://openvpn.net/changelog.html",
"refsource": "CONFIRM",
"url": "http://openvpn.net/changelog.html"
},
{
"name": "MDKSA-2005:145",
@ -63,9 +68,9 @@
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:145"
},
{
"name" : "http://openvpn.net/changelog.html",
"refsource" : "CONFIRM",
"url" : "http://openvpn.net/changelog.html"
"name": "DSA-851",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2005/dsa-851"
},
{
"name": "14607",
@ -76,11 +81,6 @@
"name": "16463",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/16463"
},
{
"name" : "17103",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/17103"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20050805 Comdev eCommerce wce.download.php Download Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=112327874920062&w=2"
},
{
"name": "14479",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/14479"
},
{
"name": "20050805 Comdev eCommerce wce.download.php Download Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=112327874920062&w=2"
}
]
}

View File

@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "xnews-archives-news-directory-traversal(32560)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32560"
},
{
"name": "24177",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24177"
},
{
"name": "33225",
"refsource": "OSVDB",
"url": "http://osvdb.org/33225"
},
{
"name": "3332",
"refsource": "EXPLOIT-DB",
@ -66,21 +81,6 @@
"name": "ADV-2007-0645",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0645"
},
{
"name" : "33225",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33225"
},
{
"name" : "24177",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24177"
},
{
"name" : "xnews-archives-news-directory-traversal(32560)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32560"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2007-1211",
"STATE": "PUBLIC"
},
@ -52,31 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20070403 Microsoft Windows WMF Triggerable Kernel Design Error DoS Vulnerability",
"refsource" : "IDEFENSE",
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=499"
},
{
"name" : "HPSBST02206",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/466186/100/200/threaded"
},
{
"name" : "SSRT071354",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/466186/100/200/threaded"
},
{
"name" : "MS07-017",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-017"
},
{
"name" : "23275",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23275"
},
{
"name": "ADV-2007-1215",
"refsource": "VUPEN",
@ -92,10 +67,35 @@
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017843"
},
{
"name": "23275",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23275"
},
{
"name": "HPSBST02206",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/466186/100/200/threaded"
},
{
"name": "win-wmf-dos(33258)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33258"
},
{
"name": "20070403 Microsoft Windows WMF Triggerable Kernel Design Error DoS Vulnerability",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=499"
},
{
"name": "MS07-017",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-017"
},
{
"name": "SSRT071354",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/466186/100/200/threaded"
}
]
}

View File

@ -53,25 +53,25 @@
"references": {
"reference_data": [
{
"name" : "4503",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4503"
"name": "27139",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27139"
},
{
"name": "ADV-2007-3446",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3446"
},
{
"name": "4503",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4503"
},
{
"name": "37618",
"refsource": "OSVDB",
"url": "http://osvdb.org/37618"
},
{
"name" : "27139",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27139"
},
{
"name": "livealbum-common-file-include(37028)",
"refsource": "XF",

View File

@ -52,41 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20071011 [CAID 35724, 35725, 35726]: CA BrightStor ARCserve Backup Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/482121/100/0/threaded"
},
{
"name" : "20071126 ZDI-07-069: CA BrightStor ARCserve Backup Message Engine Insecure Method Exposure Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/484229/100/0/threaded"
},
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-07-069.html",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-07-069.html"
},
{
"name" : "http://supportconnectw.ca.com/public/storage/infodocs/basb-secnotice.asp",
"refsource" : "CONFIRM",
"url" : "http://supportconnectw.ca.com/public/storage/infodocs/basb-secnotice.asp"
},
{
"name" : "26015",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26015"
},
{
"name" : "ADV-2007-3470",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3470"
},
{
"name" : "1018805",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018805"
},
{
"name": "27192",
"refsource": "SECUNIA",
@ -96,6 +61,41 @@
"name": "ca-brightstor-unspecified-security-bypass(37067)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37067"
},
{
"name": "http://supportconnectw.ca.com/public/storage/infodocs/basb-secnotice.asp",
"refsource": "CONFIRM",
"url": "http://supportconnectw.ca.com/public/storage/infodocs/basb-secnotice.asp"
},
{
"name": "20071126 ZDI-07-069: CA BrightStor ARCserve Backup Message Engine Insecure Method Exposure Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/484229/100/0/threaded"
},
{
"name": "20071011 [CAID 35724, 35725, 35726]: CA BrightStor ARCserve Backup Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/482121/100/0/threaded"
},
{
"name": "26015",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26015"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-07-069.html",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-07-069.html"
},
{
"name": "1018805",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018805"
},
{
"name": "ADV-2007-3470",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3470"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2007-5613",
"STATE": "PUBLIC"
},
@ -52,36 +52,11 @@
},
"references": {
"reference_data": [
{
"name" : "http://jira.codehaus.org/browse/JETTY-452",
"refsource" : "CONFIRM",
"url" : "http://jira.codehaus.org/browse/JETTY-452"
},
{
"name" : "http://svn.codehaus.org/jetty/jetty/trunk/VERSION.txt",
"refsource" : "CONFIRM",
"url" : "http://svn.codehaus.org/jetty/jetty/trunk/VERSION.txt"
},
{
"name": "FEDORA-2008-6141",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00227.html"
},
{
"name" : "FEDORA-2008-6164",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00250.html"
},
{
"name" : "SUSE-SR:2009:004",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"name" : "VU#237888",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/237888"
},
{
"name": "26697",
"refsource": "BID",
@ -93,19 +68,44 @@
"url": "http://osvdb.org/42497"
},
{
"name" : "27925",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27925"
"name": "FEDORA-2008-6164",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00250.html"
},
{
"name": "30941",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30941"
},
{
"name": "SUSE-SR:2009:004",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"name": "http://jira.codehaus.org/browse/JETTY-452",
"refsource": "CONFIRM",
"url": "http://jira.codehaus.org/browse/JETTY-452"
},
{
"name": "VU#237888",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/237888"
},
{
"name": "35143",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35143"
},
{
"name": "27925",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27925"
},
{
"name": "http://svn.codehaus.org/jetty/jetty/trunk/VERSION.txt",
"refsource": "CONFIRM",
"url": "http://svn.codehaus.org/jetty/jetty/trunk/VERSION.txt"
}
]
}

View File

@ -52,36 +52,36 @@
},
"references": {
"reference_data": [
{
"name" : "20071112 AutoIndex <= 2.2.2 Cross Site Scripting and Denial of Service",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/483592/100/0/threaded"
},
{
"name" : "http://autoindex.sourceforge.net/change_log.html",
"refsource" : "MISC",
"url" : "http://autoindex.sourceforge.net/change_log.html"
},
{
"name": "26411",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26411"
},
{
"name": "20071112 AutoIndex <= 2.2.2 Cross Site Scripting and Denial of Service",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/483592/100/0/threaded"
},
{
"name": "38664",
"refsource": "OSVDB",
"url": "http://osvdb.org/38664"
},
{
"name" : "27671",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27671"
"name": "http://autoindex.sourceforge.net/change_log.html",
"refsource": "MISC",
"url": "http://autoindex.sourceforge.net/change_log.html"
},
{
"name": "3360",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3360"
},
{
"name": "27671",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27671"
},
{
"name": "autoindex-index-xss(38436)",
"refsource": "XF",

View File

@ -53,15 +53,35 @@
"references": {
"reference_data": [
{
"name" : "20091007 [DSECRG-09-048] HP LaserJet printers - Multiple Stored XSS vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/507038/100/0/threaded"
"name": "36613",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/36613"
},
{
"name": "http://dsecrg.com/pages/vul/show.php?id=148",
"refsource": "MISC",
"url": "http://dsecrg.com/pages/vul/show.php?id=148"
},
{
"name": "ADV-2009-2850",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/2850"
},
{
"name": "36969",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36969"
},
{
"name": "20091007 [DSECRG-09-048] HP LaserJet printers - Multiple Stored XSS vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/507038/100/0/threaded"
},
{
"name": "hp-laserjet-unspecified-xss(53677)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53677"
},
{
"name": "HPSBPI02463",
"refsource": "HP",
@ -71,26 +91,6 @@
"name": "SSRT090061",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=125493484205823&w=2"
},
{
"name" : "36613",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/36613"
},
{
"name" : "36969",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/36969"
},
{
"name" : "ADV-2009-2850",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/2850"
},
{
"name" : "hp-laserjet-unspecified-xss(53677)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/53677"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb09-15.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb09-15.html"
},
{
"name" : "TA09-286B",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA09-286B.html"
},
{
"name": "36638",
"refsource": "BID",
@ -72,11 +62,21 @@
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6371"
},
{
"name": "TA09-286B",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-286B.html"
},
{
"name": "1023007",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1023007"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb09-15.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb09-15.html"
},
{
"name": "ADV-2009-2898",
"refsource": "VUPEN",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-3221",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "75368",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/75368"
},
{
"name": "[openstack-announce] 20150623 [OSSA 2015-012] Neutron L2 agent DoS through incorrect allowed address pairs (CVE-2015-3221)",
"refsource": "MLIST",
@ -66,11 +71,6 @@
"name": "RHSA-2015:1680",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1680.html"
},
{
"name" : "75368",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/75368"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1032250",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032250"
},
{
"name": "[oss-security] 20150425 CVE requests / Advisory: phpMyBackupPro",
"refsource": "MLIST",
@ -61,11 +66,6 @@
"name": "[oss-security] 20150504 Re: CVE requests / Advisory: phpMyBackupPro",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/05/04/4"
},
{
"name" : "1032250",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1032250"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-3713",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT204942",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT204942"
},
{
"name": "APPLE-SA-2015-06-30-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html"
},
{
"name": "1032757",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032757"
},
{
"name": "75493",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/75493"
},
{
"name" : "1032757",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1032757"
"name": "http://support.apple.com/kb/HT204942",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT204942"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://xenbits.xen.org/xsa/advisory-130.html",
"refsource" : "CONFIRM",
"url" : "http://xenbits.xen.org/xsa/advisory-130.html"
},
{
"name" : "http://support.citrix.com/article/CTX201145",
"refsource" : "CONFIRM",
"url" : "http://support.citrix.com/article/CTX201145"
"name": "USN-2630-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2630-1"
},
{
"name": "https://support.citrix.com/article/CTX206006",
@ -73,19 +68,9 @@
"url": "http://www.debian.org/security/2015/dsa-3286"
},
{
"name" : "DSA-3284",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3284"
},
{
"name" : "FEDORA-2015-9965",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html"
},
{
"name" : "FEDORA-2015-9456",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160171.html"
"name": "SUSE-SU-2015:1156",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html"
},
{
"name": "FEDORA-2015-9466",
@ -93,24 +78,9 @@
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160154.html"
},
{
"name" : "GLSA-201604-03",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201604-03"
},
{
"name" : "SUSE-SU-2015:1042",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html"
},
{
"name" : "SUSE-SU-2015:1045",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html"
},
{
"name" : "SUSE-SU-2015:1156",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html"
"name": "DSA-3284",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3284"
},
{
"name": "SUSE-SU-2015:1157",
@ -118,19 +88,49 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html"
},
{
"name" : "USN-2630-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2630-1"
"name": "http://support.citrix.com/article/CTX201145",
"refsource": "CONFIRM",
"url": "http://support.citrix.com/article/CTX201145"
},
{
"name": "SUSE-SU-2015:1045",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html"
},
{
"name": "74948",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/74948"
},
{
"name": "http://xenbits.xen.org/xsa/advisory-130.html",
"refsource": "CONFIRM",
"url": "http://xenbits.xen.org/xsa/advisory-130.html"
},
{
"name": "1032465",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032465"
},
{
"name": "GLSA-201604-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201604-03"
},
{
"name": "FEDORA-2015-9456",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160171.html"
},
{
"name": "SUSE-SU-2015:1042",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html"
},
{
"name": "FEDORA-2015-9965",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2015-7458",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-7536",
"STATE": "PUBLIC"
},

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-8133",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-8188",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-8416",
"STATE": "PUBLIC"
},
@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-15-666",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-666"
},
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
"name": "openSUSE-SU-2015:2239",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680",
@ -73,39 +63,49 @@
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html",
"refsource": "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html"
},
{
"name" : "GLSA-201601-03",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201601-03"
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-666",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-666"
},
{
"name": "SUSE-SU-2015:2236",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
},
{
"name": "SUSE-SU-2015:2247",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html"
},
{
"name" : "openSUSE-SU-2015:2239",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html"
"name": "1034318",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034318"
},
{
"name": "GLSA-201601-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201601-03"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
},
{
"name": "78710",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/78710"
},
{
"name" : "1034318",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034318"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-1095",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1035828",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035828"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-329",
"refsource": "MISC",
@ -61,11 +66,6 @@
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
},
{
"name" : "1035828",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035828"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2016-5136",
"STATE": "PUBLIC"
},
@ -52,46 +52,11 @@
},
"references": {
"reference_data": [
{
"name" : "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"
},
{
"name" : "https://codereview.chromium.org/2116923002/",
"refsource" : "CONFIRM",
"url" : "https://codereview.chromium.org/2116923002/"
},
{
"name": "https://codereview.chromium.org/2134613002/",
"refsource": "CONFIRM",
"url": "https://codereview.chromium.org/2134613002/"
},
{
"name" : "https://crbug.com/625393",
"refsource" : "CONFIRM",
"url" : "https://crbug.com/625393"
},
{
"name" : "DSA-3637",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3637"
},
{
"name" : "GLSA-201610-09",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201610-09"
},
{
"name" : "RHSA-2016:1485",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1485.html"
},
{
"name" : "openSUSE-SU-2016:1865",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"
},
{
"name": "openSUSE-SU-2016:1868",
"refsource": "SUSE",
@ -103,19 +68,54 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"
},
{
"name" : "openSUSE-SU-2016:1918",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"
"name": "https://crbug.com/625393",
"refsource": "CONFIRM",
"url": "https://crbug.com/625393"
},
{
"name": "92053",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92053"
},
{
"name": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"
},
{
"name": "openSUSE-SU-2016:1918",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"
},
{
"name": "https://codereview.chromium.org/2116923002/",
"refsource": "CONFIRM",
"url": "https://codereview.chromium.org/2116923002/"
},
{
"name": "GLSA-201610-09",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201610-09"
},
{
"name": "openSUSE-SU-2016:1865",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"
},
{
"name": "RHSA-2016:1485",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html"
},
{
"name": "1036428",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036428"
},
{
"name": "DSA-3637",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3637"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://chromereleases.googleblog.com/2016/12/stable-channel-update-for-desktop.html",
"refsource" : "CONFIRM",
"url" : "https://chromereleases.googleblog.com/2016/12/stable-channel-update-for-desktop.html"
},
{
"name" : "https://crbug.com/653090",
"refsource" : "CONFIRM",
"url" : "https://crbug.com/653090"
},
{
"name": "RHSA-2016:2919",
"refsource": "REDHAT",
@ -71,6 +61,16 @@
"name": "94633",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94633"
},
{
"name": "https://crbug.com/653090",
"refsource": "CONFIRM",
"url": "https://crbug.com/653090"
},
{
"name": "https://chromereleases.googleblog.com/2016/12/stable-channel-update-for-desktop.html",
"refsource": "CONFIRM",
"url": "https://chromereleases.googleblog.com/2016/12/stable-channel-update-for-desktop.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@suse.com",
"ID": "CVE-2016-5746",
"STATE": "PUBLIC"
},
@ -52,31 +52,11 @@
},
"references": {
"reference_data": [
{
"name" : "https://bugzilla.suse.com/show_bug.cgi?id=986971",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.suse.com/show_bug.cgi?id=986971"
},
{
"name" : "https://github.com/openSUSE/libstorage-ng/pull/123",
"refsource" : "CONFIRM",
"url" : "https://github.com/openSUSE/libstorage-ng/pull/123"
},
{
"name": "https://github.com/openSUSE/libstorage/pull/162",
"refsource": "CONFIRM",
"url": "https://github.com/openSUSE/libstorage/pull/162"
},
{
"name" : "https://github.com/openSUSE/libstorage/pull/163",
"refsource" : "CONFIRM",
"url" : "https://github.com/openSUSE/libstorage/pull/163"
},
{
"name" : "https://github.com/yast/yast-storage/pull/223",
"refsource" : "CONFIRM",
"url" : "https://github.com/yast/yast-storage/pull/223"
},
{
"name": "https://github.com/yast/yast-storage/pull/224",
"refsource": "CONFIRM",
@ -87,11 +67,21 @@
"refsource": "CONFIRM",
"url": "https://github.com/yast/yast-storage/pull/226"
},
{
"name": "https://bugzilla.suse.com/show_bug.cgi?id=986971",
"refsource": "CONFIRM",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=986971"
},
{
"name": "https://github.com/yast/yast-storage/pull/227",
"refsource": "CONFIRM",
"url": "https://github.com/yast/yast-storage/pull/227"
},
{
"name": "https://github.com/openSUSE/libstorage-ng/pull/123",
"refsource": "CONFIRM",
"url": "https://github.com/openSUSE/libstorage-ng/pull/123"
},
{
"name": "openSUSE-SU-2016:2264",
"refsource": "SUSE",
@ -101,6 +91,16 @@
"name": "93169",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93169"
},
{
"name": "https://github.com/yast/yast-storage/pull/223",
"refsource": "CONFIRM",
"url": "https://github.com/yast/yast-storage/pull/223"
},
{
"name": "https://github.com/openSUSE/libstorage/pull/163",
"refsource": "CONFIRM",
"url": "https://github.com/openSUSE/libstorage/pull/163"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-2102",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-2139",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -57,6 +57,11 @@
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name": "102636",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102636"
},
{
"name": "https://security.netapp.com/advisory/ntap-20180117-0001/",
"refsource": "CONFIRM",
@ -67,35 +72,30 @@
"refsource": "CONFIRM",
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"name": "RHSA-2018:1812",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1812"
},
{
"name": "RHSA-2018:0099",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0099"
},
{
"name" : "RHSA-2018:0100",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:0100"
},
{
"name": "RHSA-2018:1463",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1463"
},
{
"name" : "RHSA-2018:1812",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:1812"
},
{
"name" : "102636",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/102636"
},
{
"name": "1040203",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040203"
},
{
"name": "RHSA-2018:0100",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0100"
}
]
}

View File

@ -66,9 +66,14 @@
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20180403 [SECURITY] [DLA 1339-1] openjdk-7 security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"
"name": "102557",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102557"
},
{
"name": "RHSA-2018:0351",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0351"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
@ -81,19 +86,9 @@
"url": "https://security.netapp.com/advisory/ntap-20180117-0001/"
},
{
"name" : "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource" : "CONFIRM",
"url" : "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
"refsource" : "CONFIRM",
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"
},
{
"name" : "DSA-4144",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4144"
"name": "USN-3614-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3614-1/"
},
{
"name": "DSA-4166",
@ -106,39 +101,9 @@
"url": "https://access.redhat.com/errata/RHSA-2018:0095"
},
{
"name" : "RHSA-2018:0099",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:0099"
},
{
"name" : "RHSA-2018:0100",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:0100"
},
{
"name" : "RHSA-2018:0115",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:0115"
},
{
"name" : "RHSA-2018:0349",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:0349"
},
{
"name" : "RHSA-2018:0351",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:0351"
},
{
"name" : "RHSA-2018:0352",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:0352"
},
{
"name" : "RHSA-2018:0458",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:0458"
"name": "DSA-4144",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4144"
},
{
"name": "RHSA-2018:0521",
@ -146,9 +111,24 @@
"url": "https://access.redhat.com/errata/RHSA-2018:0521"
},
{
"name" : "RHSA-2018:1463",
"name": "RHSA-2018:0352",
"refsource": "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:1463"
"url": "https://access.redhat.com/errata/RHSA-2018:0352"
},
{
"name": "RHSA-2018:0115",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0115"
},
{
"name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource": "CONFIRM",
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"name": "[debian-lts-announce] 20180403 [SECURITY] [DLA 1339-1] openjdk-7 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"
},
{
"name": "RHSA-2018:1812",
@ -156,24 +136,44 @@
"url": "https://access.redhat.com/errata/RHSA-2018:1812"
},
{
"name" : "USN-3613-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3613-1/"
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"
},
{
"name" : "USN-3614-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3614-1/"
"name": "RHSA-2018:0099",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0099"
},
{
"name" : "102557",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/102557"
"name": "RHSA-2018:1463",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1463"
},
{
"name": "RHSA-2018:0458",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0458"
},
{
"name": "RHSA-2018:0349",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0349"
},
{
"name": "1040203",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040203"
},
{
"name": "USN-3613-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3613-1/"
},
{
"name": "RHSA-2018:0100",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0100"
}
]
}