"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 03:30:31 +00:00
parent fa647f1506
commit cc78435c9e
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
65 changed files with 4256 additions and 4256 deletions

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2007-2240", "ID": "CVE-2007-2240",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,26 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&lndocid=MIGR-67649",
"refsource" : "CONFIRM",
"url" : "http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&lndocid=MIGR-67649"
},
{
"name" : "MS07-045",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-045"
},
{
"name" : "VU#570705",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/570705"
},
{
"name" : "25311",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25311"
},
{ {
"name": "ADV-2007-2882", "name": "ADV-2007-2882",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -82,6 +62,16 @@
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/39555" "url": "http://osvdb.org/39555"
}, },
{
"name": "http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&lndocid=MIGR-67649",
"refsource": "CONFIRM",
"url": "http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&lndocid=MIGR-67649"
},
{
"name": "MS07-045",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-045"
},
{ {
"name": "26482", "name": "26482",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -91,6 +81,16 @@
"name": "ibm-lenovo-acprunner-code-execution(36028)", "name": "ibm-lenovo-acprunner-code-execution(36028)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36028" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36028"
},
{
"name": "25311",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25311"
},
{
"name": "VU#570705",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/570705"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070414 Pixaria Gallery 1.0 (class.Smarty.php) Remote File Include Vulnerability", "name": "http://www.pixaria.com/news/article/71/",
"refsource" : "BUGTRAQ", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/archive/1/465847/100/200/threaded" "url": "http://www.pixaria.com/news/article/71/"
}, },
{ {
"name": "3733", "name": "3733",
@ -63,24 +63,9 @@
"url": "https://www.exploit-db.com/exploits/3733" "url": "https://www.exploit-db.com/exploits/3733"
}, },
{ {
"name" : "http://pixaria.com/index.history.php", "name": "20070414 Pixaria Gallery 1.0 (class.Smarty.php) Remote File Include Vulnerability",
"refsource" : "CONFIRM", "refsource": "BUGTRAQ",
"url" : "http://pixaria.com/index.history.php" "url": "http://www.securityfocus.com/archive/1/465847/100/200/threaded"
},
{
"name" : "http://www.pixaria.com/news/article/70/",
"refsource" : "CONFIRM",
"url" : "http://www.pixaria.com/news/article/70/"
},
{
"name" : "http://www.pixaria.com/news/article/71/",
"refsource" : "CONFIRM",
"url" : "http://www.pixaria.com/news/article/71/"
},
{
"name" : "23489",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23489"
}, },
{ {
"name": "ADV-2007-1390", "name": "ADV-2007-1390",
@ -88,9 +73,19 @@
"url": "http://www.vupen.com/english/advisories/2007/1390" "url": "http://www.vupen.com/english/advisories/2007/1390"
}, },
{ {
"name" : "34976", "name": "pixaria-classsmarty-file-include(33662)",
"refsource" : "OSVDB", "refsource": "XF",
"url" : "http://osvdb.org/34976" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33662"
},
{
"name": "23489",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23489"
},
{
"name": "http://www.pixaria.com/news/article/70/",
"refsource": "CONFIRM",
"url": "http://www.pixaria.com/news/article/70/"
}, },
{ {
"name": "24821", "name": "24821",
@ -98,9 +93,14 @@
"url": "http://secunia.com/advisories/24821" "url": "http://secunia.com/advisories/24821"
}, },
{ {
"name" : "pixaria-classsmarty-file-include(33662)", "name": "http://pixaria.com/index.history.php",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33662" "url": "http://pixaria.com/index.history.php"
},
{
"name": "34976",
"refsource": "OSVDB",
"url": "http://osvdb.org/34976"
} }
] ]
} }

View File

@ -53,25 +53,25 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://sourceforge.net/project/shownotes.php?release_id=516776", "name": "25709",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://sourceforge.net/project/shownotes.php?release_id=516776" "url": "http://secunia.com/advisories/25709"
}, },
{ {
"name": "24508", "name": "24508",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/24508" "url": "http://www.securityfocus.com/bid/24508"
}, },
{
"name": "http://sourceforge.net/project/shownotes.php?release_id=516776",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?release_id=516776"
},
{ {
"name": "37514", "name": "37514",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/37514" "url": "http://osvdb.org/37514"
}, },
{
"name" : "25709",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25709"
},
{ {
"name": "wikindx-localization-security-bypass(34922)", "name": "wikindx-localization-security-bypass(34922)",
"refsource": "XF", "refsource": "XF",

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070907 FLEA-2007-0052-1 gd", "name": "37741",
"refsource" : "BUGTRAQ", "refsource": "OSVDB",
"url" : "http://www.securityfocus.com/archive/1/478796/100/0/threaded" "url": "http://osvdb.org/37741"
},
{
"name" : "http://www.libgd.org/ReleaseNote020035",
"refsource" : "MISC",
"url" : "http://www.libgd.org/ReleaseNote020035"
}, },
{ {
"name": "http://bugs.libgd.org/?do=details&task_id=87", "name": "http://bugs.libgd.org/?do=details&task_id=87",
@ -68,9 +63,39 @@
"url": "http://bugs.libgd.org/?do=details&task_id=87" "url": "http://bugs.libgd.org/?do=details&task_id=87"
}, },
{ {
"name" : "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz", "name": "2007-0024",
"refsource" : "CONFIRM", "refsource": "TRUSTIX",
"url" : "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz" "url": "http://www.trustix.org/errata/2007/0024/"
},
{
"name": "MDKSA-2007:164",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
},
{
"name": "29157",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29157"
},
{
"name": "DSA-1613",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1613"
},
{
"name": "oval:org.mitre.oval:def:10348",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10348"
},
{
"name": "http://www.libgd.org/ReleaseNote020035",
"refsource": "MISC",
"url": "http://www.libgd.org/ReleaseNote020035"
},
{
"name": "26415",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26415"
}, },
{ {
"name": "https://issues.rpath.com/browse/RPL-1643", "name": "https://issues.rpath.com/browse/RPL-1643",
@ -82,136 +107,21 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421"
}, },
{
"name" : "DSA-1613",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1613"
},
{
"name" : "FEDORA-2007-2055",
"refsource" : "FEDORA",
"url" : "http://fedoranews.org/updates/FEDORA-2007-205.shtml"
},
{
"name" : "FEDORA-2007-692",
"refsource" : "FEDORA",
"url" : "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"
},
{
"name" : "FEDORA-2010-19022",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"
},
{
"name" : "FEDORA-2010-19033",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"
},
{
"name" : "GLSA-200708-05",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200708-05.xml"
},
{
"name" : "GLSA-200711-34",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200711-34.xml"
},
{ {
"name": "GLSA-200805-13", "name": "GLSA-200805-13",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200805-13.xml" "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
}, },
{ {
"name" : "MDKSA-2007:153", "name": "20070907 FLEA-2007-0052-1 gd",
"refsource" : "MANDRIVA", "refsource": "BUGTRAQ",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153" "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded"
},
{
"name" : "MDKSA-2007:164",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
},
{
"name" : "RHSA-2008:0146",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0146.html"
},
{
"name" : "SUSE-SR:2007:015",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
},
{
"name" : "2007-0024",
"refsource" : "TRUSTIX",
"url" : "http://www.trustix.org/errata/2007/0024/"
},
{
"name" : "24651",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24651"
},
{
"name" : "37741",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/37741"
},
{
"name" : "oval:org.mitre.oval:def:10348",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10348"
},
{
"name" : "25860",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25860"
},
{
"name" : "26272",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26272"
},
{
"name" : "26390",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26390"
},
{
"name" : "26415",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26415"
}, },
{ {
"name": "26467", "name": "26467",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26467" "url": "http://secunia.com/advisories/26467"
}, },
{
"name" : "26663",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26663"
},
{
"name" : "26766",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26766"
},
{
"name" : "26856",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26856"
},
{
"name" : "29157",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29157"
},
{
"name" : "30168",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30168"
},
{ {
"name": "31168", "name": "31168",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -222,10 +132,100 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42813" "url": "http://secunia.com/advisories/42813"
}, },
{
"name": "GLSA-200708-05",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200708-05.xml"
},
{
"name": "30168",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30168"
},
{
"name": "FEDORA-2007-692",
"refsource": "FEDORA",
"url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"
},
{ {
"name": "ADV-2011-0022", "name": "ADV-2011-0022",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0022" "url": "http://www.vupen.com/english/advisories/2011/0022"
},
{
"name": "25860",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25860"
},
{
"name": "26663",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26663"
},
{
"name": "FEDORA-2010-19033",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"
},
{
"name": "26856",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26856"
},
{
"name": "26272",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26272"
},
{
"name": "GLSA-200711-34",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
},
{
"name": "RHSA-2008:0146",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html"
},
{
"name": "FEDORA-2010-19022",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"
},
{
"name": "24651",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24651"
},
{
"name": "MDKSA-2007:153",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"
},
{
"name": "26766",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26766"
},
{
"name": "26390",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26390"
},
{
"name": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz",
"refsource": "CONFIRM",
"url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"
},
{
"name": "SUSE-SR:2007:015",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
},
{
"name": "FEDORA-2007-2055",
"refsource": "FEDORA",
"url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070702 High Risk Flaw in Sun's Java Web Start", "name": "ADV-2007-2384",
"refsource" : "BUGTRAQ", "refsource": "VUPEN",
"url" : "http://www.securityfocus.com/archive/1/472673/100/0/threaded" "url": "http://www.vupen.com/english/advisories/2007/2384"
}, },
{ {
"name": "http://docs.info.apple.com/article.html?artnum=307177", "name": "http://docs.info.apple.com/article.html?artnum=307177",
@ -63,19 +63,9 @@
"url": "http://docs.info.apple.com/article.html?artnum=307177" "url": "http://docs.info.apple.com/article.html?artnum=307177"
}, },
{ {
"name" : "APPLE-SA-2007-12-14", "name": "1018328",
"refsource" : "APPLE", "refsource": "SECTRACK",
"url" : "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html" "url": "http://www.securitytracker.com/id?1018328"
},
{
"name" : "102957",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102957-1"
},
{
"name" : "24695",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24695"
}, },
{ {
"name": "37755", "name": "37755",
@ -83,34 +73,44 @@
"url": "http://osvdb.org/37755" "url": "http://osvdb.org/37755"
}, },
{ {
"name" : "ADV-2007-2384", "name": "javaweb-javapolicy-code-execution(35169)",
"refsource" : "VUPEN", "refsource": "XF",
"url" : "http://www.vupen.com/english/advisories/2007/2384" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35169"
},
{
"name": "APPLE-SA-2007-12-14",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html"
}, },
{ {
"name": "ADV-2007-4224", "name": "ADV-2007-4224",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/4224" "url": "http://www.vupen.com/english/advisories/2007/4224"
}, },
{
"name" : "1018328",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018328"
},
{ {
"name": "25823", "name": "25823",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25823" "url": "http://secunia.com/advisories/25823"
}, },
{
"name": "102957",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102957-1"
},
{ {
"name": "28115", "name": "28115",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28115" "url": "http://secunia.com/advisories/28115"
}, },
{ {
"name" : "javaweb-javapolicy-code-execution(35169)", "name": "20070702 High Risk Flaw in Sun's Java Web Start",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35169" "url": "http://www.securityfocus.com/archive/1/472673/100/0/threaded"
},
{
"name": "24695",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24695"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "MA28921", "name": "25885",
"refsource" : "AIXAPAR", "refsource": "SECUNIA",
"url" : "http://www-1.ibm.com/support/docview.wss?uid=nas2742405285431729b86256e620067dc17" "url": "http://secunia.com/advisories/25885"
},
{
"name" : "24706",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24706"
}, },
{ {
"name": "37792", "name": "37792",
@ -68,14 +63,19 @@
"url": "http://osvdb.org/37792" "url": "http://osvdb.org/37792"
}, },
{ {
"name" : "25885", "name": "MA28921",
"refsource" : "SECUNIA", "refsource": "AIXAPAR",
"url" : "http://secunia.com/advisories/25885" "url": "http://www-1.ibm.com/support/docview.wss?uid=nas2742405285431729b86256e620067dc17"
}, },
{ {
"name": "os400-tcpsyn-security-bypass(35173)", "name": "os400-tcpsyn-security-bypass(35173)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35173" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35173"
},
{
"name": "24706",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24706"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2007-3893", "ID": "CVE-2007-3893",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "oval:org.mitre.oval:def:2284",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2284"
},
{ {
"name": "HPSBST02280", "name": "HPSBST02280",
"refsource": "HP", "refsource": "HP",
@ -62,6 +67,21 @@
"refsource": "HP", "refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/482366/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/482366/100/0/threaded"
}, },
{
"name": "ADV-2007-3437",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3437"
},
{
"name": "1018788",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1018788"
},
{
"name": "23469",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23469"
},
{ {
"name": "MS07-057", "name": "MS07-057",
"refsource": "MS", "refsource": "MS",
@ -76,26 +96,6 @@
"name": "25916", "name": "25916",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/25916" "url": "http://www.securityfocus.com/bid/25916"
},
{
"name" : "ADV-2007-3437",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3437"
},
{
"name" : "oval:org.mitre.oval:def:2284",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2284"
},
{
"name" : "1018788",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1018788"
},
{
"name" : "23469",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23469"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "26214",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26214"
},
{ {
"name": "http://www.justinsamuel.com/2007/06/10/awbs-dedicated-server-info-visible-to-all-users-vulnerability/", "name": "http://www.justinsamuel.com/2007/06/10/awbs-dedicated-server-info-visible-to-all-users-vulnerability/",
"refsource": "MISC", "refsource": "MISC",
@ -66,11 +71,6 @@
"name": "38690", "name": "38690",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/38690" "url": "http://osvdb.org/38690"
},
{
"name" : "26214",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26214"
} }
] ]
} }

View File

@ -53,24 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070730 Security Testing Enterprise Messaging Systems", "name": "37680",
"refsource" : "FULLDISC", "refsource": "OSVDB",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2007-07/0620.html" "url": "http://osvdb.org/37680"
},
{
"name" : "http://www.irmplc.com/content/pdfs/Security_Testing_Enterprise_Messaging_Systems.pdf",
"refsource" : "MISC",
"url" : "http://www.irmplc.com/content/pdfs/Security_Testing_Enterprise_Messaging_Systems.pdf"
},
{
"name" : "http://www.irmplc.com/index.php/111-Vendor-Alerts",
"refsource" : "MISC",
"url" : "http://www.irmplc.com/index.php/111-Vendor-Alerts"
},
{
"name" : "http://www.irmplc.com/index.php/160-Advisory-025",
"refsource" : "MISC",
"url" : "http://www.irmplc.com/index.php/160-Advisory-025"
}, },
{ {
"name": "20071203 CVE-2007-4158 == CVE-2007-5553?", "name": "20071203 CVE-2007-4158 == CVE-2007-5553?",
@ -78,29 +63,44 @@
"url": "http://www.attrition.org/pipermail/vim/2007-December/001855.html" "url": "http://www.attrition.org/pipermail/vim/2007-December/001855.html"
}, },
{ {
"name" : "25132", "name": "http://www.irmplc.com/index.php/111-Vendor-Alerts",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/25132" "url": "http://www.irmplc.com/index.php/111-Vendor-Alerts"
},
{
"name" : "ADV-2007-2814",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2814"
},
{
"name" : "37680",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/37680"
}, },
{ {
"name": "1018512", "name": "1018512",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018512" "url": "http://www.securitytracker.com/id?1018512"
}, },
{
"name": "20070730 Security Testing Enterprise Messaging Systems",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-07/0620.html"
},
{
"name": "25132",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25132"
},
{
"name": "http://www.irmplc.com/content/pdfs/Security_Testing_Enterprise_Messaging_Systems.pdf",
"refsource": "MISC",
"url": "http://www.irmplc.com/content/pdfs/Security_Testing_Enterprise_Messaging_Systems.pdf"
},
{
"name": "http://www.irmplc.com/index.php/160-Advisory-025",
"refsource": "MISC",
"url": "http://www.irmplc.com/index.php/160-Advisory-025"
},
{ {
"name": "26337", "name": "26337",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26337" "url": "http://secunia.com/advisories/26337"
},
{
"name": "ADV-2007-2814",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2814"
} }
] ]
} }

View File

@ -57,6 +57,11 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/476274/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/476274/100/0/threaded"
}, },
{
"name": "phpcentrallogin-include-file-include(35980)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35980"
},
{ {
"name": "20070814 Re: PHPCentral Login Script Remote Command Execution Vulnerability", "name": "20070814 Re: PHPCentral Login Script Remote Command Execution Vulnerability",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -76,11 +81,6 @@
"name": "3005", "name": "3005",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3005" "url": "http://securityreason.com/securityalert/3005"
},
{
"name" : "phpcentrallogin-include-file-include(35980)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35980"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "4637",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4637"
},
{ {
"name": "26505", "name": "26505",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/26505" "url": "http://www.securityfocus.com/bid/26505"
}, },
{
"name": "4637",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4637"
},
{ {
"name": "ADV-2007-3962", "name": "ADV-2007-3962",
"refsource": "VUPEN", "refsource": "VUPEN",

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20071217 Uber Uploader <= 5.3.6 Remote File Upload Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/485235/100/100/threaded"
},
{ {
"name": "20071218 Re: Uber Uploader <= 5.3.6 Remote File Upload Vulnerability", "name": "20071218 Re: Uber Uploader <= 5.3.6 Remote File Upload Vulnerability",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/485290/100/100/threaded" "url": "http://www.securityfocus.com/archive/1/485290/100/100/threaded"
}, },
{ {
"name" : "43535", "name": "20071217 Uber Uploader <= 5.3.6 Remote File Upload Vulnerability",
"refsource" : "OSVDB", "refsource": "BUGTRAQ",
"url" : "http://osvdb.org/43535" "url": "http://www.securityfocus.com/archive/1/485235/100/100/threaded"
}, },
{ {
"name": "3519", "name": "3519",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3519" "url": "http://securityreason.com/securityalert/3519"
},
{
"name": "43535",
"refsource": "OSVDB",
"url": "http://osvdb.org/43535"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "IZ12119",
"refsource" : "AIXAPAR",
"url" : "http://www-1.ibm.com/support/docview.wss?uid=isg1IZ12119"
},
{ {
"name": "27177", "name": "27177",
"refsource": "BID", "refsource": "BID",
@ -76,6 +71,11 @@
"name": "28257", "name": "28257",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28257" "url": "http://secunia.com/advisories/28257"
},
{
"name": "IZ12119",
"refsource": "AIXAPAR",
"url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IZ12119"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20100323 Safari browser port blocking bypassed by integer overflow",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/510283/100/0/threaded"
},
{ {
"name": "omniweb-tcp-security-bypass(57236)", "name": "omniweb-tcp-security-bypass(57236)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57236" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57236"
},
{
"name": "20100323 Safari browser port blocking bypassed by integer overflow",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/510283/100/0/threaded"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "comnewsfeeds-feedid-sql-injection(58263)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58263"
},
{ {
"name": "http://packetstormsecurity.org/1004-exploits/joomlanewsfeeds-sql.txt", "name": "http://packetstormsecurity.org/1004-exploits/joomlanewsfeeds-sql.txt",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.org/1004-exploits/joomlanewsfeeds-sql.txt" "url": "http://packetstormsecurity.org/1004-exploits/joomlanewsfeeds-sql.txt"
}, },
{
"name" : "12465",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/12465"
},
{ {
"name": "39834", "name": "39834",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/39834" "url": "http://www.securityfocus.com/bid/39834"
}, },
{ {
"name" : "comnewsfeeds-feedid-sql-injection(58263)", "name": "12465",
"refsource" : "XF", "refsource": "EXPLOIT-DB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/58263" "url": "http://www.exploit-db.com/exploits/12465"
} }
] ]
} }

View File

@ -57,45 +57,45 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html" "url": "http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html"
}, },
{
"name" : "20100505 KHOBE - 8.0 earthquake for Windows desktop security software",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html"
},
{ {
"name": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/", "name": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/",
"refsource": "MISC", "refsource": "MISC",
"url": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/" "url": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/"
}, },
{
"name" : "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php",
"refsource" : "MISC",
"url" : "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
},
{
"name" : "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php",
"refsource" : "MISC",
"url" : "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
},
{
"name" : "http://www.f-secure.com/weblog/archives/00001949.html",
"refsource" : "MISC",
"url" : "http://www.f-secure.com/weblog/archives/00001949.html"
},
{
"name" : "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/",
"refsource" : "MISC",
"url" : "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/"
},
{ {
"name": "39924", "name": "39924",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/39924" "url": "http://www.securityfocus.com/bid/39924"
}, },
{
"name": "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php",
"refsource": "MISC",
"url": "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
},
{
"name": "20100505 KHOBE - 8.0 earthquake for Windows desktop security software",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html"
},
{ {
"name": "67660", "name": "67660",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/67660" "url": "http://www.osvdb.org/67660"
},
{
"name": "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/",
"refsource": "MISC",
"url": "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/"
},
{
"name": "http://www.f-secure.com/weblog/archives/00001949.html",
"refsource": "MISC",
"url": "http://www.f-secure.com/weblog/archives/00001949.html"
},
{
"name": "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php",
"refsource": "MISC",
"url": "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
} }
] ]
} }

View File

@ -57,40 +57,40 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html" "url": "http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html"
}, },
{
"name" : "20100505 KHOBE - 8.0 earthquake for Windows desktop security software",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html"
},
{ {
"name": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/", "name": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/",
"refsource": "MISC", "refsource": "MISC",
"url": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/" "url": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/"
}, },
{
"name" : "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php",
"refsource" : "MISC",
"url" : "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
},
{
"name" : "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php",
"refsource" : "MISC",
"url" : "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
},
{ {
"name": "http://nakedsecurity.sophos.com/2010/05/11/khobe-vulnerability-earth-shaker/", "name": "http://nakedsecurity.sophos.com/2010/05/11/khobe-vulnerability-earth-shaker/",
"refsource": "MISC", "refsource": "MISC",
"url": "http://nakedsecurity.sophos.com/2010/05/11/khobe-vulnerability-earth-shaker/" "url": "http://nakedsecurity.sophos.com/2010/05/11/khobe-vulnerability-earth-shaker/"
}, },
{
"name": "39924",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/39924"
},
{
"name": "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php",
"refsource": "MISC",
"url": "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
},
{ {
"name": "http://nakedsecurity.sophos.com/2010/05/11/khobe-vulnerability-game-security-software/", "name": "http://nakedsecurity.sophos.com/2010/05/11/khobe-vulnerability-game-security-software/",
"refsource": "MISC", "refsource": "MISC",
"url": "http://nakedsecurity.sophos.com/2010/05/11/khobe-vulnerability-game-security-software/" "url": "http://nakedsecurity.sophos.com/2010/05/11/khobe-vulnerability-game-security-software/"
}, },
{ {
"name" : "http://www.f-secure.com/weblog/archives/00001949.html", "name": "20100505 KHOBE - 8.0 earthquake for Windows desktop security software",
"refsource" : "MISC", "refsource": "FULLDISC",
"url" : "http://www.f-secure.com/weblog/archives/00001949.html" "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html"
},
{
"name": "67660",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/67660"
}, },
{ {
"name": "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/", "name": "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/",
@ -98,14 +98,14 @@
"url": "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/" "url": "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/"
}, },
{ {
"name" : "39924", "name": "http://www.f-secure.com/weblog/archives/00001949.html",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/39924" "url": "http://www.f-secure.com/weblog/archives/00001949.html"
}, },
{ {
"name" : "67660", "name": "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php",
"refsource" : "OSVDB", "refsource": "MISC",
"url" : "http://www.osvdb.org/67660" "url": "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-0025", "ID": "CVE-2014-0025",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-0740", "ID": "CVE-2014-0740",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2014-1242", "ID": "CVE-2014-1242",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.apple.com/kb/HT6001",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT6001"
},
{ {
"name": "65088", "name": "65088",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/65088" "url": "http://www.securityfocus.com/bid/65088"
}, },
{
"name": "1029671",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029671"
},
{ {
"name": "102410", "name": "102410",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/102410" "url": "http://osvdb.org/102410"
}, },
{ {
"name" : "1029671", "name": "http://support.apple.com/kb/HT6001",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1029671" "url": "http://support.apple.com/kb/HT6001"
}, },
{ {
"name": "apple-itunes-cve20141242-mitm(90653)", "name": "apple-itunes-cve20141242-mitm(90653)",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2014-1319", "ID": "CVE-2014-1319",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-1431", "ID": "CVE-2014-1431",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2014-1567", "ID": "CVE-2014-1567",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "openSUSE-SU-2015:0138",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"
},
{ {
"name": "http://www.mozilla.org/security/announce/2014/mfsa2014-72.html", "name": "http://www.mozilla.org/security/announce/2014/mfsa2014-72.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -62,6 +67,21 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1037641" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1037641"
}, },
{
"name": "SUSE-SU-2014:1112",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00007.html"
},
{
"name": "69520",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/69520"
},
{
"name": "GLSA-201504-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201504-01"
},
{ {
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -73,84 +93,64 @@
"url": "http://www.debian.org/security/2014/dsa-3018" "url": "http://www.debian.org/security/2014/dsa-3018"
}, },
{ {
"name" : "DSA-3028", "name": "1030794",
"refsource" : "DEBIAN", "refsource": "SECTRACK",
"url" : "http://www.debian.org/security/2014/dsa-3028" "url": "http://www.securitytracker.com/id/1030794"
},
{
"name" : "GLSA-201504-01",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201504-01"
},
{
"name" : "SUSE-SU-2014:1107",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00005.html"
},
{
"name" : "SUSE-SU-2014:1112",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00007.html"
}, },
{ {
"name": "SUSE-SU-2014:1120", "name": "SUSE-SU-2014:1120",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00012.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00012.html"
}, },
{
"name" : "openSUSE-SU-2014:1098",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html"
},
{
"name" : "openSUSE-SU-2014:1099",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html"
},
{
"name" : "openSUSE-SU-2015:0138",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"
},
{ {
"name": "openSUSE-SU-2015:1266", "name": "openSUSE-SU-2015:1266",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"
}, },
{
"name" : "69520",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/69520"
},
{
"name" : "1030793",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030793"
},
{
"name" : "1030794",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030794"
},
{
"name" : "60148",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/60148"
},
{ {
"name": "60186", "name": "60186",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60186" "url": "http://secunia.com/advisories/60186"
}, },
{
"name": "61390",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61390"
},
{
"name": "openSUSE-SU-2014:1098",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html"
},
{
"name": "60148",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60148"
},
{
"name": "openSUSE-SU-2014:1099",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html"
},
{ {
"name": "61114", "name": "61114",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61114" "url": "http://secunia.com/advisories/61114"
}, },
{ {
"name" : "61390", "name": "DSA-3028",
"refsource" : "SECUNIA", "refsource": "DEBIAN",
"url" : "http://secunia.com/advisories/61390" "url": "http://www.debian.org/security/2014/dsa-3028"
},
{
"name": "SUSE-SU-2014:1107",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00005.html"
},
{
"name": "1030793",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030793"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "69091",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/69091"
},
{ {
"name": "https://www.drupal.org/node/2316717", "name": "https://www.drupal.org/node/2316717",
"refsource": "MISC", "refsource": "MISC",
"url": "https://www.drupal.org/node/2316717" "url": "https://www.drupal.org/node/2316717"
}, },
{
"name" : "https://www.drupal.org/node/2316023",
"refsource" : "CONFIRM",
"url" : "https://www.drupal.org/node/2316023"
},
{ {
"name": "https://www.drupal.org/node/2316025", "name": "https://www.drupal.org/node/2316025",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.drupal.org/node/2316025" "url": "https://www.drupal.org/node/2316025"
}, },
{ {
"name" : "69091", "name": "https://www.drupal.org/node/2316023",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/69091" "url": "https://www.drupal.org/node/2316023"
} }
] ]
} }

View File

@ -57,11 +57,6 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/533576/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/533576/100/0/threaded"
}, },
{
"name" : "http://packetstormsecurity.com/files/128484/Moab-User-Impersonation.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/128484/Moab-User-Impersonation.html"
},
{ {
"name": "http://www.adaptivecomputing.com/security-advisory/", "name": "http://www.adaptivecomputing.com/security-advisory/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -72,6 +67,11 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/70174" "url": "http://www.securityfocus.com/bid/70174"
}, },
{
"name": "http://packetstormsecurity.com/files/128484/Moab-User-Impersonation.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/128484/Moab-User-Impersonation.html"
},
{ {
"name": "moab-cve20145375-sec-bypass(96698)", "name": "moab-cve20145375-sec-bypass(96698)",
"refsource": "XF", "refsource": "XF",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2014-5424", "ID": "CVE-2014-5424",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://bugzilla.gnome.org/show_bug.cgi?id=713247",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.gnome.org/show_bug.cgi?id=713247"
},
{ {
"name": "https://git.gnome.org/browse/geary/commit/?h=geary-0.6&id=55f06a7bdcedb7efde6a516bde626ea28793ca7e", "name": "https://git.gnome.org/browse/geary/commit/?h=geary-0.6&id=55f06a7bdcedb7efde6a516bde626ea28793ca7e",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "openSUSE-SU-2014:1225", "name": "openSUSE-SU-2014:1225",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00035.html" "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00035.html"
},
{
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=713247",
"refsource": "CONFIRM",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=713247"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5731", "ID": "CVE-2014-5731",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#151121", "name": "VU#151121",
"refsource": "CERT-VN", "refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497", "name": "VU#582497",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5915", "ID": "CVE-2014-5915",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#179897", "name": "VU#179897",
"refsource": "CERT-VN", "refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497", "name": "VU#582497",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2015-2002", "ID": "CVE-2015-2002",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://alephsecurity.com/vulns/aleph-2015003",
"refsource" : "MISC",
"url" : "https://alephsecurity.com/vulns/aleph-2015003"
},
{ {
"name": "https://www.usenix.org/system/files/conference/woot15/woot15-paper-peles.pdf", "name": "https://www.usenix.org/system/files/conference/woot15/woot15-paper-peles.pdf",
"refsource": "MISC", "refsource": "MISC",
"url": "https://www.usenix.org/system/files/conference/woot15/woot15-paper-peles.pdf" "url": "https://www.usenix.org/system/files/conference/woot15/woot15-paper-peles.pdf"
},
{
"name": "https://alephsecurity.com/vulns/aleph-2015003",
"refsource": "MISC",
"url": "https://alephsecurity.com/vulns/aleph-2015003"
} }
] ]
} }

View File

@ -52,31 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20150314 CVE Request for python-requests session fixation vulnerability",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/03/14/4"
},
{ {
"name": "[oss-security] 20150314 Re: CVE Request for python-requests session fixation vulnerability", "name": "[oss-security] 20150314 Re: CVE Request for python-requests session fixation vulnerability",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/03/15/1" "url": "http://www.openwall.com/lists/oss-security/2015/03/15/1"
}, },
{
"name" : "https://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b2f688785a669b9aafc",
"refsource" : "CONFIRM",
"url" : "https://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b2f688785a669b9aafc"
},
{
"name" : "https://warehouse.python.org/project/requests/2.6.0/",
"refsource" : "CONFIRM",
"url" : "https://warehouse.python.org/project/requests/2.6.0/"
},
{
"name" : "http://advisories.mageia.org/MGASA-2015-0120.html",
"refsource" : "CONFIRM",
"url" : "http://advisories.mageia.org/MGASA-2015-0120.html"
},
{ {
"name": "FEDORA-2015-4084", "name": "FEDORA-2015-4084",
"refsource": "FEDORA", "refsource": "FEDORA",
@ -87,10 +67,30 @@
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:133" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:133"
}, },
{
"name": "[oss-security] 20150314 CVE Request for python-requests session fixation vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/03/14/4"
},
{ {
"name": "USN-2531-1", "name": "USN-2531-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2531-1" "url": "http://www.ubuntu.com/usn/USN-2531-1"
},
{
"name": "https://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b2f688785a669b9aafc",
"refsource": "CONFIRM",
"url": "https://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b2f688785a669b9aafc"
},
{
"name": "http://advisories.mageia.org/MGASA-2015-0120.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2015-0120.html"
},
{
"name": "https://warehouse.python.org/project/requests/2.6.0/",
"refsource": "CONFIRM",
"url": "https://warehouse.python.org/project/requests/2.6.0/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-2526", "ID": "CVE-2015-2526",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "MS15-101", "name": "1033493",
"refsource" : "MS", "refsource": "SECTRACK",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-101" "url": "http://www.securitytracker.com/id/1033493"
}, },
{ {
"name": "76567", "name": "76567",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/76567" "url": "http://www.securityfocus.com/bid/76567"
}, },
{ {
"name" : "1033493", "name": "MS15-101",
"refsource" : "SECTRACK", "refsource": "MS",
"url" : "http://www.securitytracker.com/id/1033493" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-101"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2015-2878", "ID": "CVE-2015-2878",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20150724 Hawkeye-G v3 CSRF Vulnerability ***[UPDATED CORRECTED]", "name": "37686",
"refsource" : "BUGTRAQ", "refsource": "EXPLOIT-DB",
"url" : "http://www.securityfocus.com/archive/1/536076/100/0/threaded" "url": "https://www.exploit-db.com/exploits/37686/"
}, },
{ {
"name": "20150724 Hawkeye-G v3.0.1.4912 CSRF Vulnerability CVE-2015-2878", "name": "20150724 Hawkeye-G v3.0.1.4912 CSRF Vulnerability CVE-2015-2878",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/archive/1/536074/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/536074/100/0/threaded"
}, },
{ {
"name" : "37686", "name": "20150724 Hawkeye-G v3 CSRF Vulnerability ***[UPDATED CORRECTED]",
"refsource" : "EXPLOIT-DB", "refsource": "BUGTRAQ",
"url" : "https://www.exploit-db.com/exploits/37686/" "url": "http://www.securityfocus.com/archive/1/536076/100/0/threaded"
} }
] ]
} }

View File

@ -58,9 +58,9 @@
"url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00015.html" "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00015.html"
}, },
{ {
"name" : "https://www.checkmarx.com/advisories/cross-site-scripting-xss-vulnerability-in-kohana/", "name": "https://github.com/kohana/kohana/releases/tag/v3.3.6",
"refsource" : "MISC", "refsource": "CONFIRM",
"url" : "https://www.checkmarx.com/advisories/cross-site-scripting-xss-vulnerability-in-kohana/" "url": "https://github.com/kohana/kohana/releases/tag/v3.3.6"
}, },
{ {
"name": "https://github.com/kohana/kohana/issues/107", "name": "https://github.com/kohana/kohana/issues/107",
@ -68,9 +68,9 @@
"url": "https://github.com/kohana/kohana/issues/107" "url": "https://github.com/kohana/kohana/issues/107"
}, },
{ {
"name" : "https://github.com/kohana/kohana/releases/tag/v3.3.6", "name": "https://www.checkmarx.com/advisories/cross-site-scripting-xss-vulnerability-in-kohana/",
"refsource" : "CONFIRM", "refsource": "MISC",
"url" : "https://github.com/kohana/kohana/releases/tag/v3.3.6" "url": "https://www.checkmarx.com/advisories/cross-site-scripting-xss-vulnerability-in-kohana/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2016-3833", "ID": "CVE-2016-3833",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -70,11 +70,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
},
{ {
"name": "95595", "name": "95595",
"refsource": "BID", "refsource": "BID",
@ -84,6 +79,11 @@
"name": "1037639", "name": "1037639",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037639" "url": "http://www.securitytracker.com/id/1037639"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"ID": "CVE-2016-8398", "ID": "CVE-2016-8398",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.talosintelligence.com/reports/TALOS-2016-0248/",
"refsource" : "MISC",
"url" : "http://www.talosintelligence.com/reports/TALOS-2016-0248/"
},
{ {
"name": "94920", "name": "94920",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/94920" "url": "http://www.securityfocus.com/bid/94920"
},
{
"name": "http://www.talosintelligence.com/reports/TALOS-2016-0248/",
"refsource": "MISC",
"url": "http://www.talosintelligence.com/reports/TALOS-2016-0248/"
} }
] ]
} }

View File

@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://nwtime.org/ntp428p9_release/",
"refsource" : "CONFIRM",
"url" : "http://nwtime.org/ntp428p9_release/"
},
{
"name" : "http://support.ntp.org/bin/view/Main/NtpBug3110",
"refsource" : "CONFIRM",
"url" : "http://support.ntp.org/bin/view/Main/NtpBug3110"
},
{ {
"name": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities", "name": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities" "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities"
}, },
{ {
"name" : "https://bto.bluecoat.com/security-advisory/sa139", "name": "http://nwtime.org/ntp428p9_release/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://bto.bluecoat.com/security-advisory/sa139" "url": "http://nwtime.org/ntp428p9_release/"
}, },
{ {
"name": "VU#633847", "name": "VU#633847",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/633847" "url": "https://www.kb.cert.org/vuls/id/633847"
}, },
{
"name": "1037354",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037354"
},
{
"name": "https://bto.bluecoat.com/security-advisory/sa139",
"refsource": "CONFIRM",
"url": "https://bto.bluecoat.com/security-advisory/sa139"
},
{ {
"name": "94450", "name": "94450",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/94450" "url": "http://www.securityfocus.com/bid/94450"
}, },
{ {
"name" : "1037354", "name": "http://support.ntp.org/bin/view/Main/NtpBug3110",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1037354" "url": "http://support.ntp.org/bin/view/Main/NtpBug3110"
} }
] ]
} }

View File

@ -58,24 +58,24 @@
"url": "http://www.openwall.com/lists/oss-security/2016/07/22/1" "url": "http://www.openwall.com/lists/oss-security/2016/07/22/1"
}, },
{ {
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7df3e59c3d1df4f87fe874c7956ef7a3d2f4d5fb", "name": "https://github.com/torvalds/linux/commit/7df3e59c3d1df4f87fe874c7956ef7a3d2f4d5fb",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7df3e59c3d1df4f87fe874c7956ef7a3d2f4d5fb" "url": "https://github.com/torvalds/linux/commit/7df3e59c3d1df4f87fe874c7956ef7a3d2f4d5fb"
}, },
{ {
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.7", "name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.7",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.7" "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.7"
}, },
{
"name" : "https://github.com/torvalds/linux/commit/7df3e59c3d1df4f87fe874c7956ef7a3d2f4d5fb",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/7df3e59c3d1df4f87fe874c7956ef7a3d2f4d5fb"
},
{ {
"name": "94546", "name": "94546",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/94546" "url": "http://www.securityfocus.com/bid/94546"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7df3e59c3d1df4f87fe874c7956ef7a3d2f4d5fb",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7df3e59c3d1df4f87fe874c7956ef7a3d2f4d5fb"
} }
] ]
} }