"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 22:41:19 +00:00
parent 113f5e63be
commit e7b884962b
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
53 changed files with 3086 additions and 3086 deletions

View File

@ -53,15 +53,20 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://drupal.org/node/112146", "name": "23887",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://drupal.org/node/112146" "url": "http://secunia.com/advisories/23887"
}, },
{ {
"name": "22224", "name": "22224",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/22224" "url": "http://www.securityfocus.com/bid/22224"
}, },
{
"name": "projecttracking-extension-file-upload(31729)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31729"
},
{ {
"name": "ADV-2007-0312", "name": "ADV-2007-0312",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -73,14 +78,9 @@
"url": "http://osvdb.org/32134" "url": "http://osvdb.org/32134"
}, },
{ {
"name" : "23887", "name": "http://drupal.org/node/112146",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/23887" "url": "http://drupal.org/node/112146"
},
{
"name" : "projecttracking-extension-file-upload(31729)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31729"
} }
] ]
} }

View File

@ -57,6 +57,11 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3249" "url": "https://www.exploit-db.com/exploits/3249"
}, },
{
"name": "33607",
"refsource": "OSVDB",
"url": "http://osvdb.org/33607"
},
{ {
"name": "20070201 true: WebBuilder <= 2.0 Remote File Include Vulnerability", "name": "20070201 true: WebBuilder <= 2.0 Remote File Include Vulnerability",
"refsource": "VIM", "refsource": "VIM",
@ -66,11 +71,6 @@
"name": "ADV-2007-0458", "name": "ADV-2007-0458",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0458" "url": "http://www.vupen.com/english/advisories/2007/0458"
},
{
"name" : "33607",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33607"
} }
] ]
} }

View File

@ -52,31 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070213 Aruba Networks - Unauthorized Administrative and WLAN Access through Guest Account",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/459927/100/0/threaded"
},
{
"name" : "20070213 Aruba Networks - Unauthorized Administrative and WLAN Access through Guest Account",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052382.html"
},
{
"name" : "VU#613833",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/613833"
},
{
"name" : "22538",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22538"
},
{ {
"name": "33185", "name": "33185",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/33185" "url": "http://osvdb.org/33185"
}, },
{
"name": "20070213 Aruba Networks - Unauthorized Administrative and WLAN Access through Guest Account",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/459927/100/0/threaded"
},
{ {
"name": "24144", "name": "24144",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -87,6 +72,21 @@
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2243" "url": "http://securityreason.com/securityalert/2243"
}, },
{
"name": "22538",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22538"
},
{
"name": "VU#613833",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/613833"
},
{
"name": "20070213 Aruba Networks - Unauthorized Administrative and WLAN Access through Guest Account",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052382.html"
},
{ {
"name": "aruba-guestaccount-privilege-escalation(32461)", "name": "aruba-guestaccount-privilege-escalation(32461)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,175 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070418 rPSA-2007-0073-1 php php-mysql php-pgsql",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/466166/100/0/threaded"
},
{
"name" : "http://www.php-security.org/MOPB/MOPB-03-2007.html",
"refsource" : "MISC",
"url" : "http://www.php-security.org/MOPB/MOPB-03-2007.html"
},
{
"name" : "https://issues.rpath.com/browse/RPL-1268",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-1268"
},
{
"name" : "http://us2.php.net/releases/4_4_7.php",
"refsource" : "CONFIRM",
"url" : "http://us2.php.net/releases/4_4_7.php"
},
{
"name" : "http://us2.php.net/releases/5_2_2.php",
"refsource" : "CONFIRM",
"url" : "http://us2.php.net/releases/5_2_2.php"
},
{
"name" : "http://www.php.net/ChangeLog-5.php#5.2.4",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/ChangeLog-5.php#5.2.4"
},
{
"name" : "http://www.php.net/releases/5_2_4.php",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/releases/5_2_4.php"
},
{ {
"name": "https://launchpad.net/bugs/173043", "name": "https://launchpad.net/bugs/173043",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://launchpad.net/bugs/173043" "url": "https://launchpad.net/bugs/173043"
}, },
{
"name" : "http://www.php.net/ChangeLog-4.php",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/ChangeLog-4.php"
},
{
"name" : "http://www.php.net/releases/4_4_8.php",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/releases/4_4_8.php"
},
{
"name" : "GLSA-200705-19",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200705-19.xml"
},
{
"name" : "MDKSA-2007:087",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:087"
},
{
"name" : "MDKSA-2007:088",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:088"
},
{
"name" : "MDKSA-2007:089",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:089"
},
{
"name" : "MDKSA-2007:090",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:090"
},
{
"name" : "RHSA-2007:0082",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0082.html"
},
{
"name" : "RHSA-2007:0154",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2007-0154.html"
},
{
"name" : "RHSA-2007:0155",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2007-0155.html"
},
{
"name" : "RHSA-2007:0163",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2007-0163.html"
},
{
"name" : "RHSA-2007:0162",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0162.html"
},
{
"name" : "SSA:2008-045-03",
"refsource" : "SLACKWARE",
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136"
},
{
"name" : "SUSE-SA:2007:044",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html"
},
{
"name" : "USN-549-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/549-1/"
},
{
"name" : "USN-549-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-549-2"
},
{ {
"name": "22764", "name": "22764",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/22764" "url": "http://www.securityfocus.com/bid/22764"
}, },
{ {
"name" : "32769", "name": "RHSA-2007:0154",
"refsource" : "OSVDB", "refsource": "REDHAT",
"url" : "http://www.osvdb.org/32769" "url": "http://rhn.redhat.com/errata/RHSA-2007-0154.html"
},
{
"name" : "oval:org.mitre.oval:def:11017",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11017"
},
{
"name" : "1017771",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017771"
},
{
"name" : "24910",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24910"
},
{
"name" : "24924",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24924"
},
{
"name" : "24945",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24945"
},
{
"name" : "24941",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24941"
},
{
"name" : "24909",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24909"
},
{
"name" : "25445",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25445"
}, },
{ {
"name": "26048", "name": "26048",
@ -228,19 +73,174 @@
"url": "http://secunia.com/advisories/26048" "url": "http://secunia.com/advisories/26048"
}, },
{ {
"name" : "26642", "name": "20070418 rPSA-2007-0073-1 php php-mysql php-pgsql",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/466166/100/0/threaded"
},
{
"name": "GLSA-200705-19",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200705-19.xml"
},
{
"name": "24941",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/26642" "url": "http://secunia.com/advisories/24941"
}, },
{ {
"name": "27864", "name": "27864",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27864" "url": "http://secunia.com/advisories/27864"
}, },
{
"name": "RHSA-2007:0162",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0162.html"
},
{
"name": "http://us2.php.net/releases/4_4_7.php",
"refsource": "CONFIRM",
"url": "http://us2.php.net/releases/4_4_7.php"
},
{
"name": "http://www.php.net/releases/4_4_8.php",
"refsource": "CONFIRM",
"url": "http://www.php.net/releases/4_4_8.php"
},
{
"name": "SSA:2008-045-03",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136"
},
{
"name": "http://www.php.net/ChangeLog-5.php#5.2.4",
"refsource": "CONFIRM",
"url": "http://www.php.net/ChangeLog-5.php#5.2.4"
},
{ {
"name": "28936", "name": "28936",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28936" "url": "http://secunia.com/advisories/28936"
},
{
"name": "MDKSA-2007:090",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:090"
},
{
"name": "http://www.php-security.org/MOPB/MOPB-03-2007.html",
"refsource": "MISC",
"url": "http://www.php-security.org/MOPB/MOPB-03-2007.html"
},
{
"name": "USN-549-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/549-1/"
},
{
"name": "24909",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24909"
},
{
"name": "MDKSA-2007:087",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:087"
},
{
"name": "24945",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24945"
},
{
"name": "oval:org.mitre.oval:def:11017",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11017"
},
{
"name": "https://issues.rpath.com/browse/RPL-1268",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1268"
},
{
"name": "32769",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/32769"
},
{
"name": "http://us2.php.net/releases/5_2_2.php",
"refsource": "CONFIRM",
"url": "http://us2.php.net/releases/5_2_2.php"
},
{
"name": "1017771",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017771"
},
{
"name": "RHSA-2007:0082",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0082.html"
},
{
"name": "24924",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24924"
},
{
"name": "RHSA-2007:0155",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0155.html"
},
{
"name": "24910",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24910"
},
{
"name": "http://www.php.net/ChangeLog-4.php",
"refsource": "CONFIRM",
"url": "http://www.php.net/ChangeLog-4.php"
},
{
"name": "http://www.php.net/releases/5_2_4.php",
"refsource": "CONFIRM",
"url": "http://www.php.net/releases/5_2_4.php"
},
{
"name": "MDKSA-2007:089",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:089"
},
{
"name": "25445",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25445"
},
{
"name": "RHSA-2007:0163",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0163.html"
},
{
"name": "USN-549-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-549-2"
},
{
"name": "26642",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26642"
},
{
"name": "MDKSA-2007:088",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:088"
},
{
"name": "SUSE-SA:2007:044",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "4219",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4219"
},
{ {
"name": "http://xpkzxc.com/exploits/confixx.txt", "name": "http://xpkzxc.com/exploits/confixx.txt",
"refsource": "MISC", "refsource": "MISC",
@ -73,9 +68,9 @@
"url": "http://www.securityfocus.com/bid/25036" "url": "http://www.securityfocus.com/bid/25036"
}, },
{ {
"name" : "ADV-2007-2743", "name": "confixxpro-saveserver-file-include(35586)",
"refsource" : "VUPEN", "refsource": "XF",
"url" : "http://www.vupen.com/english/advisories/2007/2743" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35586"
}, },
{ {
"name": "26300", "name": "26300",
@ -83,9 +78,14 @@
"url": "http://secunia.com/advisories/26300" "url": "http://secunia.com/advisories/26300"
}, },
{ {
"name" : "confixxpro-saveserver-file-include(35586)", "name": "ADV-2007-2743",
"refsource" : "XF", "refsource": "VUPEN",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35586" "url": "http://www.vupen.com/english/advisories/2007/2743"
},
{
"name": "4219",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4219"
} }
] ]
} }

View File

@ -57,40 +57,15 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/480238/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/480238/100/0/threaded"
}, },
{
"name" : "http://www.infobyte.com.ar/adv/ISR-15.html",
"refsource" : "MISC",
"url" : "http://www.infobyte.com.ar/adv/ISR-15.html"
},
{
"name" : "http://www.barracudanetworks.com/ns/support/tech_alert.php",
"refsource" : "CONFIRM",
"url" : "http://www.barracudanetworks.com/ns/support/tech_alert.php"
},
{
"name" : "25757",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25757"
},
{ {
"name": "ADV-2007-3257", "name": "ADV-2007-3257",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3257" "url": "http://www.vupen.com/english/advisories/2007/3257"
}, },
{ {
"name" : "38156", "name": "barracuda-webadmin-xss(36716)",
"refsource" : "OSVDB", "refsource": "XF",
"url" : "http://osvdb.org/38156" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36716"
},
{
"name" : "1018733",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018733"
},
{
"name" : "26937",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26937"
}, },
{ {
"name": "3164", "name": "3164",
@ -98,9 +73,34 @@
"url": "http://securityreason.com/securityalert/3164" "url": "http://securityreason.com/securityalert/3164"
}, },
{ {
"name" : "barracuda-webadmin-xss(36716)", "name": "38156",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36716" "url": "http://osvdb.org/38156"
},
{
"name": "http://www.barracudanetworks.com/ns/support/tech_alert.php",
"refsource": "CONFIRM",
"url": "http://www.barracudanetworks.com/ns/support/tech_alert.php"
},
{
"name": "26937",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26937"
},
{
"name": "http://www.infobyte.com.ar/adv/ISR-15.html",
"refsource": "MISC",
"url": "http://www.infobyte.com.ar/adv/ISR-15.html"
},
{
"name": "25757",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25757"
},
{
"name": "1018733",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018733"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20071011 [CAID 35724, 35725, 35726]: CA BrightStor ARCserve Backup Multiple Vulnerabilities", "name": "27192",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/482121/100/0/threaded" "url": "http://secunia.com/advisories/27192"
}, },
{ {
"name": "http://supportconnectw.ca.com/public/storage/infodocs/basb-secnotice.asp", "name": "http://supportconnectw.ca.com/public/storage/infodocs/basb-secnotice.asp",
@ -63,34 +63,34 @@
"url": "http://supportconnectw.ca.com/public/storage/infodocs/basb-secnotice.asp" "url": "http://supportconnectw.ca.com/public/storage/infodocs/basb-secnotice.asp"
}, },
{ {
"name" : "26015", "name": "ca-brightstor-dbasvr-code-execution(37068)",
"refsource" : "BID", "refsource": "XF",
"url" : "http://www.securityfocus.com/bid/26015" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37068"
}, },
{ {
"name" : "ADV-2007-3470", "name": "20071011 [CAID 35724, 35725, 35726]: CA BrightStor ARCserve Backup Multiple Vulnerabilities",
"refsource" : "VUPEN", "refsource": "BUGTRAQ",
"url" : "http://www.vupen.com/english/advisories/2007/3470" "url": "http://www.securityfocus.com/archive/1/482121/100/0/threaded"
}, },
{ {
"name": "41372", "name": "41372",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/41372" "url": "http://osvdb.org/41372"
}, },
{
"name": "26015",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26015"
},
{ {
"name": "1018805", "name": "1018805",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018805" "url": "http://www.securitytracker.com/id?1018805"
}, },
{ {
"name" : "27192", "name": "ADV-2007-3470",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/27192" "url": "http://www.vupen.com/english/advisories/2007/3470"
},
{
"name" : "ca-brightstor-dbasvr-code-execution(37068)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/37068"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "4524",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4524"
},
{ {
"name": "26059", "name": "26059",
"refsource": "BID", "refsource": "BID",
@ -66,6 +61,11 @@
"name": "40609", "name": "40609",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/40609" "url": "http://osvdb.org/40609"
},
{
"name": "4524",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4524"
} }
] ]
} }

View File

@ -52,26 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "4531",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4531"
},
{
"name" : "26069",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26069"
},
{ {
"name": "ADV-2007-3489", "name": "ADV-2007-3489",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3489" "url": "http://www.vupen.com/english/advisories/2007/3489"
}, },
{
"name": "4531",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4531"
},
{ {
"name": "27149", "name": "27149",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27149" "url": "http://secunia.com/advisories/27149"
}, },
{
"name": "26069",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26069"
},
{ {
"name": "jetaudio-m3u-bo(37204)", "name": "jetaudio-m3u-bo(37204)",
"refsource": "XF", "refsource": "XF",

View File

@ -53,39 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20150329 Fw: GNU Libtasn1 4.4 released ( fixes stack overflow in asn1_der_decoding)", "name": "MDVSA-2015:193",
"refsource" : "MLIST", "refsource": "MANDRIVA",
"url" : "http://www.openwall.com/lists/oss-security/2015/03/29/4" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:193"
}, },
{ {
"name" : "[oss-security] 20150330 Re: Fw: GNU Libtasn1 4.4 released ( fixes stack overflow in asn1_der_decoding)", "name": "GLSA-201509-04",
"refsource" : "MLIST", "refsource": "GENTOO",
"url" : "http://www.openwall.com/lists/oss-security/2015/03/31/2" "url": "https://security.gentoo.org/glsa/201509-04"
},
{
"name" : "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=4d4f992826a4962790ecd0cce6fbba4a415ce149",
"refsource" : "CONFIRM",
"url" : "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=4d4f992826a4962790ecd0cce6fbba4a415ce149"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name" : "DSA-3220",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3220"
},
{
"name" : "FEDORA-2015-5114",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154805.html"
},
{
"name" : "FEDORA-2015-5182",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154741.html"
}, },
{ {
"name": "FEDORA-2015-5199", "name": "FEDORA-2015-5199",
@ -93,9 +68,9 @@
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155270.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155270.html"
}, },
{ {
"name" : "FEDORA-2015-5245", "name": "USN-2559-1",
"refsource" : "FEDORA", "refsource": "UBUNTU",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155483.html" "url": "http://www.ubuntu.com/usn/USN-2559-1"
}, },
{ {
"name": "FEDORA-2015-5308", "name": "FEDORA-2015-5308",
@ -108,24 +83,19 @@
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155435.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155435.html"
}, },
{ {
"name" : "GLSA-201509-04", "name": "FEDORA-2015-5245",
"refsource" : "GENTOO", "refsource": "FEDORA",
"url" : "https://security.gentoo.org/glsa/201509-04" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155483.html"
}, },
{ {
"name" : "MDVSA-2015:193", "name": "[oss-security] 20150330 Re: Fw: GNU Libtasn1 4.4 released ( fixes stack overflow in asn1_der_decoding)",
"refsource" : "MANDRIVA", "refsource": "MLIST",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:193" "url": "http://www.openwall.com/lists/oss-security/2015/03/31/2"
}, },
{ {
"name" : "RHSA-2017:1860", "name": "1032080",
"refsource" : "REDHAT", "refsource": "SECTRACK",
"url" : "https://access.redhat.com/errata/RHSA-2017:1860" "url": "http://www.securitytracker.com/id/1032080"
},
{
"name" : "USN-2559-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2559-1"
}, },
{ {
"name": "73436", "name": "73436",
@ -133,9 +103,39 @@
"url": "http://www.securityfocus.com/bid/73436" "url": "http://www.securityfocus.com/bid/73436"
}, },
{ {
"name" : "1032080", "name": "RHSA-2017:1860",
"refsource" : "SECTRACK", "refsource": "REDHAT",
"url" : "http://www.securitytracker.com/id/1032080" "url": "https://access.redhat.com/errata/RHSA-2017:1860"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name": "FEDORA-2015-5114",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154805.html"
},
{
"name": "DSA-3220",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3220"
},
{
"name": "FEDORA-2015-5182",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154741.html"
},
{
"name": "[oss-security] 20150329 Fw: GNU Libtasn1 4.4 released ( fixes stack overflow in asn1_der_decoding)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/03/29/4"
},
{
"name": "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=4d4f992826a4962790ecd0cce6fbba4a415ce149",
"refsource": "CONFIRM",
"url": "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=4d4f992826a4962790ecd0cce6fbba4a415ce149"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://kb.netapp.com/support/index?page=content&id=9010037",
"refsource" : "CONFIRM",
"url" : "https://kb.netapp.com/support/index?page=content&id=9010037"
},
{ {
"name": "74891", "name": "74891",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/74891" "url": "http://www.securityfocus.com/bid/74891"
},
{
"name": "https://kb.netapp.com/support/index?page=content&id=9010037",
"refsource": "CONFIRM",
"url": "https://kb.netapp.com/support/index?page=content&id=9010037"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20150129 Re: CVEs for Drupal contributed modules - January 2015", "name": "72110",
"refsource" : "MLIST", "refsource": "BID",
"url" : "http://www.openwall.com/lists/oss-security/2015/01/29/6" "url": "http://www.securityfocus.com/bid/72110"
}, },
{ {
"name": "https://www.drupal.org/node/2407321", "name": "https://www.drupal.org/node/2407321",
@ -68,9 +68,9 @@
"url": "https://www.drupal.org/node/2406949" "url": "https://www.drupal.org/node/2406949"
}, },
{ {
"name" : "72110", "name": "[oss-security] 20150129 Re: CVEs for Drupal contributed modules - January 2015",
"refsource" : "BID", "refsource": "MLIST",
"url" : "http://www.securityfocus.com/bid/72110" "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "MISC", "refsource": "MISC",
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2015-048.txt" "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2015-048.txt"
}, },
{
"name" : "https://owncloud.org/security/advisory/?id=oc-sa-2015-014",
"refsource" : "CONFIRM",
"url" : "https://owncloud.org/security/advisory/?id=oc-sa-2015-014"
},
{ {
"name": "DSA-3373", "name": "DSA-3373",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3373" "url": "http://www.debian.org/security/2015/dsa-3373"
},
{
"name": "https://owncloud.org/security/advisory/?id=oc-sa-2015-014",
"refsource": "CONFIRM",
"url": "https://owncloud.org/security/advisory/?id=oc-sa-2015-014"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.vmware.com/security/advisories/VMSA-2016-0001.html", "name": "1034604",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "http://www.vmware.com/security/advisories/VMSA-2016-0001.html" "url": "http://www.securitytracker.com/id/1034604"
}, },
{ {
"name": "1034603", "name": "1034603",
@ -63,9 +63,9 @@
"url": "http://www.securitytracker.com/id/1034603" "url": "http://www.securitytracker.com/id/1034603"
}, },
{ {
"name" : "1034604", "name": "http://www.vmware.com/security/advisories/VMSA-2016-0001.html",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1034604" "url": "http://www.vmware.com/security/advisories/VMSA-2016-0001.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-7091", "ID": "CVE-2015-7091",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://support.apple.com/HT205638",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205638"
},
{ {
"name": "APPLE-SA-2016-01-07-1", "name": "APPLE-SA-2016-01-07-1",
"refsource": "APPLE", "refsource": "APPLE",
@ -66,6 +61,11 @@
"name": "1034610", "name": "1034610",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034610" "url": "http://www.securitytracker.com/id/1034610"
},
{
"name": "https://support.apple.com/HT205638",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205638"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://www.drupal.org/node/2537860",
"refsource" : "MISC",
"url" : "https://www.drupal.org/node/2537860"
},
{ {
"name": "https://www.drupal.org/node/2537120", "name": "https://www.drupal.org/node/2537120",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.drupal.org/node/2537120" "url": "https://www.drupal.org/node/2537120"
},
{
"name": "https://www.drupal.org/node/2537860",
"refsource": "MISC",
"url": "https://www.drupal.org/node/2537860"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2015-7468", "ID": "CVE-2015-7468",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,105 +52,105 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.ntp.org/bin/view/Main/NtpBug2935",
"refsource" : "CONFIRM",
"url" : "http://support.ntp.org/bin/view/Main/NtpBug2935"
},
{
"name" : "https://bto.bluecoat.com/security-advisory/sa113",
"refsource" : "CONFIRM",
"url" : "https://bto.bluecoat.com/security-advisory/sa113"
},
{
"name" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us"
},
{
"name" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us"
},
{
"name" : "https://security.netapp.com/advisory/ntap-20171031-0001/",
"refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20171031-0001/"
},
{ {
"name": "20160120 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products - January 2016", "name": "20160120 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products - January 2016",
"refsource": "CISCO", "refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd" "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd"
}, },
{
"name" : "FreeBSD-SA-16:09",
"refsource" : "FREEBSD",
"url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc"
},
{
"name" : "GLSA-201607-15",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201607-15"
},
{
"name" : "SUSE-SU-2016:1175",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html"
},
{
"name" : "SUSE-SU-2016:1177",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html"
},
{
"name" : "SUSE-SU-2016:1247",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html"
},
{
"name" : "SUSE-SU-2016:1311",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html"
},
{
"name" : "SUSE-SU-2016:1912",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html"
},
{
"name" : "SUSE-SU-2016:2094",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html"
},
{
"name" : "openSUSE-SU-2016:1292",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html"
},
{
"name" : "openSUSE-SU-2016:1423",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html"
},
{ {
"name": "USN-3096-1", "name": "USN-3096-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3096-1" "url": "http://www.ubuntu.com/usn/USN-3096-1"
}, },
{
"name": "SUSE-SU-2016:1177",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html"
},
{
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us"
},
{
"name": "SUSE-SU-2016:1912",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html"
},
{
"name": "http://support.ntp.org/bin/view/Main/NtpBug2935",
"refsource": "CONFIRM",
"url": "http://support.ntp.org/bin/view/Main/NtpBug2935"
},
{
"name": "1034782",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034782"
},
{
"name": "openSUSE-SU-2016:1292",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html"
},
{ {
"name": "VU#718152", "name": "VU#718152",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/718152" "url": "https://www.kb.cert.org/vuls/id/718152"
}, },
{
"name": "SUSE-SU-2016:1247",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html"
},
{
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us"
},
{
"name": "https://security.netapp.com/advisory/ntap-20171031-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20171031-0001/"
},
{
"name": "SUSE-SU-2016:1311",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html"
},
{ {
"name": "81963", "name": "81963",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/81963" "url": "http://www.securityfocus.com/bid/81963"
}, },
{ {
"name" : "1034782", "name": "SUSE-SU-2016:2094",
"refsource" : "SECTRACK", "refsource": "SUSE",
"url" : "http://www.securitytracker.com/id/1034782" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html"
},
{
"name": "SUSE-SU-2016:1175",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html"
},
{
"name": "FreeBSD-SA-16:09",
"refsource": "FREEBSD",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc"
},
{
"name": "https://bto.bluecoat.com/security-advisory/sa113",
"refsource": "CONFIRM",
"url": "https://bto.bluecoat.com/security-advisory/sa113"
},
{
"name": "openSUSE-SU-2016:1423",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html"
},
{
"name": "GLSA-201607-15",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201607-15"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-0180", "ID": "CVE-2016-0180",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-060" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-060"
}, },
{
"name" : "90028",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/90028"
},
{ {
"name": "1035833", "name": "1035833",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035833" "url": "http://www.securitytracker.com/id/1035833"
},
{
"name": "90028",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/90028"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21983137",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21983137"
},
{ {
"name": "92472", "name": "92472",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/92472" "url": "http://www.securityfocus.com/bid/92472"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21983137",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21983137"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.vapidlabs.com/wp/wp_advisory.php?v=455",
"refsource" : "MISC",
"url" : "http://www.vapidlabs.com/wp/wp_advisory.php?v=455"
},
{ {
"name": "https://wordpress.org/plugins/tera-charts", "name": "https://wordpress.org/plugins/tera-charts",
"refsource": "MISC", "refsource": "MISC",
@ -66,6 +61,11 @@
"name": "93580", "name": "93580",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/93580" "url": "http://www.securityfocus.com/bid/93580"
},
{
"name": "http://www.vapidlabs.com/wp/wp_advisory.php?v=455",
"refsource": "MISC",
"url": "http://www.vapidlabs.com/wp/wp_advisory.php?v=455"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1303", "ID": "CVE-2016-1303",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1337", "ID": "CVE-2016-1337",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -62,15 +62,15 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/39904/" "url": "https://www.exploit-db.com/exploits/39904/"
}, },
{
"name" : "http://secorda.com/multiple-security-vulnerabilities-affecting-cisco-epc3928/",
"refsource" : "MISC",
"url" : "http://secorda.com/multiple-security-vulnerabilities-affecting-cisco-epc3928/"
},
{ {
"name": "91541", "name": "91541",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/91541" "url": "http://www.securityfocus.com/bid/91541"
},
{
"name": "http://secorda.com/multiple-security-vulnerabilities-affecting-cisco-epc3928/",
"refsource": "MISC",
"url": "http://secorda.com/multiple-security-vulnerabilities-affecting-cisco-epc3928/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4149", "ID": "CVE-2016-4149",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,39 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html", "name": "1036117",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html" "url": "http://www.securitytracker.com/id/1036117"
}, },
{ {
"name": "MS16-083", "name": "MS16-083",
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083"
}, },
{
"name": "openSUSE-SU-2016:1625",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html"
},
{ {
"name": "RHSA-2016:1238", "name": "RHSA-2016:1238",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1238" "url": "https://access.redhat.com/errata/RHSA-2016:1238"
}, },
{
"name" : "SUSE-SU-2016:1613",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html"
},
{ {
"name": "openSUSE-SU-2016:1621", "name": "openSUSE-SU-2016:1621",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html"
}, },
{ {
"name" : "openSUSE-SU-2016:1625", "name": "SUSE-SU-2016:1613",
"refsource": "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html"
}, },
{ {
"name" : "1036117", "name": "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1036117" "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4162", "ID": "CVE-2016-4162",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-15.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-15.html"
},
{ {
"name": "GLSA-201606-08", "name": "GLSA-201606-08",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201606-08" "url": "https://security.gentoo.org/glsa/201606-08"
}, },
{
"name" : "RHSA-2016:1079",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1079.html"
},
{ {
"name": "90618", "name": "90618",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/90618" "url": "http://www.securityfocus.com/bid/90618"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-15.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-15.html"
},
{
"name": "RHSA-2016:1079",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1079.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-4987", "ID": "CVE-2016-4987",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop_9.html", "name": "1037273",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop_9.html" "url": "http://www.securitytracker.com/id/1037273"
},
{
"name" : "https://crbug.com/658114",
"refsource" : "CONFIRM",
"url" : "https://crbug.com/658114"
}, },
{ {
"name": "GLSA-201611-16", "name": "GLSA-201611-16",
@ -68,9 +63,14 @@
"url": "https://security.gentoo.org/glsa/201611-16" "url": "https://security.gentoo.org/glsa/201611-16"
}, },
{ {
"name" : "RHSA-2016:2718", "name": "https://crbug.com/658114",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2718.html" "url": "https://crbug.com/658114"
},
{
"name": "https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop_9.html",
"refsource": "CONFIRM",
"url": "https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop_9.html"
}, },
{ {
"name": "94196", "name": "94196",
@ -78,9 +78,9 @@
"url": "http://www.securityfocus.com/bid/94196" "url": "http://www.securityfocus.com/bid/94196"
}, },
{ {
"name" : "1037273", "name": "RHSA-2016:2718",
"refsource" : "SECTRACK", "refsource": "REDHAT",
"url" : "http://www.securitytracker.com/id/1037273" "url": "http://rhn.redhat.com/errata/RHSA-2016-2718.html"
} }
] ]
} }

View File

@ -112,15 +112,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20190306 Cisco NX-OS Software Privilege Escalation Vulnerability",
"refsource" : "CISCO",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-privesc"
},
{ {
"name": "107328", "name": "107328",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/107328" "url": "http://www.securityfocus.com/bid/107328"
},
{
"name": "20190306 Cisco NX-OS Software Privilege Escalation Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-privesc"
} }
] ]
}, },