mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
113f5e63be
commit
e7b884962b
@ -53,15 +53,20 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://drupal.org/node/112146",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://drupal.org/node/112146"
|
||||
"name": "23887",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23887"
|
||||
},
|
||||
{
|
||||
"name": "22224",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/22224"
|
||||
},
|
||||
{
|
||||
"name": "projecttracking-extension-file-upload(31729)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31729"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-0312",
|
||||
"refsource": "VUPEN",
|
||||
@ -73,14 +78,9 @@
|
||||
"url": "http://osvdb.org/32134"
|
||||
},
|
||||
{
|
||||
"name" : "23887",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23887"
|
||||
},
|
||||
{
|
||||
"name" : "projecttracking-extension-file-upload(31729)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31729"
|
||||
"name": "http://drupal.org/node/112146",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://drupal.org/node/112146"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/3249"
|
||||
},
|
||||
{
|
||||
"name": "33607",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/33607"
|
||||
},
|
||||
{
|
||||
"name": "20070201 true: WebBuilder <= 2.0 Remote File Include Vulnerability",
|
||||
"refsource": "VIM",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "ADV-2007-0458",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/0458"
|
||||
},
|
||||
{
|
||||
"name" : "33607",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/33607"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,31 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070213 Aruba Networks - Unauthorized Administrative and WLAN Access through Guest Account",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/459927/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070213 Aruba Networks - Unauthorized Administrative and WLAN Access through Guest Account",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052382.html"
|
||||
},
|
||||
{
|
||||
"name" : "VU#613833",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/613833"
|
||||
},
|
||||
{
|
||||
"name" : "22538",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/22538"
|
||||
},
|
||||
{
|
||||
"name": "33185",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/33185"
|
||||
},
|
||||
{
|
||||
"name": "20070213 Aruba Networks - Unauthorized Administrative and WLAN Access through Guest Account",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/459927/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "24144",
|
||||
"refsource": "SECUNIA",
|
||||
@ -87,6 +72,21 @@
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/2243"
|
||||
},
|
||||
{
|
||||
"name": "22538",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/22538"
|
||||
},
|
||||
{
|
||||
"name": "VU#613833",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/613833"
|
||||
},
|
||||
{
|
||||
"name": "20070213 Aruba Networks - Unauthorized Administrative and WLAN Access through Guest Account",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052382.html"
|
||||
},
|
||||
{
|
||||
"name": "aruba-guestaccount-privilege-escalation(32461)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,175 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070418 rPSA-2007-0073-1 php php-mysql php-pgsql",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/466166/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.php-security.org/MOPB/MOPB-03-2007.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.php-security.org/MOPB/MOPB-03-2007.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://issues.rpath.com/browse/RPL-1268",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://issues.rpath.com/browse/RPL-1268"
|
||||
},
|
||||
{
|
||||
"name" : "http://us2.php.net/releases/4_4_7.php",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://us2.php.net/releases/4_4_7.php"
|
||||
},
|
||||
{
|
||||
"name" : "http://us2.php.net/releases/5_2_2.php",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://us2.php.net/releases/5_2_2.php"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.php.net/ChangeLog-5.php#5.2.4",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.php.net/ChangeLog-5.php#5.2.4"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.php.net/releases/5_2_4.php",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.php.net/releases/5_2_4.php"
|
||||
},
|
||||
{
|
||||
"name": "https://launchpad.net/bugs/173043",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://launchpad.net/bugs/173043"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.php.net/ChangeLog-4.php",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.php.net/ChangeLog-4.php"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.php.net/releases/4_4_8.php",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.php.net/releases/4_4_8.php"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200705-19",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200705-19.xml"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2007:087",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:087"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2007:088",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:088"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2007:089",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:089"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2007:090",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:090"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2007:0082",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0082.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2007:0154",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2007-0154.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2007:0155",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2007-0155.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2007:0163",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2007-0163.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2007:0162",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0162.html"
|
||||
},
|
||||
{
|
||||
"name" : "SSA:2008-045-03",
|
||||
"refsource" : "SLACKWARE",
|
||||
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2007:044",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-549-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/549-1/"
|
||||
},
|
||||
{
|
||||
"name" : "USN-549-2",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/usn-549-2"
|
||||
},
|
||||
{
|
||||
"name": "22764",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/22764"
|
||||
},
|
||||
{
|
||||
"name" : "32769",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/32769"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:11017",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11017"
|
||||
},
|
||||
{
|
||||
"name" : "1017771",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1017771"
|
||||
},
|
||||
{
|
||||
"name" : "24910",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24910"
|
||||
},
|
||||
{
|
||||
"name" : "24924",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24924"
|
||||
},
|
||||
{
|
||||
"name" : "24945",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24945"
|
||||
},
|
||||
{
|
||||
"name" : "24941",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24941"
|
||||
},
|
||||
{
|
||||
"name" : "24909",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24909"
|
||||
},
|
||||
{
|
||||
"name" : "25445",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/25445"
|
||||
"name": "RHSA-2007:0154",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2007-0154.html"
|
||||
},
|
||||
{
|
||||
"name": "26048",
|
||||
@ -228,19 +73,174 @@
|
||||
"url": "http://secunia.com/advisories/26048"
|
||||
},
|
||||
{
|
||||
"name" : "26642",
|
||||
"name": "20070418 rPSA-2007-0073-1 php php-mysql php-pgsql",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/466166/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200705-19",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200705-19.xml"
|
||||
},
|
||||
{
|
||||
"name": "24941",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26642"
|
||||
"url": "http://secunia.com/advisories/24941"
|
||||
},
|
||||
{
|
||||
"name": "27864",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27864"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2007:0162",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-0162.html"
|
||||
},
|
||||
{
|
||||
"name": "http://us2.php.net/releases/4_4_7.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://us2.php.net/releases/4_4_7.php"
|
||||
},
|
||||
{
|
||||
"name": "http://www.php.net/releases/4_4_8.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.php.net/releases/4_4_8.php"
|
||||
},
|
||||
{
|
||||
"name": "SSA:2008-045-03",
|
||||
"refsource": "SLACKWARE",
|
||||
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136"
|
||||
},
|
||||
{
|
||||
"name": "http://www.php.net/ChangeLog-5.php#5.2.4",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.php.net/ChangeLog-5.php#5.2.4"
|
||||
},
|
||||
{
|
||||
"name": "28936",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28936"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2007:090",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:090"
|
||||
},
|
||||
{
|
||||
"name": "http://www.php-security.org/MOPB/MOPB-03-2007.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.php-security.org/MOPB/MOPB-03-2007.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-549-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/549-1/"
|
||||
},
|
||||
{
|
||||
"name": "24909",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24909"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2007:087",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:087"
|
||||
},
|
||||
{
|
||||
"name": "24945",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24945"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:11017",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11017"
|
||||
},
|
||||
{
|
||||
"name": "https://issues.rpath.com/browse/RPL-1268",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://issues.rpath.com/browse/RPL-1268"
|
||||
},
|
||||
{
|
||||
"name": "32769",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/32769"
|
||||
},
|
||||
{
|
||||
"name": "http://us2.php.net/releases/5_2_2.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://us2.php.net/releases/5_2_2.php"
|
||||
},
|
||||
{
|
||||
"name": "1017771",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1017771"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2007:0082",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-0082.html"
|
||||
},
|
||||
{
|
||||
"name": "24924",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24924"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2007:0155",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2007-0155.html"
|
||||
},
|
||||
{
|
||||
"name": "24910",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24910"
|
||||
},
|
||||
{
|
||||
"name": "http://www.php.net/ChangeLog-4.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.php.net/ChangeLog-4.php"
|
||||
},
|
||||
{
|
||||
"name": "http://www.php.net/releases/5_2_4.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.php.net/releases/5_2_4.php"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2007:089",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:089"
|
||||
},
|
||||
{
|
||||
"name": "25445",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25445"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2007:0163",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2007-0163.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-549-2",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/usn-549-2"
|
||||
},
|
||||
{
|
||||
"name": "26642",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26642"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2007:088",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:088"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2007:044",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "4219",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/4219"
|
||||
},
|
||||
{
|
||||
"name": "http://xpkzxc.com/exploits/confixx.txt",
|
||||
"refsource": "MISC",
|
||||
@ -73,9 +68,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/25036"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-2743",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/2743"
|
||||
"name": "confixxpro-saveserver-file-include(35586)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35586"
|
||||
},
|
||||
{
|
||||
"name": "26300",
|
||||
@ -83,9 +78,14 @@
|
||||
"url": "http://secunia.com/advisories/26300"
|
||||
},
|
||||
{
|
||||
"name" : "confixxpro-saveserver-file-include(35586)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35586"
|
||||
"name": "ADV-2007-2743",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2743"
|
||||
},
|
||||
{
|
||||
"name": "4219",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/4219"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,40 +57,15 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/480238/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.infobyte.com.ar/adv/ISR-15.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.infobyte.com.ar/adv/ISR-15.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.barracudanetworks.com/ns/support/tech_alert.php",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.barracudanetworks.com/ns/support/tech_alert.php"
|
||||
},
|
||||
{
|
||||
"name" : "25757",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/25757"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-3257",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3257"
|
||||
},
|
||||
{
|
||||
"name" : "38156",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/38156"
|
||||
},
|
||||
{
|
||||
"name" : "1018733",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1018733"
|
||||
},
|
||||
{
|
||||
"name" : "26937",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26937"
|
||||
"name": "barracuda-webadmin-xss(36716)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36716"
|
||||
},
|
||||
{
|
||||
"name": "3164",
|
||||
@ -98,9 +73,34 @@
|
||||
"url": "http://securityreason.com/securityalert/3164"
|
||||
},
|
||||
{
|
||||
"name" : "barracuda-webadmin-xss(36716)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36716"
|
||||
"name": "38156",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/38156"
|
||||
},
|
||||
{
|
||||
"name": "http://www.barracudanetworks.com/ns/support/tech_alert.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.barracudanetworks.com/ns/support/tech_alert.php"
|
||||
},
|
||||
{
|
||||
"name": "26937",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26937"
|
||||
},
|
||||
{
|
||||
"name": "http://www.infobyte.com.ar/adv/ISR-15.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.infobyte.com.ar/adv/ISR-15.html"
|
||||
},
|
||||
{
|
||||
"name": "25757",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25757"
|
||||
},
|
||||
{
|
||||
"name": "1018733",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1018733"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20071011 [CAID 35724, 35725, 35726]: CA BrightStor ARCserve Backup Multiple Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/482121/100/0/threaded"
|
||||
"name": "27192",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27192"
|
||||
},
|
||||
{
|
||||
"name": "http://supportconnectw.ca.com/public/storage/infodocs/basb-secnotice.asp",
|
||||
@ -63,34 +63,34 @@
|
||||
"url": "http://supportconnectw.ca.com/public/storage/infodocs/basb-secnotice.asp"
|
||||
},
|
||||
{
|
||||
"name" : "26015",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/26015"
|
||||
"name": "ca-brightstor-dbasvr-code-execution(37068)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37068"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-3470",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/3470"
|
||||
"name": "20071011 [CAID 35724, 35725, 35726]: CA BrightStor ARCserve Backup Multiple Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/482121/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "41372",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/41372"
|
||||
},
|
||||
{
|
||||
"name": "26015",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26015"
|
||||
},
|
||||
{
|
||||
"name": "1018805",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1018805"
|
||||
},
|
||||
{
|
||||
"name" : "27192",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27192"
|
||||
},
|
||||
{
|
||||
"name" : "ca-brightstor-dbasvr-code-execution(37068)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/37068"
|
||||
"name": "ADV-2007-3470",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3470"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "4524",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/4524"
|
||||
},
|
||||
{
|
||||
"name": "26059",
|
||||
"refsource": "BID",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "40609",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/40609"
|
||||
},
|
||||
{
|
||||
"name": "4524",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/4524"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,26 +52,26 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "4531",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/4531"
|
||||
},
|
||||
{
|
||||
"name" : "26069",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/26069"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-3489",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3489"
|
||||
},
|
||||
{
|
||||
"name": "4531",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/4531"
|
||||
},
|
||||
{
|
||||
"name": "27149",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27149"
|
||||
},
|
||||
{
|
||||
"name": "26069",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26069"
|
||||
},
|
||||
{
|
||||
"name": "jetaudio-m3u-bo(37204)",
|
||||
"refsource": "XF",
|
||||
|
@ -53,39 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20150329 Fw: GNU Libtasn1 4.4 released ( fixes stack overflow in asn1_der_decoding)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2015/03/29/4"
|
||||
"name": "MDVSA-2015:193",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:193"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20150330 Re: Fw: GNU Libtasn1 4.4 released ( fixes stack overflow in asn1_der_decoding)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2015/03/31/2"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=4d4f992826a4962790ecd0cce6fbba4a415ce149",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=4d4f992826a4962790ecd0cce6fbba4a415ce149"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3220",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2015/dsa-3220"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2015-5114",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154805.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2015-5182",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154741.html"
|
||||
"name": "GLSA-201509-04",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201509-04"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2015-5199",
|
||||
@ -93,9 +68,9 @@
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155270.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2015-5245",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155483.html"
|
||||
"name": "USN-2559-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2559-1"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2015-5308",
|
||||
@ -108,24 +83,19 @@
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155435.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201509-04",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201509-04"
|
||||
"name": "FEDORA-2015-5245",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155483.html"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2015:193",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:193"
|
||||
"name": "[oss-security] 20150330 Re: Fw: GNU Libtasn1 4.4 released ( fixes stack overflow in asn1_der_decoding)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/03/31/2"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:1860",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:1860"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2559-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2559-1"
|
||||
"name": "1032080",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1032080"
|
||||
},
|
||||
{
|
||||
"name": "73436",
|
||||
@ -133,9 +103,39 @@
|
||||
"url": "http://www.securityfocus.com/bid/73436"
|
||||
},
|
||||
{
|
||||
"name" : "1032080",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1032080"
|
||||
"name": "RHSA-2017:1860",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1860"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2015-5114",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154805.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3220",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3220"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2015-5182",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154741.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20150329 Fw: GNU Libtasn1 4.4 released ( fixes stack overflow in asn1_der_decoding)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/03/29/4"
|
||||
},
|
||||
{
|
||||
"name": "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=4d4f992826a4962790ecd0cce6fbba4a415ce149",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=4d4f992826a4962790ecd0cce6fbba4a415ce149"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://kb.netapp.com/support/index?page=content&id=9010037",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://kb.netapp.com/support/index?page=content&id=9010037"
|
||||
},
|
||||
{
|
||||
"name": "74891",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/74891"
|
||||
},
|
||||
{
|
||||
"name": "https://kb.netapp.com/support/index?page=content&id=9010037",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kb.netapp.com/support/index?page=content&id=9010037"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20150129 Re: CVEs for Drupal contributed modules - January 2015",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2015/01/29/6"
|
||||
"name": "72110",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/72110"
|
||||
},
|
||||
{
|
||||
"name": "https://www.drupal.org/node/2407321",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "https://www.drupal.org/node/2406949"
|
||||
},
|
||||
{
|
||||
"name" : "72110",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/72110"
|
||||
"name": "[oss-security] 20150129 Re: CVEs for Drupal contributed modules - January 2015",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/01/29/6"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2015-048.txt"
|
||||
},
|
||||
{
|
||||
"name" : "https://owncloud.org/security/advisory/?id=oc-sa-2015-014",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://owncloud.org/security/advisory/?id=oc-sa-2015-014"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3373",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3373"
|
||||
},
|
||||
{
|
||||
"name": "https://owncloud.org/security/advisory/?id=oc-sa-2015-014",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://owncloud.org/security/advisory/?id=oc-sa-2015-014"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.vmware.com/security/advisories/VMSA-2016-0001.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.vmware.com/security/advisories/VMSA-2016-0001.html"
|
||||
"name": "1034604",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1034604"
|
||||
},
|
||||
{
|
||||
"name": "1034603",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securitytracker.com/id/1034603"
|
||||
},
|
||||
{
|
||||
"name" : "1034604",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1034604"
|
||||
"name": "http://www.vmware.com/security/advisories/VMSA-2016-0001.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/security/advisories/VMSA-2016-0001.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2015-7091",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.apple.com/HT205638",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT205638"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2016-01-07-1",
|
||||
"refsource": "APPLE",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "1034610",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1034610"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT205638",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT205638"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://www.drupal.org/node/2537860",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.drupal.org/node/2537860"
|
||||
},
|
||||
{
|
||||
"name": "https://www.drupal.org/node/2537120",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.drupal.org/node/2537120"
|
||||
},
|
||||
{
|
||||
"name": "https://www.drupal.org/node/2537860",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.drupal.org/node/2537860"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2015-7468",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,105 +52,105 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.ntp.org/bin/view/Main/NtpBug2935",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.ntp.org/bin/view/Main/NtpBug2935"
|
||||
},
|
||||
{
|
||||
"name" : "https://bto.bluecoat.com/security-advisory/sa113",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bto.bluecoat.com/security-advisory/sa113"
|
||||
},
|
||||
{
|
||||
"name" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us"
|
||||
},
|
||||
{
|
||||
"name" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us"
|
||||
},
|
||||
{
|
||||
"name" : "https://security.netapp.com/advisory/ntap-20171031-0001/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://security.netapp.com/advisory/ntap-20171031-0001/"
|
||||
},
|
||||
{
|
||||
"name": "20160120 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products - January 2016",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd"
|
||||
},
|
||||
{
|
||||
"name" : "FreeBSD-SA-16:09",
|
||||
"refsource" : "FREEBSD",
|
||||
"url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201607-15",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201607-15"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:1175",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:1177",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:1247",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:1311",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:1912",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:2094",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1292",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1423",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-3096-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3096-1"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:1177",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:1912",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.ntp.org/bin/view/Main/NtpBug2935",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.ntp.org/bin/view/Main/NtpBug2935"
|
||||
},
|
||||
{
|
||||
"name": "1034782",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1034782"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1292",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html"
|
||||
},
|
||||
{
|
||||
"name": "VU#718152",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "https://www.kb.cert.org/vuls/id/718152"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:1247",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us"
|
||||
},
|
||||
{
|
||||
"name": "https://security.netapp.com/advisory/ntap-20171031-0001/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20171031-0001/"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:1311",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html"
|
||||
},
|
||||
{
|
||||
"name": "81963",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/81963"
|
||||
},
|
||||
{
|
||||
"name" : "1034782",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1034782"
|
||||
"name": "SUSE-SU-2016:2094",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:1175",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html"
|
||||
},
|
||||
{
|
||||
"name": "FreeBSD-SA-16:09",
|
||||
"refsource": "FREEBSD",
|
||||
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc"
|
||||
},
|
||||
{
|
||||
"name": "https://bto.bluecoat.com/security-advisory/sa113",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bto.bluecoat.com/security-advisory/sa113"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1423",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201607-15",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201607-15"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2016-0180",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,15 +57,15 @@
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-060"
|
||||
},
|
||||
{
|
||||
"name" : "90028",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/90028"
|
||||
},
|
||||
{
|
||||
"name": "1035833",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1035833"
|
||||
},
|
||||
{
|
||||
"name": "90028",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/90028"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21983137",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21983137"
|
||||
},
|
||||
{
|
||||
"name": "92472",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/92472"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21983137",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21983137"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.vapidlabs.com/wp/wp_advisory.php?v=455",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.vapidlabs.com/wp/wp_advisory.php?v=455"
|
||||
},
|
||||
{
|
||||
"name": "https://wordpress.org/plugins/tera-charts",
|
||||
"refsource": "MISC",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "93580",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/93580"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vapidlabs.com/wp/wp_advisory.php?v=455",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.vapidlabs.com/wp/wp_advisory.php?v=455"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2016-1303",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2016-1337",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -62,15 +62,15 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/39904/"
|
||||
},
|
||||
{
|
||||
"name" : "http://secorda.com/multiple-security-vulnerabilities-affecting-cisco-epc3928/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://secorda.com/multiple-security-vulnerabilities-affecting-cisco-epc3928/"
|
||||
},
|
||||
{
|
||||
"name": "91541",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/91541"
|
||||
},
|
||||
{
|
||||
"name": "http://secorda.com/multiple-security-vulnerabilities-affecting-cisco-epc3928/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://secorda.com/multiple-security-vulnerabilities-affecting-cisco-epc3928/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2016-4149",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,39 +53,39 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html"
|
||||
"name": "1036117",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036117"
|
||||
},
|
||||
{
|
||||
"name": "MS16-083",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1625",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2016:1238",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2016:1238"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:1613",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1621",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1625",
|
||||
"name": "SUSE-SU-2016:1613",
|
||||
"refsource": "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html"
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html"
|
||||
},
|
||||
{
|
||||
"name" : "1036117",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1036117"
|
||||
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2016-4162",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-15.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-15.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201606-08",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201606-08"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:1079",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1079.html"
|
||||
},
|
||||
{
|
||||
"name": "90618",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/90618"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-15.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-15.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2016:1079",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-1079.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2016-4987",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop_9.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop_9.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://crbug.com/658114",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://crbug.com/658114"
|
||||
"name": "1037273",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037273"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201611-16",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "https://security.gentoo.org/glsa/201611-16"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:2718",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2718.html"
|
||||
"name": "https://crbug.com/658114",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://crbug.com/658114"
|
||||
},
|
||||
{
|
||||
"name": "https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop_9.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop_9.html"
|
||||
},
|
||||
{
|
||||
"name": "94196",
|
||||
@ -78,9 +78,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/94196"
|
||||
},
|
||||
{
|
||||
"name" : "1037273",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1037273"
|
||||
"name": "RHSA-2016:2718",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2718.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -112,15 +112,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20190306 Cisco NX-OS Software Privilege Escalation Vulnerability",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-privesc"
|
||||
},
|
||||
{
|
||||
"name": "107328",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/107328"
|
||||
},
|
||||
{
|
||||
"name": "20190306 Cisco NX-OS Software Privilege Escalation Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-privesc"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
Loading…
x
Reference in New Issue
Block a user