"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 23:37:15 +00:00
parent 919fabd459
commit e513d6d06f
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
59 changed files with 3509 additions and 3509 deletions

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20010410 Oracle Application Server shared library buffer overflow",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=98692227816141&w=2"
},
{
"name": "2569",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2569"
},
{
"name": "20010410 Oracle Application Server shared library buffer overflow",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=98692227816141&w=2"
}
]
}

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "4993",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4993"
"name": "fgallery-fimrss-sql-injection(39964)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39964"
},
{
"name": "27464",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27464"
},
{
"name": "4993",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4993"
},
{
"name": "ADV-2008-0349",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0349"
},
{
"name" : "fgallery-fimrss-sql-injection(39964)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39964"
}
]
}

View File

@ -52,6 +52,26 @@
},
"references": {
"reference_data": [
{
"name": "GLSA-201111-07",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201111-07.xml"
},
{
"name": "3632",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3632"
},
{
"name": "28833",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28833"
},
{
"name": "27660",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27660"
},
{
"name": "20080206 Chat vulnerabilities in TinTin++ 1.97.9",
"refsource": "BUGTRAQ",
@ -62,30 +82,10 @@
"refsource": "MISC",
"url": "http://aluigi.altervista.org/adv/rintintin-adv.txt"
},
{
"name" : "GLSA-201111-07",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201111-07.xml"
},
{
"name" : "27660",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/27660"
},
{
"name": "ADV-2008-0449",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0449"
},
{
"name" : "28833",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28833"
},
{
"name" : "3632",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/3632"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2008-1157",
"STATE": "PUBLIC"
},
@ -57,30 +57,30 @@
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080313-ipm.shtml"
},
{
"name" : "28249",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28249"
},
{
"name": "ADV-2008-0876",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0876/references"
},
{
"name": "cisco-ciscoworks-ipm-command-execution(41208)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41208"
},
{
"name": "1019611",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019611"
},
{
"name": "28249",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28249"
},
{
"name": "29376",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29376"
},
{
"name" : "cisco-ciscoworks-ipm-command-execution(41208)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41208"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://downloads.securityfocus.com/vulnerabilities/exploits/28138.html",
"refsource" : "MISC",
"url" : "http://downloads.securityfocus.com/vulnerabilities/exploits/28138.html"
"name": "imagevue-path-xss(41169)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41169"
},
{
"name": "28138",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/28138"
},
{
"name" : "imagevue-path-xss(41169)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41169"
"name": "http://downloads.securityfocus.com/vulnerabilities/exploits/28138.html",
"refsource": "MISC",
"url": "http://downloads.securityfocus.com/vulnerabilities/exploits/28138.html"
}
]
}

View File

@ -52,25 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20080311 CVE request: insecure X11 handling in ltsp",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2008/03/11/2"
},
{
"name": "[oss-security] 20080312 Re: CVE request: insecure X11 handling in ltsp",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/03/12/3"
},
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469462",
"refsource" : "CONFIRM",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469462"
"name": "1019940",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019940"
},
{
"name" : "DSA-1561",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1561"
"name": "[oss-security] 20080311 CVE request: insecure X11 handling in ltsp",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/03/11/2"
},
{
"name": "USN-610-1",
@ -83,20 +78,25 @@
"url": "http://www.securityfocus.com/bid/28960"
},
{
"name" : "1019940",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1019940"
"name": "30099",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30099"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469462",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469462"
},
{
"name": "DSA-1561",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1561"
},
{
"name": "29959",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29959"
},
{
"name" : "30099",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30099"
},
{
"name": "ltsp-ldm-weak-security(42080)",
"refsource": "XF",

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20080521 [DSECRG-08-020] Alcatel OmniPCX Office Remote Comand Execution",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/492383/100/0/threaded"
},
{
"name": "5662",
"refsource": "EXPLOIT-DB",
@ -68,29 +63,34 @@
"url": "http://www1.alcatel-lucent.com/psirt/statements/2008001/OXOrexec.htm"
},
{
"name" : "28758",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28758"
"name": "29798",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29798"
},
{
"name": "ADV-2008-1057",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1057"
},
{
"name" : "1020082",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1020082"
},
{
"name" : "29798",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29798"
},
{
"name": "omnipcx-cgiscript-info-disclosure(41560)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41560"
},
{
"name": "28758",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28758"
},
{
"name": "20080521 [DSECRG-08-020] Alcatel OmniPCX Office Remote Comand Execution",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/492383/100/0/threaded"
},
{
"name": "1020082",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020082"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-1836",
"STATE": "PUBLIC"
},
@ -52,21 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "MDVSA-2008:088",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:088"
},
{
"name": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=881",
"refsource": "CONFIRM",
"url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=881"
},
{
"name" : "http://up2date.astaro.com/2008/08/up2date_asg_v7300_ga_released.html",
"refsource" : "CONFIRM",
"url" : "http://up2date.astaro.com/2008/08/up2date_asg_v7300_ga_released.html"
},
{
"name" : "APPLE-SA-2008-09-15",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html"
},
{
"name": "FEDORA-2008-3900",
"refsource": "FEDORA",
@ -78,14 +73,19 @@
"url": "http://security.gentoo.org/glsa/glsa-200805-19.xml"
},
{
"name" : "MDVSA-2008:088",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:088"
"name": "APPLE-SA-2008-09-15",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html"
},
{
"name" : "SUSE-SA:2008:024",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00009.html"
"name": "http://up2date.astaro.com/2008/08/up2date_asg_v7300_ga_released.html",
"refsource": "CONFIRM",
"url": "http://up2date.astaro.com/2008/08/up2date_asg_v7300_ga_released.html"
},
{
"name": "29891",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29891"
},
{
"name": "TA08-260A",
@ -103,34 +103,34 @@
"url": "http://www.vupen.com/english/advisories/2008/2584"
},
{
"name" : "29891",
"name": "31882",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/29891"
},
{
"name" : "30253",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30253"
"url": "http://secunia.com/advisories/31882"
},
{
"name": "30328",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30328"
},
{
"name": "clamav-rfc2231-dos(41868)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41868"
},
{
"name": "30253",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30253"
},
{
"name": "31576",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31576"
},
{
"name" : "31882",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31882"
},
{
"name" : "clamav-rfc2231-dos(41868)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41868"
"name": "SUSE-SA:2008:024",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00009.html"
}
]
}

View File

@ -53,9 +53,24 @@
"references": {
"reference_data": [
{
"name" : "20080822 [oCERT-2008-008] multiple heap overflows in xine-lib",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/495674/100/0/threaded"
"name": "31567",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31567"
},
{
"name": "30797",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30797"
},
{
"name": "xinelib-openrafile-bo(44642)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44642"
},
{
"name": "33544",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33544"
},
{
"name": "http://sourceforge.net/project/shownotes.php?release_id=619869",
@ -67,6 +82,61 @@
"refsource": "MISC",
"url": "http://www.ocert.org/analysis/2008-008/analysis.txt"
},
{
"name": "xinelib-parseblockgroup-bo(44634)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44634"
},
{
"name": "4648",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4648"
},
{
"name": "ADV-2008-2427",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2427"
},
{
"name": "31827",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31827"
},
{
"name": "47744",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/47744"
},
{
"name": "FEDORA-2008-7572",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00174.html"
},
{
"name": "SUSE-SR:2009:004",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"name": "31502",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31502"
},
{
"name": "ADV-2008-2382",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2382"
},
{
"name": "20080822 [oCERT-2008-008] multiple heap overflows in xine-lib",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/495674/100/0/threaded"
},
{
"name": "MDVSA-2009:020",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:020"
},
{
"name": "FEDORA-2009-0542",
"refsource": "FEDORA",
@ -76,76 +146,6 @@
"name": "FEDORA-2008-7512",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00385.html"
},
{
"name" : "FEDORA-2008-7572",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00174.html"
},
{
"name" : "MDVSA-2009:020",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:020"
},
{
"name" : "SUSE-SR:2009:004",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"name" : "30797",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30797"
},
{
"name" : "47744",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/47744"
},
{
"name" : "31827",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31827"
},
{
"name" : "ADV-2008-2382",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2382"
},
{
"name" : "ADV-2008-2427",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2427"
},
{
"name" : "31502",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31502"
},
{
"name" : "31567",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31567"
},
{
"name" : "33544",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33544"
},
{
"name" : "4648",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/4648"
},
{
"name" : "xinelib-openrafile-bo(44642)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44642"
},
{
"name" : "xinelib-parseblockgroup-bo(44634)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44634"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2008-5437",
"STATE": "PUBLIC"
},
@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html"
},
{
"name" : "33177",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/33177"
},
{
"name" : "ADV-2009-0115",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/0115"
"name": "33525",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33525"
},
{
"name": "51352",
@ -78,9 +68,19 @@
"url": "http://www.securitytracker.com/id?1021561"
},
{
"name" : "33525",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33525"
"name": "ADV-2009-0115",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0115"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html"
},
{
"name": "33177",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33177"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2008-5445",
"STATE": "PUBLIC"
},
@ -52,16 +52,21 @@
},
"references": {
"reference_data": [
{
"name" : "20090115 Oracle Secure Backup's observiced.exe Denial Of Service vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/500113/100/0/threaded"
},
{
"name": "http://www.fortiguardcenter.com/advisory/FGA-2009-02.html",
"refsource": "MISC",
"url": "http://www.fortiguardcenter.com/advisory/FGA-2009-02.html"
},
{
"name": "33525",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33525"
},
{
"name": "ADV-2009-0115",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0115"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html",
"refsource": "CONFIRM",
@ -73,14 +78,9 @@
"url": "http://www.securityfocus.com/bid/33177"
},
{
"name" : "ADV-2009-0115",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/0115"
},
{
"name" : "33525",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33525"
"name": "20090115 Oracle Secure Backup's observiced.exe Denial Of Service vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/500113/100/0/threaded"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2008-5464",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-0444",
"STATE": "PUBLIC"
},
@ -53,69 +53,24 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
},
{
"name" : "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=907218",
"refsource" : "CONFIRM",
"url" : "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=907218"
},
{
"name" : "http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/ce04db4aba39",
"refsource" : "CONFIRM",
"url" : "http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/ce04db4aba39"
},
{
"name" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056",
"refsource" : "CONFIRM",
"url" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056"
"name": "oval:org.mitre.oval:def:16614",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16614"
},
{
"name": "GLSA-201406-32",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"name" : "HPSBMU02874",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=136733161405818&w=2"
},
{
"name" : "HPSBUX02857",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=136439120408139&w=2"
},
{
"name" : "SSRT101103",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=136439120408139&w=2"
},
{
"name" : "SSRT101184",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=136733161405818&w=2"
},
{
"name": "MDVSA-2013:095",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:095"
},
{
"name" : "RHSA-2013:0237",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0237.html"
},
{
"name" : "RHSA-2013:0247",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0247.html"
},
{
"name" : "openSUSE-SU-2013:0377",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html"
"name": "http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/ce04db4aba39",
"refsource": "CONFIRM",
"url": "http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/ce04db4aba39"
},
{
"name": "TA13-032A",
@ -128,14 +83,59 @@
"url": "http://www.kb.cert.org/vuls/id/858729"
},
{
"name" : "oval:org.mitre.oval:def:16614",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16614"
"name": "RHSA-2013:0237",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0237.html"
},
{
"name": "HPSBUX02857",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=136439120408139&w=2"
},
{
"name": "RHSA-2013:0247",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0247.html"
},
{
"name": "HPSBMU02874",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=136733161405818&w=2"
},
{
"name": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=907218",
"refsource": "CONFIRM",
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=907218"
},
{
"name": "SSRT101103",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=136439120408139&w=2"
},
{
"name": "openSUSE-SU-2013:0377",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html"
},
{
"name": "oval:org.mitre.oval:def:19349",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19349"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
},
{
"name": "SSRT101184",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=136733161405818&w=2"
},
{
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056",
"refsource": "CONFIRM",
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2013-0625",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.adobe.com/support/security/advisories/apsa13-01.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/advisories/apsa13-01.html"
"name": "57164",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/57164"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb13-03.html",
@ -63,9 +63,9 @@
"url": "http://www.adobe.com/support/security/bulletins/apsb13-03.html"
},
{
"name" : "57164",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/57164"
"name": "http://www.adobe.com/support/security/advisories/apsa13-01.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/advisories/apsa13-01.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-3141",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "MS13-047",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-047"
},
{
"name": "TA13-168A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/ncas/alerts/TA13-168A"
},
{
"name": "MS13-047",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-047"
},
{
"name": "oval:org.mitre.oval:def:15981",
"refsource": "OVAL",

View File

@ -53,39 +53,39 @@
"references": {
"reference_data": [
{
"name" : "20130703 Multiple Vulnerabilities in Kasseler CMS",
"refsource" : "BUGTRAQ",
"url" : "http://seclists.org/bugtraq/2013/Jul/26"
},
{
"name" : "http://packetstormsecurity.com/files/122282/Kasseler-CMS-2-r1223-CSRF-XSS-SQL-Injection.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/122282/Kasseler-CMS-2-r1223-CSRF-XSS-SQL-Injection.html"
"name": "94779",
"refsource": "OSVDB",
"url": "http://osvdb.org/94779"
},
{
"name": "https://www.htbridge.com/advisory/HTB23158",
"refsource": "MISC",
"url": "https://www.htbridge.com/advisory/HTB23158"
},
{
"name": "20130703 Multiple Vulnerabilities in Kasseler CMS",
"refsource": "BUGTRAQ",
"url": "http://seclists.org/bugtraq/2013/Jul/26"
},
{
"name": "http://diff.kasseler-cms.net/svn.html",
"refsource": "CONFIRM",
"url": "http://diff.kasseler-cms.net/svn.html"
},
{
"name" : "http://diff.kasseler-cms.net/svn/patches/1232.html",
"refsource" : "CONFIRM",
"url" : "http://diff.kasseler-cms.net/svn/patches/1232.html"
},
{
"name" : "94779",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/94779"
},
{
"name": "kasselercms-cve20133727-admin-sql-injection(85407)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85407"
},
{
"name": "http://packetstormsecurity.com/files/122282/Kasseler-CMS-2-r1223-CSRF-XSS-SQL-Injection.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/122282/Kasseler-CMS-2-r1223-CSRF-XSS-SQL-Injection.html"
},
{
"name": "http://diff.kasseler-cms.net/svn/patches/1232.html",
"refsource": "CONFIRM",
"url": "http://diff.kasseler-cms.net/svn/patches/1232.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4557",
"STATE": "PUBLIC"
},
@ -53,15 +53,30 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20131110 Re: CVE Request: multiple vulnerabilities in spip",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/11/10/4"
"name": "DSA-2794",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2013/dsa-2794"
},
{
"name": "http://www.spip.net/fr_article5646.html",
"refsource": "CONFIRM",
"url": "http://www.spip.net/fr_article5646.html"
},
{
"name": "1029317",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029317"
},
{
"name": "[oss-security] 20131110 Re: CVE Request: multiple vulnerabilities in spip",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/11/10/4"
},
{
"name": "55551",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55551"
},
{
"name": "http://www.spip.net/fr_article5648.html",
"refsource": "CONFIRM",
@ -71,21 +86,6 @@
"name": "http://zone.spip.org/trac/spip-zone/changeset/75105/_core_/securite/ecran_securite.php",
"refsource": "CONFIRM",
"url": "http://zone.spip.org/trac/spip-zone/changeset/75105/_core_/securite/ecran_securite.php"
},
{
"name" : "DSA-2794",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2013/dsa-2794"
},
{
"name" : "1029317",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1029317"
},
{
"name" : "55551",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/55551"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2013-4822",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-6382",
"STATE": "PUBLIC"
},
@ -52,51 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20131122 Linux kernel CVE fixes",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/11/22/5"
},
{
"name" : "[xfs] 20131031 [patch] xfs: underflow bug in xfs_attrlist_by_handle()",
"refsource" : "MLIST",
"url" : "http://www.spinics.net/lists/xfs/msg23343.html"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1033603",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1033603"
},
{
"name" : "USN-2113-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2113-1"
},
{
"name" : "USN-2117-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2117-1"
},
{
"name" : "USN-2109-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2109-1"
},
{
"name" : "USN-2110-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2110-1"
},
{
"name" : "USN-2128-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2128-1"
},
{
"name" : "USN-2129-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2129-1"
},
{
"name": "USN-2135-1",
"refsource": "UBUNTU",
@ -108,24 +63,69 @@
"url": "http://www.ubuntu.com/usn/USN-2138-1"
},
{
"name" : "USN-2139-1",
"name": "USN-2113-1",
"refsource": "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2139-1"
"url": "http://www.ubuntu.com/usn/USN-2113-1"
},
{
"name": "USN-2141-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2141-1"
},
{
"name": "[oss-security] 20131122 Linux kernel CVE fixes",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/11/22/5"
},
{
"name": "USN-2110-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2110-1"
},
{
"name": "USN-2129-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2129-1"
},
{
"name": "USN-2128-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2128-1"
},
{
"name": "USN-2139-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2139-1"
},
{
"name": "USN-2158-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2158-1"
},
{
"name": "USN-2117-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2117-1"
},
{
"name": "63889",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/63889"
},
{
"name": "USN-2109-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2109-1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1033603",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1033603"
},
{
"name": "[xfs] 20131031 [patch] xfs: underflow bug in xfs_attrlist_by_handle()",
"refsource": "MLIST",
"url": "http://www.spinics.net/lists/xfs/msg23343.html"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "https://src.chromium.org/viewvc/chrome?revision=237115&view=revision",
"refsource": "CONFIRM",
"url": "https://src.chromium.org/viewvc/chrome?revision=237115&view=revision"
},
{
"name": "openSUSE-SU-2014:0243",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00008.html"
},
{
"name": "http://googlechromereleases.blogspot.com/2014/01/stable-channel-update.html",
"refsource": "CONFIRM",
@ -62,20 +72,10 @@
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=321940"
},
{
"name" : "https://src.chromium.org/viewvc/chrome?revision=237115&view=revision",
"refsource" : "CONFIRM",
"url" : "https://src.chromium.org/viewvc/chrome?revision=237115&view=revision"
},
{
"name": "DSA-2862",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2862"
},
{
"name" : "openSUSE-SU-2014:0243",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00008.html"
}
]
}

View File

@ -53,6 +53,11 @@
},
"references": {
"reference_data": [
{
"name": "1039598",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039598"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
@ -62,11 +67,6 @@
"name": "101479",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101479"
},
{
"name" : "1039598",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039598"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-wms1"
},
{
"name" : "101489",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/101489"
},
{
"name": "1039617",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039617"
},
{
"name": "101489",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101489"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1039828",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039828"
},
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-wsa",
"refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "101932",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101932"
},
{
"name" : "1039828",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039828"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.tcpdump.org/tcpdump-changes.txt",
"refsource" : "CONFIRM",
"url" : "http://www.tcpdump.org/tcpdump-changes.txt"
},
{
"name" : "https://github.com/the-tcpdump-group/tcpdump/commit/6fca58f5f9c96749a575f52e20598ad43f5bdf30",
"refsource" : "CONFIRM",
"url" : "https://github.com/the-tcpdump-group/tcpdump/commit/6fca58f5f9c96749a575f52e20598ad43f5bdf30"
"name": "GLSA-201709-23",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201709-23"
},
{
"name": "https://support.apple.com/HT208221",
@ -73,19 +68,24 @@
"url": "http://www.debian.org/security/2017/dsa-3971"
},
{
"name" : "GLSA-201709-23",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201709-23"
"name": "1039307",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039307"
},
{
"name": "https://github.com/the-tcpdump-group/tcpdump/commit/6fca58f5f9c96749a575f52e20598ad43f5bdf30",
"refsource": "CONFIRM",
"url": "https://github.com/the-tcpdump-group/tcpdump/commit/6fca58f5f9c96749a575f52e20598ad43f5bdf30"
},
{
"name": "http://www.tcpdump.org/tcpdump-changes.txt",
"refsource": "CONFIRM",
"url": "http://www.tcpdump.org/tcpdump-changes.txt"
},
{
"name": "RHEA-2018:0705",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHEA-2018:0705"
},
{
"name" : "1039307",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039307"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2018-01-02T00:00:00",
"ID": "CVE-2017-13225",
"STATE": "PUBLIC"
@ -58,15 +58,15 @@
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2018-01-01"
},
{
"name" : "102420",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/102420"
},
{
"name": "1040106",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040106"
},
{
"name": "102420",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102420"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732",
"refsource" : "MISC",
"url" : "https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732"
},
{
"name": "https://patchwork.kernel.org/patch/9919053/",
"refsource": "MISC",
"url": "https://patchwork.kernel.org/patch/9919053/"
},
{
"name": "https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732",
"refsource": "MISC",
"url": "https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732"
},
{
"name": "100502",
"refsource": "BID",

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-17008",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-17009",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-17214",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,31 +52,31 @@
},
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20171223 [SECURITY] [DLA 1219-1] enigmail security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2017/12/msg00021.html"
},
{
"name": "https://enigmail.net/download/other/Enigmail%20Pentest%20Report%20by%20Cure53%20-%20Excerpt.pdf",
"refsource": "MISC",
"url": "https://enigmail.net/download/other/Enigmail%20Pentest%20Report%20by%20Cure53%20-%20Excerpt.pdf"
},
{
"name" : "https://lists.debian.org/debian-security-announce/2017/msg00333.html",
"refsource" : "MISC",
"url" : "https://lists.debian.org/debian-security-announce/2017/msg00333.html"
},
{
"name": "https://sourceforge.net/p/enigmail/bugs/709/",
"refsource": "MISC",
"url": "https://sourceforge.net/p/enigmail/bugs/709/"
},
{
"name": "https://lists.debian.org/debian-security-announce/2017/msg00333.html",
"refsource": "MISC",
"url": "https://lists.debian.org/debian-security-announce/2017/msg00333.html"
},
{
"name": "https://www.mail-archive.com/enigmail-users@enigmail.net/msg04280.html",
"refsource": "MISC",
"url": "https://www.mail-archive.com/enigmail-users@enigmail.net/msg04280.html"
},
{
"name": "[debian-lts-announce] 20171223 [SECURITY] [DLA 1219-1] enigmail security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00021.html"
},
{
"name": "DSA-4070",
"refsource": "DEBIAN",

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.hyuki.com/yukiwiki/",
"refsource" : "MISC",
"url" : "http://www.hyuki.com/yukiwiki/"
},
{
"name": "JVN#36343375",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN36343375/index.html"
},
{
"name": "http://www.hyuki.com/yukiwiki/",
"refsource": "MISC",
"url": "http://www.hyuki.com/yukiwiki/"
}
]
}

View File

@ -53,30 +53,30 @@
},
"references": {
"reference_data": [
{
"name": "1041520",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041520"
},
{
"name": "[debian-lts-announce] 20181119 [SECURITY] [DLA 1580-1] systemd security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1534701",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1534701"
},
{
"name": "RHSA-2018:0260",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0260"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1534701",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534701"
},
{
"name": "USN-3558-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3558-1/"
},
{
"name" : "1041520",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1041520"
}
]
}

View File

@ -91,30 +91,30 @@
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1447080"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2018-13/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2018-13/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2018-11/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2018-11/"
},
{
"name": "1040896",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040896"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2018-12/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2018-12/"
},
{
"name" : "https://www.mozilla.org/security/advisories/mfsa2018-13/",
"refsource" : "CONFIRM",
"url" : "https://www.mozilla.org/security/advisories/mfsa2018-13/"
},
{
"name": "104136",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104136"
},
{
"name" : "1040896",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1040896"
}
]
}