"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 02:05:47 +00:00
parent 407fab22bb
commit c89053a84a
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
63 changed files with 3593 additions and 3593 deletions

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "19980901-01-PX", "name": "irix-register(7441)",
"refsource" : "SGI", "refsource": "XF",
"url" : "ftp://patches.sgi.com/support/free/security/advisories/19980901-01-PX" "url": "http://www.iss.net/security_center/static/7441.php"
}, },
{ {
"name": "J-003", "name": "J-003",
@ -63,9 +63,9 @@
"url": "http://ciac.llnl.gov/ciac/bulletins/j-003.shtml" "url": "http://ciac.llnl.gov/ciac/bulletins/j-003.shtml"
}, },
{ {
"name" : "irix-register(7441)", "name": "19980901-01-PX",
"refsource" : "XF", "refsource": "SGI",
"url" : "http://www.iss.net/security_center/static/7441.php" "url": "ftp://patches.sgi.com/support/free/security/advisories/19980901-01-PX"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "NTBUGTRAQ", "refsource": "NTBUGTRAQ",
"url": "http://marc.info/?l=ntbugtraq&m=92587579032534&w=2" "url": "http://marc.info/?l=ntbugtraq&m=92587579032534&w=2"
}, },
{
"name" : "19990505 NAI AntiVirus Update Problem",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=92588169005196&w=2"
},
{ {
"name": "169", "name": "169",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/169" "url": "http://www.securityfocus.com/bid/169"
},
{
"name": "19990505 NAI AntiVirus Update Problem",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=92588169005196&w=2"
} }
] ]
} }

View File

@ -53,19 +53,19 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"refsource": "BUGTRAQ",
"name": "19991004", "name": "19991004",
"refsource" : "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=93901161727373&w=2" "url": "http://marc.info/?l=bugtraq&m=93901161727373&w=2"
}, },
{
"name" : "19991006 Re: Sample DOS against the Sambar HTTP-Server",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=93941351229256&w=2"
},
{ {
"name": "sambar-logging-bo(1672)", "name": "sambar-logging-bo(1672)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1672" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1672"
},
{
"name": "19991006 Re: Sample DOS against the Sambar HTTP-Server",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=93941351229256&w=2"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "delegate-proxy-bo(4105)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4195"
},
{ {
"name": "FreeBSD-SA-00:04", "name": "FreeBSD-SA-00:04",
"refsource": "FREEBSD", "refsource": "FREEBSD",
@ -61,11 +66,6 @@
"name": "K-023", "name": "K-023",
"refsource": "CIAC", "refsource": "CIAC",
"url": "http://www.ciac.org/ciac/bulletins/k-023.shtml" "url": "http://www.ciac.org/ciac/bulletins/k-023.shtml"
},
{
"name" : "delegate-proxy-bo(4105)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/4195"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20000221 Local / Remote Exploiteable Buffer Overflow Vulnerability in InterAccess TelnetD Server 4.0 for Windows NT",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/templates/archive.pike?list=1&msg=NCBBKFKDOLAGKIAPMILPGEJHCCAA.labs@ussrback.com"
},
{ {
"name": "20000223 Pragma Systems response to USSRLabs report", "name": "20000223 Pragma Systems response to USSRLabs report",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -66,6 +61,11 @@
"name": "995", "name": "995",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/995" "url": "http://www.securityfocus.com/bid/995"
},
{
"name": "20000221 Local / Remote Exploiteable Buffer Overflow Vulnerability in InterAccess TelnetD Server 4.0 for Windows NT",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/templates/archive.pike?list=1&msg=NCBBKFKDOLAGKIAPMILPGEJHCCAA.labs@ussrback.com"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20000310 Fwd: ircii-4.4 buffer overflow",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-03/0093.html"
},
{ {
"name": "RHSA-2000:008", "name": "RHSA-2000:008",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2000-008.html" "url": "http://www.redhat.com/support/errata/RHSA-2000-008.html"
}, },
{
"name": "20000310 Fwd: ircii-4.4 buffer overflow",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-03/0093.html"
},
{ {
"name": "1046", "name": "1046",
"refsource": "BID", "refsource": "BID",

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "HPSBUX0008-119",
"refsource" : "HP",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-08/0144.html"
},
{ {
"name": "1581", "name": "1581",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/1581" "url": "http://www.securityfocus.com/bid/1581"
},
{
"name": "HPSBUX0008-119",
"refsource": "HP",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0144.html"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20000808 Exploit for Totalbill...",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-08/0074.html"
},
{ {
"name": "1555", "name": "1555",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/1555" "url": "http://www.securityfocus.com/bid/1555"
},
{
"name": "20000808 Exploit for Totalbill...",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0074.html"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20001030 Redhat 6.2 dump command executes external program with suid priviledge.", "name": "linux-dump-execute-code(5437)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-10/0438.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5437"
}, },
{ {
"name": "1871", "name": "1871",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/1871" "url": "http://www.securityfocus.com/bid/1871"
}, },
{ {
"name" : "linux-dump-execute-code(5437)", "name": "20001030 Redhat 6.2 dump command executes external program with suid priviledge.",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5437" "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0438.html"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=112144089102115&w=2" "url": "http://marc.info/?l=bugtraq&m=112144089102115&w=2"
}, },
{
"name" : "1014493",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/alerts/2005/Jul/1014493.html"
},
{ {
"name": "belkin-router-default-password(21412)", "name": "belkin-router-default-password(21412)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21412" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21412"
},
{
"name": "1014493",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/alerts/2005/Jul/1014493.html"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "ADV-2007-1003",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1003"
},
{ {
"name": "3494", "name": "3494",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
@ -62,11 +67,6 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/22989" "url": "http://www.securityfocus.com/bid/22989"
}, },
{
"name" : "ADV-2007-1003",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1003"
},
{ {
"name": "mcgallery-download-information-disclosure(33004)", "name": "mcgallery-download-information-disclosure(33004)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "30892",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30892"
},
{ {
"name": "5975", "name": "5975",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
@ -66,11 +71,6 @@
"name": "http://www.netvigilance.com/advisory0040", "name": "http://www.netvigilance.com/advisory0040",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.netvigilance.com/advisory0040" "url": "http://www.netvigilance.com/advisory0040"
},
{
"name" : "30892",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30892"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070408 Gsylvain35 Portail Web Remote File Include Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/465083/100/0/threaded"
},
{ {
"name": "35290", "name": "35290",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -66,6 +61,11 @@
"name": "2543", "name": "2543",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2543" "url": "http://securityreason.com/securityalert/2543"
},
{
"name": "20070408 Gsylvain35 Portail Web Remote File Include Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/465083/100/0/threaded"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2007-5553", "ID": "CVE-2007-5553",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "55671",
"refsource": "OSVDB",
"url": "http://osvdb.org/55671"
},
{ {
"name": "9069", "name": "9069",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
@ -61,11 +66,6 @@
"name": "55670", "name": "55670",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/55670" "url": "http://osvdb.org/55670"
},
{
"name" : "55671",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/55671"
} }
] ]
} }

View File

@ -53,40 +53,40 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20150420 Re: Linux: chown() was racy relative to execve() - Linux kernel", "name": "SUSE-SU-2015:1491",
"refsource" : "MLIST", "refsource": "SUSE",
"url" : "http://www.openwall.com/lists/oss-security/2015/04/20/5" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html"
}, },
{ {
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8b01fc86b9f425899f8a3a8fc1c47d73c2c20543", "name": "1032412",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8b01fc86b9f425899f8a3a8fc1c47d73c2c20543" "url": "http://www.securitytracker.com/id/1032412"
}, },
{ {
"name" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.19.6", "name": "SUSE-SU-2015:1489",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.19.6" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html"
},
{
"name": "SUSE-SU-2015:1488",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html"
},
{
"name": "FEDORA-2015-8518",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158804.html"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1214030", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1214030",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214030" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214030"
}, },
{
"name" : "https://github.com/torvalds/linux/commit/8b01fc86b9f425899f8a3a8fc1c47d73c2c20543",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/8b01fc86b9f425899f8a3a8fc1c47d73c2c20543"
},
{ {
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
}, },
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{ {
"name": "DSA-3237", "name": "DSA-3237",
"refsource": "DEBIAN", "refsource": "DEBIAN",
@ -98,49 +98,49 @@
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157897.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157897.html"
}, },
{ {
"name" : "FEDORA-2015-8518", "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource" : "FEDORA", "refsource": "CONFIRM",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158804.html" "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"name" : "RHSA-2015:1272",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1272.html"
},
{
"name" : "SUSE-SU-2016:2074",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html"
}, },
{ {
"name": "openSUSE-SU-2015:1382", "name": "openSUSE-SU-2015:1382",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html"
}, },
{
"name": "[oss-security] 20150420 Re: Linux: chown() was racy relative to execve() - Linux kernel",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/04/20/5"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.19.6",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.19.6"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8b01fc86b9f425899f8a3a8fc1c47d73c2c20543",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8b01fc86b9f425899f8a3a8fc1c47d73c2c20543"
},
{
"name": "SUSE-SU-2016:2074",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html"
},
{
"name": "RHSA-2015:1272",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1272.html"
},
{ {
"name": "SUSE-SU-2015:1487", "name": "SUSE-SU-2015:1487",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html"
}, },
{ {
"name" : "SUSE-SU-2015:1488", "name": "https://github.com/torvalds/linux/commit/8b01fc86b9f425899f8a3a8fc1c47d73c2c20543",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html" "url": "https://github.com/torvalds/linux/commit/8b01fc86b9f425899f8a3a8fc1c47d73c2c20543"
},
{
"name" : "SUSE-SU-2015:1489",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html"
},
{
"name" : "SUSE-SU-2015:1491",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html"
},
{
"name" : "1032412",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1032412"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-3741", "ID": "CVE-2015-3741",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,55 +52,55 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://support.apple.com/kb/HT205030",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/kb/HT205030"
},
{
"name" : "https://support.apple.com/kb/HT205033",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/kb/HT205033"
},
{ {
"name": "https://support.apple.com/HT205221", "name": "https://support.apple.com/HT205221",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://support.apple.com/HT205221" "url": "https://support.apple.com/HT205221"
}, },
{ {
"name" : "APPLE-SA-2015-08-13-1", "name": "1033274",
"refsource" : "APPLE", "refsource": "SECTRACK",
"url" : "http://lists.apple.com/archives/security-announce/2015/Aug/msg00000.html" "url": "http://www.securitytracker.com/id/1033274"
}, },
{ {
"name" : "APPLE-SA-2015-08-13-3", "name": "https://support.apple.com/kb/HT205030",
"refsource" : "APPLE", "refsource": "CONFIRM",
"url" : "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html" "url": "https://support.apple.com/kb/HT205030"
}, },
{ {
"name": "APPLE-SA-2015-09-16-3", "name": "APPLE-SA-2015-09-16-3",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html" "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html"
}, },
{
"name": "APPLE-SA-2015-08-13-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html"
},
{ {
"name": "openSUSE-SU-2016:0915", "name": "openSUSE-SU-2016:0915",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html"
}, },
{
"name" : "USN-2937-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2937-1"
},
{ {
"name": "76338", "name": "76338",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/76338" "url": "http://www.securityfocus.com/bid/76338"
}, },
{ {
"name" : "1033274", "name": "APPLE-SA-2015-08-13-1",
"refsource" : "SECTRACK", "refsource": "APPLE",
"url" : "http://www.securitytracker.com/id/1033274" "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00000.html"
},
{
"name": "https://support.apple.com/kb/HT205033",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT205033"
},
{
"name": "USN-2937-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2937-1"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20150425 CVE requests for Drupal contributed modules (from SA-CONTRIB-2015-034 to SA-CONTRIB-2015-099)", "name": "https://www.drupal.org/node/2404115",
"refsource" : "MLIST", "refsource": "CONFIRM",
"url" : "http://www.openwall.com/lists/oss-security/2015/04/25/6" "url": "https://www.drupal.org/node/2404115"
}, },
{ {
"name": "https://www.drupal.org/node/2450427", "name": "https://www.drupal.org/node/2450427",
@ -63,9 +63,9 @@
"url": "https://www.drupal.org/node/2450427" "url": "https://www.drupal.org/node/2450427"
}, },
{ {
"name" : "https://www.drupal.org/node/2404115", "name": "[oss-security] 20150425 CVE requests for Drupal contributed modules (from SA-CONTRIB-2015-034 to SA-CONTRIB-2015-099)",
"refsource" : "CONFIRM", "refsource": "MLIST",
"url" : "https://www.drupal.org/node/2404115" "url": "http://www.openwall.com/lists/oss-security/2015/04/25/6"
}, },
{ {
"name": "73054", "name": "73054",

View File

@ -52,50 +52,50 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.wireshark.org/security/wnpa-sec-2015-19.html",
"refsource" : "CONFIRM",
"url" : "http://www.wireshark.org/security/wnpa-sec-2015-19.html"
},
{
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11153",
"refsource" : "CONFIRM",
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11153"
},
{ {
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=524ed1df6e6126cd63ba419ccb82c83636d77ee4", "name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=524ed1df6e6126cd63ba419ccb82c83636d77ee4",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=524ed1df6e6126cd63ba419ccb82c83636d77ee4" "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=524ed1df6e6126cd63ba419ccb82c83636d77ee4"
}, },
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
},
{
"name" : "DSA-3294",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3294"
},
{
"name" : "GLSA-201510-03",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201510-03"
},
{
"name" : "openSUSE-SU-2015:1215",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-07/msg00020.html"
},
{ {
"name": "75317", "name": "75317",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/75317" "url": "http://www.securityfocus.com/bid/75317"
}, },
{
"name": "DSA-3294",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3294"
},
{
"name": "openSUSE-SU-2015:1215",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00020.html"
},
{ {
"name": "1032662", "name": "1032662",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032662" "url": "http://www.securitytracker.com/id/1032662"
},
{
"name": "http://www.wireshark.org/security/wnpa-sec-2015-19.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2015-19.html"
},
{
"name": "GLSA-201510-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201510-03"
},
{
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11153",
"refsource": "CONFIRM",
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11153"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-7075", "ID": "CVE-2015-7075",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -63,44 +63,44 @@
"url": "https://support.apple.com/HT205637" "url": "https://support.apple.com/HT205637"
}, },
{ {
"name" : "https://support.apple.com/HT205640", "name": "1034344",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://support.apple.com/HT205640" "url": "http://www.securitytracker.com/id/1034344"
},
{
"name" : "https://support.apple.com/HT205641",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205641"
},
{
"name" : "APPLE-SA-2015-12-08-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Dec/msg00000.html"
},
{
"name" : "APPLE-SA-2015-12-08-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Dec/msg00001.html"
},
{
"name" : "APPLE-SA-2015-12-08-3",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
}, },
{ {
"name": "APPLE-SA-2015-12-08-4", "name": "APPLE-SA-2015-12-08-4",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00002.html" "url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00002.html"
}, },
{
"name": "APPLE-SA-2015-12-08-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
},
{ {
"name": "78719", "name": "78719",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/78719" "url": "http://www.securityfocus.com/bid/78719"
}, },
{ {
"name" : "1034344", "name": "APPLE-SA-2015-12-08-1",
"refsource" : "SECTRACK", "refsource": "APPLE",
"url" : "http://www.securitytracker.com/id/1034344" "url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00000.html"
},
{
"name": "https://support.apple.com/HT205641",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205641"
},
{
"name": "https://support.apple.com/HT205640",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205640"
},
{
"name": "APPLE-SA-2015-12-08-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00001.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2015-7289", "ID": "CVE-2015-7289",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://xenbits.xen.org/xsa/advisory-155.html",
"refsource" : "CONFIRM",
"url" : "http://xenbits.xen.org/xsa/advisory-155.html"
},
{ {
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -68,44 +63,49 @@
"url": "http://www.debian.org/security/2016/dsa-3519" "url": "http://www.debian.org/security/2016/dsa-3519"
}, },
{ {
"name" : "DSA-3434", "name": "79592",
"refsource" : "DEBIAN", "refsource": "BID",
"url" : "http://www.debian.org/security/2016/dsa-3434" "url": "http://www.securityfocus.com/bid/79592"
}, },
{ {
"name" : "DSA-3471", "name": "http://xenbits.xen.org/xsa/advisory-155.html",
"refsource" : "DEBIAN", "refsource": "CONFIRM",
"url" : "http://www.debian.org/security/2016/dsa-3471" "url": "http://xenbits.xen.org/xsa/advisory-155.html"
},
{
"name" : "GLSA-201604-03",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201604-03"
}, },
{ {
"name": "SUSE-SU-2016:1764", "name": "SUSE-SU-2016:1764",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html"
}, },
{
"name" : "SUSE-SU-2016:0911",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html"
},
{ {
"name": "SUSE-SU-2016:1102", "name": "SUSE-SU-2016:1102",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html"
}, },
{
"name" : "79592",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/79592"
},
{ {
"name": "1034479", "name": "1034479",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034479" "url": "http://www.securitytracker.com/id/1034479"
},
{
"name": "GLSA-201604-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201604-03"
},
{
"name": "DSA-3471",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3471"
},
{
"name": "DSA-3434",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3434"
},
{
"name": "SUSE-SU-2016:0911",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-8588", "ID": "CVE-2015-8588",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.wireshark.org/security/wnpa-sec-2015-33.html", "name": "DSA-3505",
"refsource" : "CONFIRM", "refsource": "DEBIAN",
"url" : "http://www.wireshark.org/security/wnpa-sec-2015-33.html" "url": "http://www.debian.org/security/2016/dsa-3505"
},
{
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11610",
"refsource" : "CONFIRM",
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11610"
}, },
{ {
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=d34267d0503a67235bf259fd2f2f2d2bb8b18cf5", "name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=d34267d0503a67235bf259fd2f2f2d2bb8b18cf5",
@ -68,14 +63,19 @@
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=d34267d0503a67235bf259fd2f2f2d2bb8b18cf5" "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=d34267d0503a67235bf259fd2f2f2d2bb8b18cf5"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11610",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11610"
}, },
{ {
"name" : "DSA-3505", "name": "79816",
"refsource" : "DEBIAN", "refsource": "BID",
"url" : "http://www.debian.org/security/2016/dsa-3505" "url": "http://www.securityfocus.com/bid/79816"
},
{
"name": "http://www.wireshark.org/security/wnpa-sec-2015-33.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2015-33.html"
}, },
{ {
"name": "GLSA-201604-05", "name": "GLSA-201604-05",
@ -83,9 +83,9 @@
"url": "https://security.gentoo.org/glsa/201604-05" "url": "https://security.gentoo.org/glsa/201604-05"
}, },
{ {
"name" : "79816", "name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/79816" "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
}, },
{ {
"name": "1034551", "name": "1034551",

View File

@ -56,11 +56,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.fortiguard.com/zeroday/FG-VD-15-103",
"refsource" : "MISC",
"url" : "http://www.fortiguard.com/zeroday/FG-VD-15-103"
},
{ {
"name": "http://www.fortiguard.com/zeroday/FG-VD-15-104", "name": "http://www.fortiguard.com/zeroday/FG-VD-15-104",
"refsource": "MISC", "refsource": "MISC",
@ -80,6 +75,11 @@
"name": "https://www.synology.com/en-global/support/security/Photo_Station_6_3_2962", "name": "https://www.synology.com/en-global/support/security/Photo_Station_6_3_2962",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.synology.com/en-global/support/security/Photo_Station_6_3_2962" "url": "https://www.synology.com/en-global/support/security/Photo_Station_6_3_2962"
},
{
"name": "http://www.fortiguard.com/zeroday/FG-VD-15-103",
"refsource": "MISC",
"url": "http://www.fortiguard.com/zeroday/FG-VD-15-103"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-1076", "ID": "CVE-2016-1076",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1035828",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035828"
},
{ {
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-324", "name": "http://www.zerodayinitiative.com/advisories/ZDI-16-324",
"refsource": "MISC", "refsource": "MISC",
@ -61,11 +66,6 @@
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html", "name": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html" "url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
},
{
"name" : "1035828",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035828"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2016-1808", "ID": "CVE-2016-1808",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://support.apple.com/HT206564", "name": "https://support.apple.com/HT206567",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://support.apple.com/HT206564" "url": "https://support.apple.com/HT206567"
},
{
"name": "APPLE-SA-2016-05-16-4",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html"
}, },
{ {
"name": "https://support.apple.com/HT206566", "name": "https://support.apple.com/HT206566",
@ -63,9 +68,29 @@
"url": "https://support.apple.com/HT206566" "url": "https://support.apple.com/HT206566"
}, },
{ {
"name" : "https://support.apple.com/HT206567", "name": "90694",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/90694"
},
{
"name": "APPLE-SA-2016-05-16-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/May/msg00003.html"
},
{
"name": "https://support.apple.com/HT206564",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://support.apple.com/HT206567" "url": "https://support.apple.com/HT206564"
},
{
"name": "1035890",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035890"
},
{
"name": "APPLE-SA-2016-05-16-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html"
}, },
{ {
"name": "https://support.apple.com/HT206568", "name": "https://support.apple.com/HT206568",
@ -76,31 +101,6 @@
"name": "APPLE-SA-2016-05-16-1", "name": "APPLE-SA-2016-05-16-1",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/May/msg00001.html" "url": "http://lists.apple.com/archives/security-announce/2016/May/msg00001.html"
},
{
"name" : "APPLE-SA-2016-05-16-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html"
},
{
"name" : "APPLE-SA-2016-05-16-3",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/May/msg00003.html"
},
{
"name" : "APPLE-SA-2016-05-16-4",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html"
},
{
"name" : "90694",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/90694"
},
{
"name" : "1035890",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035890"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2016-5273", "ID": "CVE-2016-5273",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,26 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2016/mfsa2016-85.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2016/mfsa2016-85.html"
},
{ {
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1280387", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1280387",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1280387" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1280387"
}, },
{ {
"name" : "GLSA-201701-15", "name": "http://www.mozilla.org/security/announce/2016/mfsa2016-85.html",
"refsource" : "GENTOO", "refsource": "CONFIRM",
"url" : "https://security.gentoo.org/glsa/201701-15" "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-85.html"
}, },
{ {
"name": "93052", "name": "93052",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/93052" "url": "http://www.securityfocus.com/bid/93052"
}, },
{
"name": "GLSA-201701-15",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-15"
},
{ {
"name": "1036852", "name": "1036852",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@microfocus.com", "ASSIGNER": "security@suse.com",
"ID": "CVE-2016-5765", "ID": "CVE-2016-5765",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-16-618",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-16-618"
},
{ {
"name": "http://support.attachmate.com/techdocs/1704.html", "name": "http://support.attachmate.com/techdocs/1704.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.attachmate.com/techdocs/1704.html" "url": "http://support.attachmate.com/techdocs/1704.html"
}, },
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-618",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-618"
},
{ {
"name": "94579", "name": "94579",
"refsource": "BID", "refsource": "BID",

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-2205", "ID": "CVE-2018-2205",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -54,20 +54,30 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", "name": "1040698",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" "url": "http://www.securitytracker.com/id/1040698"
}, },
{ {
"name": "https://security.netapp.com/advisory/ntap-20180419-0002/", "name": "https://security.netapp.com/advisory/ntap-20180419-0002/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180419-0002/" "url": "https://security.netapp.com/advisory/ntap-20180419-0002/"
}, },
{
"name": "103785",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103785"
},
{ {
"name": "RHSA-2018:3655", "name": "RHSA-2018:3655",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3655" "url": "https://access.redhat.com/errata/RHSA-2018:3655"
}, },
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
},
{ {
"name": "USN-3629-1", "name": "USN-3629-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
@ -77,16 +87,6 @@
"name": "USN-3629-3", "name": "USN-3629-3",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3629-3/" "url": "https://usn.ubuntu.com/3629-3/"
},
{
"name" : "103785",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/103785"
},
{
"name" : "1040698",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1040698"
} }
] ]
} }

View File

@ -98,15 +98,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
}, },
{
"name" : "104778",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/104778"
},
{ {
"name": "1041307", "name": "1041307",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041307" "url": "http://www.securitytracker.com/id/1041307"
},
{
"name": "104778",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104778"
} }
] ]
} }

View File

@ -79,25 +79,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://www.vmware.com/security/advisories/VMSA-2018-0026.html",
"refsource" : "CONFIRM",
"url" : "https://www.vmware.com/security/advisories/VMSA-2018-0026.html"
},
{ {
"name": "105660", "name": "105660",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/105660" "url": "http://www.securityfocus.com/bid/105660"
}, },
{
"name": "1041876",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041876"
},
{ {
"name": "1041875", "name": "1041875",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041875" "url": "http://www.securitytracker.com/id/1041875"
}, },
{ {
"name" : "1041876", "name": "https://www.vmware.com/security/advisories/VMSA-2018-0026.html",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1041876" "url": "https://www.vmware.com/security/advisories/VMSA-2018-0026.html"
} }
] ]
} }