"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-02-13 04:03:57 +00:00
parent 33d05a94c2
commit 5ff4b954fe
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
70 changed files with 3227 additions and 3889 deletions

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-1171",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,42 +27,66 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "44150",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44150"
"url": "http://secunia.com/advisories/44150",
"refsource": "MISC",
"name": "http://secunia.com/advisories/44150"
},
{
"name": "RHSA-2011:0434",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0434.html"
"url": "http://www.redhat.com/support/errata/RHSA-2011-0434.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0434.html"
},
{
"name": "1025316",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025316"
"url": "http://www.securityfocus.com/bid/47316",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/47316"
},
{
"name": "rhnss-xmlrpcapi-info-disclosure(66690)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66690"
"url": "http://www.securitytracker.com/id?1025316",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1025316"
},
{
"name": "47316",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/47316"
"url": "http://www.vupen.com/english/advisories/2011/0967",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0967"
},
{
"name": "ADV-2011-0967",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0967"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66690",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66690"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=584118",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=584118"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=584118",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=584118"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-1172",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,82 +27,106 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "40908",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40908"
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
"refsource": "MISC",
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
},
{
"name": "SUSE-SR:2010:020",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
},
{
"name": "ADV-2010-2063",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2063"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html"
},
{
"name": "glib-property-security-bypass(61041)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61041"
"url": "http://secunia.com/advisories/42397",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42397"
},
{
"name": "http://cgit.freedesktop.org/dbus/dbus-glib/commit/?h=rhel5&id=9a6bce9b615abca6068348c1606ba8eaf13d9ae0",
"refsource": "CONFIRM",
"url": "http://cgit.freedesktop.org/dbus/dbus-glib/commit/?h=rhel5&id=9a6bce9b615abca6068348c1606ba8eaf13d9ae0"
"url": "http://www.vupen.com/english/advisories/2010/3097",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/3097"
},
{
"name": "SUSE-SR:2010:022",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html"
},
{
"name": "40925",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40925"
"url": "http://cgit.freedesktop.org/dbus/dbus-glib/commit/?h=rhel5&id=9a6bce9b615abca6068348c1606ba8eaf13d9ae0",
"refsource": "MISC",
"name": "http://cgit.freedesktop.org/dbus/dbus-glib/commit/?h=rhel5&id=9a6bce9b615abca6068348c1606ba8eaf13d9ae0"
},
{
"name": "42397",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42397"
"url": "http://secunia.com/advisories/40908",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40908"
},
{
"name": "http://support.avaya.com/css/P8/documents/100113103",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/css/P8/documents/100113103"
"url": "http://secunia.com/advisories/40925",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40925"
},
{
"name": "42347",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/42347"
"url": "http://support.avaya.com/css/P8/documents/100113103",
"refsource": "MISC",
"name": "http://support.avaya.com/css/P8/documents/100113103"
},
{
"name": "ADV-2010-3097",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3097"
"url": "http://www.redhat.com/support/errata/RHSA-2010-0616.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0616.html"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
"url": "http://www.securityfocus.com/bid/42347",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/42347"
},
{
"name": "SUSE-SR:2010:019",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
"url": "http://www.vupen.com/english/advisories/2010/2063",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/2063"
},
{
"name": "RHSA-2010:0616",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0616.html"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61041",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61041"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=585394",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=585394"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=585394",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=585394"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-1173 kernel: sctp: crash due to malformed SCTPChunkInit packet"
"value": "The sctp_process_unk_param function in net/sctp/sm_make_chunk.c in the Linux kernel 2.6.33.3 and earlier, when SCTP is enabled, allows remote attackers to cause a denial of service (system crash) via an SCTPChunkInit packet containing multiple invalid parameters that require a large amount of error data."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"cweId": "CWE-119"
"value": "n/a"
}
]
}
@ -32,38 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "MRG for RHEL-5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:2.6.24.7-161.el5rt",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 4",
"version": {
"version_data": [
{
"version_value": "0:2.6.9-89.0.26.EL",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5",
"version": {
"version_data": [
{
"version_value": "0:2.6.18-194.8.1.el5",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -76,11 +53,6 @@
},
"references": {
"reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2010:0631",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0631"
},
{
"url": "http://secunia.com/advisories/43315",
"refsource": "MISC",
@ -152,60 +124,14 @@
"name": "http://www.redhat.com/support/errata/RHSA-2010-0474.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0474",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11416",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0474"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0504",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0504"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-1173",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-1173"
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11416"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=584645",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=584645"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11416",
"refsource": "MISC",
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11416"
}
]
},
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Jukka Taimisto (Codenomicon Ltd), Nokia Siemens Networks, Olli Jarva (Codenomicon Ltd), and Wind River for reporting this issue."
}
],
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 7.1,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-1428",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,67 +27,86 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2010:0379",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2010-0379.html"
"url": "http://marc.info/?l=bugtraq&m=132698550418872&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=bugtraq&m=132698550418872&w=2"
},
{
"name": "RHSA-2010:0378",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2010-0378.html"
"url": "http://secunia.com/advisories/39563",
"refsource": "MISC",
"name": "http://secunia.com/advisories/39563"
},
{
"name": "jboss-webconsole-information-disclosure(58148)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58148"
"url": "http://www.securityfocus.com/bid/39710",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/39710"
},
{
"name": "HPSBMU02736",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=132698550418872&w=2"
"url": "http://www.vupen.com/english/advisories/2010/0992",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/0992"
},
{
"name": "RHSA-2010:0376",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2010-0376.html"
"url": "https://rhn.redhat.com/errata/RHSA-2010-0376.html",
"refsource": "MISC",
"name": "https://rhn.redhat.com/errata/RHSA-2010-0376.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=585899",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=585899"
"url": "https://rhn.redhat.com/errata/RHSA-2010-0377.html",
"refsource": "MISC",
"name": "https://rhn.redhat.com/errata/RHSA-2010-0377.html"
},
{
"name": "RHSA-2010:0377",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2010-0377.html"
"url": "https://rhn.redhat.com/errata/RHSA-2010-0378.html",
"refsource": "MISC",
"name": "https://rhn.redhat.com/errata/RHSA-2010-0378.html"
},
{
"name": "SSRT100699",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=132698550418872&w=2"
"url": "https://rhn.redhat.com/errata/RHSA-2010-0379.html",
"refsource": "MISC",
"name": "https://rhn.redhat.com/errata/RHSA-2010-0379.html"
},
{
"name": "ADV-2010-0992",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0992"
"url": "http://securitytracker.com/id?1023917",
"refsource": "MISC",
"name": "http://securitytracker.com/id?1023917"
},
{
"name": "1023917",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1023917"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58148",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58148"
},
{
"name": "39710",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/39710"
},
{
"name": "39563",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39563"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=585899",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=585899"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-1429",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 allows remote attackers to obtain sensitive information about \"deployed web contexts\" via a request to the status servlet, as demonstrated by a full=true query string. NOTE: this issue exists because of a CVE-2008-3273 regression."
"value": "Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 allows remote attackers to obtain sensitive information about \"deployed web contexts\" via a request to the status servlet, as demonstrated by a full=true query string. NOTE: this issue exists because of a CVE-2008-3273 regression."
}
]
},
@ -50,72 +27,91 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2010:0379",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2010-0379.html"
"url": "http://marc.info/?l=bugtraq&m=132698550418872&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=bugtraq&m=132698550418872&w=2"
},
{
"name": "RHSA-2010:0378",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2010-0378.html"
"url": "http://secunia.com/advisories/39563",
"refsource": "MISC",
"name": "http://secunia.com/advisories/39563"
},
{
"name": "HPSBMU02736",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=132698550418872&w=2"
"url": "http://securitytracker.com/id?1023918",
"refsource": "MISC",
"name": "http://securitytracker.com/id?1023918"
},
{
"name": "RHSA-2010:0376",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2010-0376.html"
"url": "http://www.securityfocus.com/bid/39710",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/39710"
},
{
"name": "RHSA-2010:0377",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2010-0377.html"
"url": "http://www.vupen.com/english/advisories/2010/0992",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/0992"
},
{
"name": "jboss-status-servlet-information-disclosure(58149)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58149"
"url": "https://rhn.redhat.com/errata/RHSA-2010-0376.html",
"refsource": "MISC",
"name": "https://rhn.redhat.com/errata/RHSA-2010-0376.html"
},
{
"name": "SSRT100699",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=132698550418872&w=2"
"url": "https://rhn.redhat.com/errata/RHSA-2010-0377.html",
"refsource": "MISC",
"name": "https://rhn.redhat.com/errata/RHSA-2010-0377.html"
},
{
"name": "ADV-2010-0992",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0992"
"url": "https://rhn.redhat.com/errata/RHSA-2010-0378.html",
"refsource": "MISC",
"name": "https://rhn.redhat.com/errata/RHSA-2010-0378.html"
},
{
"name": "44009",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/44009/"
"url": "https://rhn.redhat.com/errata/RHSA-2010-0379.html",
"refsource": "MISC",
"name": "https://rhn.redhat.com/errata/RHSA-2010-0379.html"
},
{
"name": "39710",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/39710"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58149",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58149"
},
{
"name": "39563",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39563"
"url": "https://www.exploit-db.com/exploits/44009/",
"refsource": "MISC",
"name": "https://www.exploit-db.com/exploits/44009/"
},
{
"name": "1023918",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1023918"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=585900",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=585900"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=585900",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=585900"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-1431",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,82 +27,106 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "20100421 Bonsai Information Security - SQL Injection in Cacti <= 0.8.7e",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2010/Apr/272"
},
{
"name": "ADV-2010-0986",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0986"
},
{
"name": "DSA-2039",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2039"
},
{
"name": "http://www.cacti.net/downloads/patches/0.8.7e/sql_injection_template_export.patch",
"refsource": "CONFIRM",
"url": "http://www.cacti.net/downloads/patches/0.8.7e/sql_injection_template_export.patch"
},
{
"name": "ADV-2010-1107",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1107"
},
{
"name": "SUSE-SR:2010:011",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
},
{
"name": "41041",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41041"
},
{
"name": "39568",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39568"
},
{
"name": "RHSA-2010:0635",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2010-0635.html"
},
{
"name": "MDVSA-2010:092",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:092"
},
{
"name": "ADV-2010-2132",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2132"
},
{
"name": "39653",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/39653"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=578909",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=578909"
},
{
"name": "39572",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39572"
},
{
"name": "http://www.exploit-db.com/sploits/Bonsai-SQL_Injection_in_Cacti.pdf",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html",
"refsource": "MISC",
"url": "http://www.exploit-db.com/sploits/Bonsai-SQL_Injection_in_Cacti.pdf"
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
},
{
"url": "http://www.vupen.com/english/advisories/2010/1107",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/1107"
},
{
"url": "http://secunia.com/advisories/41041",
"refsource": "MISC",
"name": "http://secunia.com/advisories/41041"
},
{
"url": "http://www.vupen.com/english/advisories/2010/2132",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/2132"
},
{
"url": "https://rhn.redhat.com/errata/RHSA-2010-0635.html",
"refsource": "MISC",
"name": "https://rhn.redhat.com/errata/RHSA-2010-0635.html"
},
{
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=578909",
"refsource": "MISC",
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=578909"
},
{
"url": "http://seclists.org/fulldisclosure/2010/Apr/272",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2010/Apr/272"
},
{
"url": "http://secunia.com/advisories/39568",
"refsource": "MISC",
"name": "http://secunia.com/advisories/39568"
},
{
"url": "http://secunia.com/advisories/39572",
"refsource": "MISC",
"name": "http://secunia.com/advisories/39572"
},
{
"url": "http://www.cacti.net/downloads/patches/0.8.7e/sql_injection_template_export.patch",
"refsource": "MISC",
"name": "http://www.cacti.net/downloads/patches/0.8.7e/sql_injection_template_export.patch"
},
{
"url": "http://www.debian.org/security/2010/dsa-2039",
"refsource": "MISC",
"name": "http://www.debian.org/security/2010/dsa-2039"
},
{
"url": "http://www.exploit-db.com/sploits/Bonsai-SQL_Injection_in_Cacti.pdf",
"refsource": "MISC",
"name": "http://www.exploit-db.com/sploits/Bonsai-SQL_Injection_in_Cacti.pdf"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:092",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:092"
},
{
"url": "http://www.securityfocus.com/bid/39653",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/39653"
},
{
"url": "http://www.vupen.com/english/advisories/2010/0986",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/0986"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-1436 kernel: gfs2 buffer overflow"
"value": "gfs2 in the Linux kernel 2.6.18, and possibly other versions, does not properly handle when the gfs2_quota struct occupies two separate pages, which allows local users to cause a denial of service (kernel panic) via certain manipulations that cause an out-of-bounds write, as demonstrated by writing from an ext3 file system to a gfs2 file system."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"cweId": "CWE-119"
"value": "n/a"
}
]
}
@ -32,16 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:2.6.18-194.8.1.el5",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -69,11 +68,6 @@
"refsource": "MISC",
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0504",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0504"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/04/27/1",
"refsource": "MISC",
@ -84,16 +78,6 @@
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/04/28/1"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-1436",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-1436"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=586006",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=586006"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58839",
"refsource": "MISC",
@ -103,31 +87,11 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10652",
"refsource": "MISC",
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10652"
}
]
},
"impact": {
"cvss": [
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 7.2,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "COMPLETE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "COMPLETE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=586006",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=586006"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-1437 kernel: keyrings: find_keyring_by_name() can gain the freed keyring"
"value": "Race condition in the find_keyring_by_name function in security/keys/keyring.c in the Linux kernel 2.6.34-rc5 and earlier allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via keyctl session commands that trigger access to a dead keyring that is undergoing deletion by the key_cleanup function."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"cweId": "CWE-119"
"value": "n/a"
}
]
}
@ -32,38 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "MRG for RHEL-5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:2.6.24.7-161.el5rt",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 4",
"version": {
"version_data": [
{
"version_value": "0:2.6.9-89.0.26.EL",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5",
"version": {
"version_data": [
{
"version_value": "0:2.6.18-194.8.1.el5",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -76,11 +53,6 @@
},
"references": {
"reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2010:0631",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0631"
},
{
"url": "http://secunia.com/advisories/43315",
"refsource": "MISC",
@ -116,16 +88,6 @@
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0474.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0474",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0474"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0504",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0504"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html",
"refsource": "MISC",
@ -171,16 +133,6 @@
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/39719"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-1437",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-1437"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=585094",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=585094"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58254",
"refsource": "MISC",
@ -200,31 +152,11 @@
"url": "https://patchwork.kernel.org/patch/94664/",
"refsource": "MISC",
"name": "https://patchwork.kernel.org/patch/94664/"
}
]
},
"impact": {
"cvss": [
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 7.2,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "COMPLETE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "COMPLETE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=585094",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=585094"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-1439",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,52 +27,76 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "oval:org.mitre.oval:def:9232",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9232"
"url": "http://secunia.com/advisories/39996",
"refsource": "MISC",
"name": "http://secunia.com/advisories/39996"
},
{
"name": "1024049",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1024049"
"url": "http://securitytracker.com/id?1024049",
"refsource": "MISC",
"name": "http://securitytracker.com/id?1024049"
},
{
"name": "39996",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39996"
"url": "http://www.osvdb.org/65063",
"refsource": "MISC",
"name": "http://www.osvdb.org/65063"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=585386",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=585386"
"url": "http://www.redhat.com/support/errata/RHSA-2010-0449.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0449.html"
},
{
"name": "redhat-clienttools-loginauth-security-bypass(59114)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59114"
"url": "http://www.securityfocus.com/bid/40492",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/40492"
},
{
"name": "40492",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/40492"
"url": "http://www.vupen.com/english/advisories/2010/1311",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/1311"
},
{
"name": "ADV-2010-1311",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1311"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59114",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59114"
},
{
"name": "RHSA-2010:0449",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0449.html"
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9232",
"refsource": "MISC",
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9232"
},
{
"name": "65063",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/65063"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=585386",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=585386"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-1440 tetex, texlive: Integer overflow by processing special commands"
"value": "Multiple integer overflows in dvipsk/dospecial.c in dvips in TeX Live 2009 and earlier, and teTeX, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a special command in a DVI file, related to the (1) predospecial and (2) bbdospecial functions, a different vulnerability than CVE-2010-0739."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Integer Overflow or Wraparound",
"cweId": "CWE-190"
"value": "n/a"
}
]
}
@ -32,38 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 3",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:1.0.7-67.19",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 4",
"version": {
"version_data": [
{
"version_value": "0:2.0.2-22.0.1.EL4.16",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5",
"version": {
"version_data": [
{
"version_value": "0:3.0-33.8.el5_5.5",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -76,16 +53,6 @@
},
"references": {
"reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2010:0399",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0399"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0400",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0400"
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041573.html",
"refsource": "MISC",
@ -112,49 +79,14 @@
"name": "http://www.ubuntu.com/usn/USN-937-1"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0401",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10068",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0401"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-1440",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-1440"
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10068"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=586819",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=586819"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10068",
"refsource": "MISC",
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10068"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.8,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3850",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,92 +27,116 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=16c41745c7b92a243d0874f534c1655196c64b74",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=16c41745c7b92a243d0874f534c1655196c64b74"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051"
},
{
"name": "43056",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43056"
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=644156",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=644156"
"url": "http://www.vupen.com/english/advisories/2011/0298",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0298"
},
{
"name": "20101207 Linux kernel exploit",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0086.html"
"url": "http://www.debian.org/security/2010/dsa-2126",
"refsource": "MISC",
"name": "http://www.debian.org/security/2010/dsa-2126"
},
{
"name": "SUSE-SA:2011:007",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"
},
{
"name": "[oss-security] 20101129 kernel: Multiple vulnerabilities in AF_ECONET",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/11/30/1"
"url": "http://secunia.com/advisories/43291",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43291"
},
{
"name": "ADV-2011-0298",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0298"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:257",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:257"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2"
"url": "http://www.vupen.com/english/advisories/2011/0375",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0375"
},
{
"name": "MDVSA-2011:051",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051"
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00007.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00007.html"
},
{
"name": "MDVSA-2010:257",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:257"
"url": "http://secunia.com/advisories/43056",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43056"
},
{
"name": "SUSE-SA:2011:005",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00007.html"
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2"
},
{
"name": "ADV-2011-0375",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0375"
"url": "http://www.vupen.com/english/advisories/2011/0213",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0213"
},
{
"name": "USN-1023-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1023-1"
"url": "http://openwall.com/lists/oss-security/2010/11/30/1",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/11/30/1"
},
{
"name": "SUSE-SA:2011:008",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"
"url": "http://www.ubuntu.com/usn/USN-1023-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1023-1"
},
{
"name": "43291",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43291"
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0086.html",
"refsource": "MISC",
"name": "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0086.html"
},
{
"name": "ADV-2011-0213",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0213"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=16c41745c7b92a243d0874f534c1655196c64b74",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=16c41745c7b92a243d0874f534c1655196c64b74"
},
{
"name": "DSA-2126",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2126"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=644156",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=644156"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3851",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,72 +27,96 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[Libguestfs] 20101022 [PATCH 0/8 v2] Complete fix for CVE-2010-3851.",
"refsource": "MLIST",
"url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00041.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=643958",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050237.html",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=643958"
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050237.html"
},
{
"name": "http://rwmj.wordpress.com/2010/10/23/new-libguestfs-stable-versions/",
"refsource": "CONFIRM",
"url": "http://rwmj.wordpress.com/2010/10/23/new-libguestfs-stable-versions/"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050742.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050742.html"
},
{
"name": "[Libguestfs] 20101021 [PATCH 0/2] First part of fix for CVE-2010-3851",
"refsource": "MLIST",
"url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00037.html"
"url": "http://rwmj.wordpress.com/2010/10/23/new-libguestfs-stable-versions/",
"refsource": "MISC",
"name": "http://rwmj.wordpress.com/2010/10/23/new-libguestfs-stable-versions/"
},
{
"name": "FEDORA-2010-16835",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050237.html"
"url": "http://secunia.com/advisories/41797",
"refsource": "MISC",
"name": "http://secunia.com/advisories/41797"
},
{
"name": "FEDORA-2010-17202",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050742.html"
"url": "http://secunia.com/advisories/42235",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42235"
},
{
"name": "ADV-2010-2963",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2963"
"url": "http://www.redhat.com/support/errata/RHSA-2011-0586.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0586.html"
},
{
"name": "RHSA-2011:0586",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0586.html"
"url": "http://www.securityfocus.com/bid/44166",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/44166"
},
{
"name": "44166",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/44166"
"url": "http://www.vupen.com/english/advisories/2010/2874",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/2874"
},
{
"name": "41797",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41797"
"url": "http://www.vupen.com/english/advisories/2010/2963",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/2963"
},
{
"name": "[Libguestfs] 20101019 CVE-2010-3851libguestfs:missing disk format specifier when adding a disk",
"refsource": "MLIST",
"url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00036.html"
"url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00036.html",
"refsource": "MISC",
"name": "https://www.redhat.com/archives/libguestfs/2010-October/msg00036.html"
},
{
"name": "42235",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42235"
"url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00037.html",
"refsource": "MISC",
"name": "https://www.redhat.com/archives/libguestfs/2010-October/msg00037.html"
},
{
"name": "ADV-2010-2874",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2874"
"url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00041.html",
"refsource": "MISC",
"name": "https://www.redhat.com/archives/libguestfs/2010-October/msg00041.html"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=643958",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=643958"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3852",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,67 +27,91 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "ADV-2010-2900",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2900"
"url": "http://git.fedorahosted.org/git/?p=luci.git%3Ba=commit%3Bh=9e0bbf0c5faa198379d945474f7d55da5031cacf",
"refsource": "MISC",
"name": "http://git.fedorahosted.org/git/?p=luci.git%3Ba=commit%3Bh=9e0bbf0c5faa198379d945474f7d55da5031cacf"
},
{
"name": "44611",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/44611"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050244.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050244.html"
},
{
"name": "42123",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42123"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050246.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050246.html"
},
{
"name": "ADV-2010-2873",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2873"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050309.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050309.html"
},
{
"name": "FEDORA-2010-16617",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050244.html"
"url": "http://osvdb.org/69015",
"refsource": "MISC",
"name": "http://osvdb.org/69015"
},
{
"name": "42113",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42113"
"url": "http://secunia.com/advisories/42113",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42113"
},
{
"name": "FEDORA-2010-16848",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050309.html"
"url": "http://secunia.com/advisories/42123",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42123"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=626504",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=626504"
"url": "http://www.securityfocus.com/bid/44611",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/44611"
},
{
"name": "69015",
"refsource": "OSVDB",
"url": "http://osvdb.org/69015"
"url": "http://www.vupen.com/english/advisories/2010/2873",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/2873"
},
{
"name": "luci-whoini-weak-security(62980)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62980"
"url": "http://www.vupen.com/english/advisories/2010/2900",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/2900"
},
{
"name": "http://git.fedorahosted.org/git/?p=luci.git;a=commit;h=9e0bbf0c5faa198379d945474f7d55da5031cacf",
"refsource": "CONFIRM",
"url": "http://git.fedorahosted.org/git/?p=luci.git;a=commit;h=9e0bbf0c5faa198379d945474f7d55da5031cacf"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62980",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62980"
},
{
"name": "FEDORA-2010-16601",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050246.html"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=626504",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=626504"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3853",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,62 +27,86 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "GLSA-201206-31",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201206-31.xml"
"url": "http://lists.vmware.com/pipermail/security-announce/2011/000126.html",
"refsource": "MISC",
"name": "http://lists.vmware.com/pipermail/security-announce/2011/000126.html"
},
{
"name": "[security-announce] 20110307 VMSA-2011-0004 VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm",
"refsource": "MLIST",
"url": "http://lists.vmware.com/pipermail/security-announce/2011/000126.html"
"url": "http://secunia.com/advisories/49711",
"refsource": "MISC",
"name": "http://secunia.com/advisories/49711"
},
{
"name": "ADV-2011-0606",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0606"
"url": "http://security.gentoo.org/glsa/glsa-201206-31.xml",
"refsource": "MISC",
"name": "http://security.gentoo.org/glsa/glsa-201206-31.xml"
},
{
"name": "20110308 VMSA-2011-0004 VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/516909/100/0/threaded"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:220",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:220"
},
{
"name": "MDVSA-2010:220",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:220"
"url": "http://www.redhat.com/support/errata/RHSA-2010-0819.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0819.html"
},
{
"name": "49711",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49711"
"url": "http://www.redhat.com/support/errata/RHSA-2010-0891.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0891.html"
},
{
"name": "RHSA-2010:0891",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0891.html"
"url": "http://www.securityfocus.com/archive/1/516909/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/516909/100/0/threaded"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=643043",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=643043"
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0004.html",
"refsource": "MISC",
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0004.html"
},
{
"name": "RHSA-2010:0819",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0819.html"
"url": "http://www.vupen.com/english/advisories/2011/0606",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0606"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0004.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0004.html"
"url": "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/modules/pam_namespace/pam_namespace.c?view=log#rev1.13",
"refsource": "MISC",
"name": "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/modules/pam_namespace/pam_namespace.c?view=log#rev1.13"
},
{
"name": "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/modules/pam_namespace/pam_namespace.c?view=log#rev1.13",
"refsource": "CONFIRM",
"url": "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/modules/pam_namespace/pam_namespace.c?view=log#rev1.13"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=643043",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=643043"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3854",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,47 +27,71 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "couchdb-adminui-xss(65050)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65050"
"url": "http://mail-archives.apache.org/mod_mbox/couchdb-dev/201101.mbox/%3CC840F655-C8C5-4EC6-8AA8-DD223E39C34A%40apache.org%3E",
"refsource": "MISC",
"name": "http://mail-archives.apache.org/mod_mbox/couchdb-dev/201101.mbox/%3CC840F655-C8C5-4EC6-8AA8-DD223E39C34A%40apache.org%3E"
},
{
"name": "[couchdb-dev] 20110128 CVE-2010-3854: Apache CouchDB Cross Site Scripting Issue",
"refsource": "MLIST",
"url": "http://mail-archives.apache.org/mod_mbox/couchdb-dev/201101.mbox/%3CC840F655-C8C5-4EC6-8AA8-DD223E39C34A@apache.org%3E"
"url": "http://osvdb.org/70734",
"refsource": "MISC",
"name": "http://osvdb.org/70734"
},
{
"name": "70734",
"refsource": "OSVDB",
"url": "http://osvdb.org/70734"
"url": "http://secunia.com/advisories/43111",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43111"
},
{
"name": "ADV-2011-0263",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0263"
"url": "http://www.securityfocus.com/archive/1/516058/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/516058/100/0/threaded"
},
{
"name": "46066",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46066"
"url": "http://www.securityfocus.com/bid/46066",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/46066"
},
{
"name": "20110128 CVE-2010-3854: Apache CouchDB Cross Site Scripting Issue",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/516058/100/0/threaded"
"url": "http://www.securitytracker.com/id?1025013",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1025013"
},
{
"name": "43111",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43111"
"url": "http://www.vupen.com/english/advisories/2011/0263",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0263"
},
{
"name": "1025013",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025013"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65050",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65050"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-3855 Freetype : Heap based buffer overflow in ft_var_readpackedpoints()"
"value": "Buffer overflow in the ft_var_readpackedpoints function in truetype/ttgxvar.c in FreeType 2.4.3 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TrueType GX font."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Heap-based Buffer Overflow",
"cweId": "CWE-122"
"value": "n/a"
}
]
}
@ -32,38 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 4",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:2.1.9-17.el4_8.1",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5",
"version": {
"version_data": [
{
"version_value": "0:2.2.1-28.el5_5.1",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:2.3.11-6.el6_0.2",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -221,51 +198,11 @@
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0246"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0889",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0889"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-3855",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-3855"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=645275",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=645275"
},
{
"url": "https://savannah.nongnu.org/bugs/?31310",
"refsource": "MISC",
"name": "https://savannah.nongnu.org/bugs/?31310"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.8,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-3856 glibc: ld.so arbitrary DSO loading via LD_AUDIT in setuid/setgid programs"
"value": "ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Untrusted Search Path",
"cweId": "CWE-426"
"value": "n/a"
}
]
}
@ -32,27 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:2.5-49.el5_5.7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:2.12-1.7.el6_0.3",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -105,11 +93,6 @@
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1009-1"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0872",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0872"
},
{
"url": "https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html",
"refsource": "MISC",
@ -161,49 +144,14 @@
"name": "http://www.securityfocus.com/bid/44347"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0793",
"url": "https://rhn.redhat.com/errata/RHSA-2010-0793.html",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0793"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-3856",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-3856"
"name": "https://rhn.redhat.com/errata/RHSA-2010-0793.html"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=645672",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=645672"
},
{
"url": "https://rhn.redhat.com/errata/RHSA-2010-0793.html",
"refsource": "MISC",
"name": "https://rhn.redhat.com/errata/RHSA-2010-0793.html"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 7.2,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "COMPLETE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "COMPLETE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3857",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "JBoss BRMS",
"product": {
"product_data": [
{
"product_name": "JBoss BRMS",
"version": {
"version_data": [
{
"version_value": "before 5.1.0"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,12 +27,36 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "JBoss BRMS",
"product": {
"product_data": [
{
"product_name": "JBoss BRMS",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "before 5.1.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://security-tracker.debian.org/tracker/CVE-2010-3857",
"url": "https://access.redhat.com/security/cve/cve-2010-3857",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2010-3857"
"name": "https://access.redhat.com/security/cve/cve-2010-3857"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-3857",
@ -63,9 +64,9 @@
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-3857"
},
{
"url": "https://access.redhat.com/security/cve/cve-2010-3857",
"url": "https://security-tracker.debian.org/tracker/CVE-2010-3857",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2010-3857"
"name": "https://security-tracker.debian.org/tracker/CVE-2010-3857"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3858",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,107 +27,131 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "42789",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42789"
},
{
"name": "ADV-2011-0024",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0024"
},
{
"name": "RHSA-2011:0004",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0004.html"
},
{
"name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"name": "46397",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46397"
},
{
"name": "USN-1041-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1041-1"
},
{
"name": "[oss-security] 20101021 CVE request: kernel: setup_arg_pages: diagnose excessive argument size",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/10/21/1"
},
{
"name": "RHSA-2010:0958",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1b528181b2ffa14721fb28ad1bd539fe1732c583",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1b528181b2ffa14721fb28ad1bd539fe1732c583"
},
{
"name": "MDVSA-2010:257",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:257"
},
{
"name": "15619",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/15619"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"name": "42758",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42758"
},
{
"name": "[oss-security] 20101022 Re: CVE request: kernel: setup_arg_pages: diagnose excessive argument size",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/10/22/4"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36"
},
{
"name": "44301",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/44301"
},
{
"name": "http://grsecurity.net/~spender/64bit_dos.c",
"url": "http://secunia.com/advisories/42758",
"refsource": "MISC",
"url": "http://grsecurity.net/~spender/64bit_dos.c"
"name": "http://secunia.com/advisories/42758"
},
{
"name": "ADV-2011-0070",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0070"
"url": "http://www.ubuntu.com/usn/USN-1041-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1041-1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=645222",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=645222"
"url": "http://www.vupen.com/english/advisories/2011/0070",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0070"
},
{
"name": "DSA-2126",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2126"
"url": "http://www.debian.org/security/2010/dsa-2126",
"refsource": "MISC",
"name": "http://www.debian.org/security/2010/dsa-2126"
},
{
"url": "http://secunia.com/advisories/42789",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42789"
},
{
"url": "http://secunia.com/advisories/46397",
"refsource": "MISC",
"name": "http://secunia.com/advisories/46397"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:257",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:257"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0958.html"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2011-0004.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0004.html"
},
{
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "MISC",
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0024",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0024"
},
{
"url": "http://grsecurity.net/~spender/64bit_dos.c",
"refsource": "MISC",
"name": "http://grsecurity.net/~spender/64bit_dos.c"
},
{
"url": "http://www.exploit-db.com/exploits/15619",
"refsource": "MISC",
"name": "http://www.exploit-db.com/exploits/15619"
},
{
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36"
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1b528181b2ffa14721fb28ad1bd539fe1732c583",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1b528181b2ffa14721fb28ad1bd539fe1732c583"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/10/21/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/10/21/1"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/10/22/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/10/22/4"
},
{
"url": "http://www.securityfocus.com/bid/44301",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/44301"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=645222",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=645222"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3859",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,137 +27,161 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "42789",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42789"
"url": "http://www.debian.org/security/2010/dsa-2126",
"refsource": "MISC",
"name": "http://www.debian.org/security/2010/dsa-2126"
},
{
"name": "ADV-2011-0024",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0024"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"
},
{
"name": "RHSA-2011:0004",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0004.html"
"url": "http://secunia.com/advisories/42789",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42789"
},
{
"name": "[netdev] 20101021 TIPC security issues",
"refsource": "MLIST",
"url": "http://marc.info/?l=linux-netdev&m=128770476511716&w=2"
"url": "http://secunia.com/advisories/46397",
"refsource": "MISC",
"name": "http://secunia.com/advisories/46397"
},
{
"name": "[netdev] 20101027 [PATCH 4/4] tipc: Fix bugs in sending of large amounts of byte-stream data",
"refsource": "MLIST",
"url": "http://www.spinics.net/lists/netdev/msg145264.html"
"url": "http://www.redhat.com/support/errata/RHSA-2011-0004.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0004.html"
},
{
"name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"name": "46397",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46397"
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "MISC",
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"name": "[netdev] 20101027 [PATCH 1/4] tipc: Fix bugs in tipc_msg_calc_data_size()",
"refsource": "MLIST",
"url": "http://www.spinics.net/lists/netdev/msg145263.html"
"url": "http://www.vupen.com/english/advisories/2011/0024",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0024"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=645867",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=645867"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=253eacc070b114c2ec1f81b067d2fed7305467b0",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=253eacc070b114c2ec1f81b067d2fed7305467b0"
},
{
"name": "[netdev] 20101027 [PATCH 0/4] RFC: tipc int vs size_t fixes",
"refsource": "MLIST",
"url": "http://www.spinics.net/lists/netdev/msg145247.html"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8acfe468b0384e834a303f08ebc4953d72fb690a",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8acfe468b0384e834a303f08ebc4953d72fb690a"
},
{
"name": "[netdev] 20101028 Re: [PATCH 2/4] tipc: Fix bugs in tipc_msg_build()",
"refsource": "MLIST",
"url": "http://www.spinics.net/lists/netdev/msg145352.html"
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2"
"url": "http://www.spinics.net/lists/netdev/msg145248.html",
"refsource": "MISC",
"name": "http://www.spinics.net/lists/netdev/msg145248.html"
},
{
"name": "[oss-security] 20101022 CVE request: kernel: heap overflow in TIPC",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/10/22/2"
"url": "http://secunia.com/advisories/42963",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42963"
},
{
"name": "42963",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42963"
"url": "http://www.redhat.com/support/errata/RHSA-2011-0162.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0162.html"
},
{
"name": "44354",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/44354"
"url": "http://www.vupen.com/english/advisories/2011/0168",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0168"
},
{
"name": "[netdev] 20101027 [PATCH 3/4] tipc: Update arguments to use size_t for iovec array sizes",
"refsource": "MLIST",
"url": "http://www.spinics.net/lists/netdev/msg145262.html"
"url": "http://marc.info/?l=linux-netdev&m=128770476511716&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=linux-netdev&m=128770476511716&w=2"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
"url": "http://www.openwall.com/lists/oss-security/2010/10/22/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/10/22/2"
},
{
"name": "RHSA-2011:0162",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0162.html"
"url": "http://www.openwall.com/lists/oss-security/2010/10/22/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/10/22/5"
},
{
"name": "[netdev] 20101027 [PATCH 2/4] tipc: Fix bugs in tipc_msg_build()",
"refsource": "MLIST",
"url": "http://www.spinics.net/lists/netdev/msg145265.html"
"url": "http://www.securityfocus.com/bid/44354",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/44354"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8acfe468b0384e834a303f08ebc4953d72fb690a",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8acfe468b0384e834a303f08ebc4953d72fb690a"
"url": "http://www.spinics.net/lists/netdev/msg145247.html",
"refsource": "MISC",
"name": "http://www.spinics.net/lists/netdev/msg145247.html"
},
{
"name": "ADV-2011-0168",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0168"
"url": "http://www.spinics.net/lists/netdev/msg145262.html",
"refsource": "MISC",
"name": "http://www.spinics.net/lists/netdev/msg145262.html"
},
{
"name": "MDVSA-2011:029",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"
"url": "http://www.spinics.net/lists/netdev/msg145263.html",
"refsource": "MISC",
"name": "http://www.spinics.net/lists/netdev/msg145263.html"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=253eacc070b114c2ec1f81b067d2fed7305467b0",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=253eacc070b114c2ec1f81b067d2fed7305467b0"
"url": "http://www.spinics.net/lists/netdev/msg145264.html",
"refsource": "MISC",
"name": "http://www.spinics.net/lists/netdev/msg145264.html"
},
{
"name": "[netdev] 20101027 Re: [PATCH 1/4] tipc: Fix bugs in tipc_msg_calc_data_size()",
"refsource": "MLIST",
"url": "http://www.spinics.net/lists/netdev/msg145248.html"
"url": "http://www.spinics.net/lists/netdev/msg145265.html",
"refsource": "MISC",
"name": "http://www.spinics.net/lists/netdev/msg145265.html"
},
{
"name": "[oss-security] 20101022 Re: CVE request: kernel: heap overflow in TIPC",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/10/22/5"
"url": "http://www.spinics.net/lists/netdev/msg145352.html",
"refsource": "MISC",
"name": "http://www.spinics.net/lists/netdev/msg145352.html"
},
{
"name": "DSA-2126",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2126"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=645867",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=645867"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2688",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,52 +27,76 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=633637",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=633637"
},
{
"name": "[oss-security] 20110712 CVE id request: apache mod-auth-external",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/07/12/10"
},
{
"name": "48653",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48653"
},
{
"name": "45240",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45240"
},
{
"name": "DSA-2279",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2279"
},
{
"name": "modauthexternal-mysqlauth-sql-injection(68799)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68799"
},
{
"name": "[oss-security] 20110712 Re: CVE id request: apache mod-auth-external",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/07/12/17"
},
{
"name": "http://code.google.com/p/mod-auth-external/issues/detail?id=5",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/mod-auth-external/issues/detail?id=5"
},
{
"name": "http://anders.fix.no/software/#unix",
"url": "http://anders.fix.no/software/#unix",
"refsource": "MISC",
"url": "http://anders.fix.no/software/#unix"
"name": "http://anders.fix.no/software/#unix"
},
{
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=633637",
"refsource": "MISC",
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=633637"
},
{
"url": "http://code.google.com/p/mod-auth-external/issues/detail?id=5",
"refsource": "MISC",
"name": "http://code.google.com/p/mod-auth-external/issues/detail?id=5"
},
{
"url": "http://secunia.com/advisories/45240",
"refsource": "MISC",
"name": "http://secunia.com/advisories/45240"
},
{
"url": "http://www.debian.org/security/2011/dsa-2279",
"refsource": "MISC",
"name": "http://www.debian.org/security/2011/dsa-2279"
},
{
"url": "http://www.openwall.com/lists/oss-security/2011/07/12/10",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/07/12/10"
},
{
"url": "http://www.openwall.com/lists/oss-security/2011/07/12/17",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/07/12/17"
},
{
"url": "http://www.securityfocus.com/bid/48653",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/48653"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68799",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68799"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2689",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,57 +27,81 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20110713 CVE-2011-2689 kernel: gfs2: make sure fallocate bytes is a multiple of blksize",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/07/13/1"
"url": "http://marc.info/?l=bugtraq&m=139447903326211&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=bugtraq&m=139447903326211&w=2"
},
{
"name": "RHSA-2011:1065",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2011-1065.html"
"url": "http://rhn.redhat.com/errata/RHSA-2011-1065.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2011-1065.html"
},
{
"name": "linux-kernel-gfs2-dos(68557)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68557"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6905d9e4dda6112f007e9090bca80507da158e63",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6905d9e4dda6112f007e9090bca80507da158e63"
},
{
"name": "1025776",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1025776"
"url": "http://secunia.com/advisories/45193",
"refsource": "MISC",
"name": "http://secunia.com/advisories/45193"
},
{
"name": "48677",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48677"
"url": "http://securitytracker.com/id?1025776",
"refsource": "MISC",
"name": "http://securitytracker.com/id?1025776"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.0/testing/ChangeLog-3.0-rc1",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.0/testing/ChangeLog-3.0-rc1"
"url": "http://www.kernel.org/pub/linux/kernel/v3.0/testing/ChangeLog-3.0-rc1",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v3.0/testing/ChangeLog-3.0-rc1"
},
{
"name": "45193",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45193"
"url": "http://www.openwall.com/lists/oss-security/2011/07/13/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/07/13/1"
},
{
"name": "HPSBGN02970",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=139447903326211&w=2"
"url": "http://www.securityfocus.com/bid/48677",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/48677"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6905d9e4dda6112f007e9090bca80507da158e63",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6905d9e4dda6112f007e9090bca80507da158e63"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68557",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68557"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=720861",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=720861"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=720861",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=720861"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2690",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,112 +27,136 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "49660",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49660"
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"name": "48660",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48660"
"url": "http://support.apple.com/kb/HT5002",
"refsource": "MISC",
"name": "http://support.apple.com/kb/HT5002"
},
{
"name": "45046",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45046"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063118.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063118.html"
},
{
"name": "USN-1175-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1175-1"
"url": "http://secunia.com/advisories/45046",
"refsource": "MISC",
"name": "http://secunia.com/advisories/45046"
},
{
"name": "MDVSA-2011:151",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:151"
"url": "http://secunia.com/advisories/45405",
"refsource": "MISC",
"name": "http://secunia.com/advisories/45405"
},
{
"name": "GLSA-201206-15",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201206-15.xml"
"url": "http://secunia.com/advisories/45415",
"refsource": "MISC",
"name": "http://secunia.com/advisories/45415"
},
{
"name": "45461",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45461"
"url": "http://secunia.com/advisories/45460",
"refsource": "MISC",
"name": "http://secunia.com/advisories/45460"
},
{
"name": "http://www.libpng.org/pub/png/libpng.html",
"refsource": "CONFIRM",
"url": "http://www.libpng.org/pub/png/libpng.html"
"url": "http://secunia.com/advisories/45461",
"refsource": "MISC",
"name": "http://secunia.com/advisories/45461"
},
{
"name": "FEDORA-2011-9336",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063118.html"
"url": "http://secunia.com/advisories/45492",
"refsource": "MISC",
"name": "http://secunia.com/advisories/45492"
},
{
"name": "DSA-2287",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2287"
"url": "http://secunia.com/advisories/49660",
"refsource": "MISC",
"name": "http://secunia.com/advisories/49660"
},
{
"name": "APPLE-SA-2011-10-12-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
"url": "http://security.gentoo.org/glsa/glsa-201206-15.xml",
"refsource": "MISC",
"name": "http://security.gentoo.org/glsa/glsa-201206-15.xml"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=720607",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=720607"
"url": "http://www.debian.org/security/2011/dsa-2287",
"refsource": "MISC",
"name": "http://www.debian.org/security/2011/dsa-2287"
},
{
"name": "45405",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45405"
"url": "http://www.libpng.org/pub/png/libpng.html",
"refsource": "MISC",
"name": "http://www.libpng.org/pub/png/libpng.html"
},
{
"name": "RHSA-2011:1105",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1105.html"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:151",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:151"
},
{
"name": "45460",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45460"
"url": "http://www.openwall.com/lists/oss-security/2011/07/13/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/07/13/2"
},
{
"name": "[oss-security] 20110713 Security issues fixed in libpng 1.5.4",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/07/13/2"
"url": "http://www.redhat.com/support/errata/RHSA-2011-1104.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-1104.html"
},
{
"name": "http://support.apple.com/kb/HT5002",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5002"
"url": "http://www.redhat.com/support/errata/RHSA-2011-1105.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-1105.html"
},
{
"name": "libpng-pngrgbtogray-bo(68538)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68538"
"url": "http://www.ubuntu.com/usn/USN-1175-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1175-1"
},
{
"name": "45492",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45492"
"url": "http://www.securityfocus.com/bid/48660",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/48660"
},
{
"name": "RHSA-2011:1104",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1104.html"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68538",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68538"
},
{
"name": "45415",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45415"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=720607",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=720607"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2691",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,97 +27,116 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "49660",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49660"
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"name": "48660",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48660"
"url": "http://support.apple.com/kb/HT5002",
"refsource": "MISC",
"name": "http://support.apple.com/kb/HT5002"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=720608",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=720608"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063118.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063118.html"
},
{
"name": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=commit;h=9dad5e37aef295b4ef8dea39392b652deebc9261",
"refsource": "CONFIRM",
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=commit;h=9dad5e37aef295b4ef8dea39392b652deebc9261"
"url": "http://secunia.com/advisories/45046",
"refsource": "MISC",
"name": "http://secunia.com/advisories/45046"
},
{
"name": "45046",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45046"
"url": "http://secunia.com/advisories/45405",
"refsource": "MISC",
"name": "http://secunia.com/advisories/45405"
},
{
"name": "libpng-pngdefaulterror-dos(68537)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68537"
"url": "http://secunia.com/advisories/45492",
"refsource": "MISC",
"name": "http://secunia.com/advisories/45492"
},
{
"name": "MDVSA-2011:151",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:151"
"url": "http://secunia.com/advisories/49660",
"refsource": "MISC",
"name": "http://secunia.com/advisories/49660"
},
{
"name": "GLSA-201206-15",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201206-15.xml"
"url": "http://security.gentoo.org/glsa/glsa-201206-15.xml",
"refsource": "MISC",
"name": "http://security.gentoo.org/glsa/glsa-201206-15.xml"
},
{
"name": "http://www.libpng.org/pub/png/libpng.html",
"refsource": "CONFIRM",
"url": "http://www.libpng.org/pub/png/libpng.html"
"url": "http://www.debian.org/security/2011/dsa-2287",
"refsource": "MISC",
"name": "http://www.debian.org/security/2011/dsa-2287"
},
{
"name": "FEDORA-2011-9336",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063118.html"
"url": "http://www.libpng.org/pub/png/libpng.html",
"refsource": "MISC",
"name": "http://www.libpng.org/pub/png/libpng.html"
},
{
"name": "DSA-2287",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2287"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:151",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:151"
},
{
"name": "APPLE-SA-2011-10-12-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
"url": "http://www.openwall.com/lists/oss-security/2011/07/13/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/07/13/2"
},
{
"name": "45405",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45405"
"url": "http://marc.info/?l=bugtraq&m=133951357207000&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=bugtraq&m=133951357207000&w=2"
},
{
"name": "[oss-security] 20110713 Security issues fixed in libpng 1.5.4",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/07/13/2"
"url": "http://www.securityfocus.com/bid/48660",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/48660"
},
{
"name": "SSRT100852",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133951357207000&w=2"
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=commit%3Bh=9dad5e37aef295b4ef8dea39392b652deebc9261",
"refsource": "MISC",
"name": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=commit%3Bh=9dad5e37aef295b4ef8dea39392b652deebc9261"
},
{
"name": "http://support.apple.com/kb/HT5002",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5002"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68537",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68537"
},
{
"name": "45492",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45492"
},
{
"name": "HPSBMU02776",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133951357207000&w=2"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=720608",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=720608"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2011-2698 wireshark: Infinite loop in the ANSI A Interface (IS-634/IOS) dissector"
"value": "Off-by-one error in the elem_cell_id_aux function in epan/dissectors/packet-ansi_a.c in the ANSI MAP dissector in Wireshark 1.4.x before 1.4.8 and 1.6.x before 1.6.1 allows remote attackers to cause a denial of service (infinite loop) via an invalid packet."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Loop with Unreachable Exit Condition ('Infinite Loop')",
"cweId": "CWE-835"
"value": "n/a"
}
]
}
@ -32,27 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:1.0.15-5.el5",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:1.2.15-2.el6_2.1",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -75,16 +63,6 @@
"refsource": "MISC",
"name": "http://secunia.com/advisories/48947"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:0509",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:0509"
},
{
"url": "https://access.redhat.com/errata/RHSA-2013:0125",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:0125"
},
{
"url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=37930",
"refsource": "MISC",
@ -135,21 +113,11 @@
"refsource": "MISC",
"name": "http://www.wireshark.org/security/wnpa-sec-2011-11.html"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2011-2698",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2011-2698"
},
{
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6044",
"refsource": "MISC",
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6044"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=723215",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=723215"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69074",
"refsource": "MISC",
@ -159,31 +127,11 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14610",
"refsource": "MISC",
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14610"
}
]
},
"impact": {
"cvss": [
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.3,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=723215",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=723215"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2699",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,42 +27,66 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "1027274",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027274"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
},
{
"name": "https://github.com/torvalds/linux/commit/87c48fa3b4630905f98268dde838ee43626a060c",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/87c48fa3b4630905f98268dde838ee43626a060c"
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1"
},
{
"name": "[oss-security] 20110720 Re: CVE request: kernel: ipv6: make fragment identifications less predictable",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/07/20/5"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=87c48fa3b4630905f98268dde838ee43626a060c",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=87c48fa3b4630905f98268dde838ee43626a060c"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=87c48fa3b4630905f98268dde838ee43626a060c",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=87c48fa3b4630905f98268dde838ee43626a060c"
"url": "http://www.openwall.com/lists/oss-security/2011/07/20/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/07/20/5"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1"
"url": "http://www.securitytracker.com/id?1027274",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1027274"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=723429",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=723429"
"url": "https://github.com/torvalds/linux/commit/87c48fa3b4630905f98268dde838ee43626a060c",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/87c48fa3b4630905f98268dde838ee43626a060c"
},
{
"name": "MDVSA-2013:150",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=723429",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=723429"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2700",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,37 +27,61 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://xorl.wordpress.com/2011/07/24/cve-2011-2700-linux-kernel-si4713-i2c-buffer-overflow/",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=dc6b845044ccb7e9e6f3b7e71bd179b3cf0223b6",
"refsource": "MISC",
"url": "http://xorl.wordpress.com/2011/07/24/cve-2011-2700-linux-kernel-si4713-i2c-buffer-overflow/"
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=dc6b845044ccb7e9e6f3b7e71bd179b3cf0223b6"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39.4",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39.4"
"url": "http://openwall.com/lists/oss-security/2011/07/20/4",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/07/20/4"
},
{
"name": "48804",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48804"
"url": "http://openwall.com/lists/oss-security/2011/07/20/6",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/07/20/6"
},
{
"name": "[oss-security] 20110720 CVE request: kernel: si4713-i2c: avoid potential buffer overflow on si4713",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/07/20/4"
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39.4",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39.4"
},
{
"name": "[oss-security] 20110720 Re: CVE request: kernel: si4713-i2c: avoid potential buffer overflow on si4713",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/07/20/6"
"url": "http://www.securityfocus.com/bid/48804",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/48804"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=dc6b845044ccb7e9e6f3b7e71bd179b3cf0223b6",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=dc6b845044ccb7e9e6f3b7e71bd179b3cf0223b6"
"url": "http://xorl.wordpress.com/2011/07/24/cve-2011-2700-linux-kernel-si4713-i2c-buffer-overflow/",
"refsource": "MISC",
"name": "http://xorl.wordpress.com/2011/07/24/cve-2011-2700-linux-kernel-si4713-i2c-buffer-overflow/"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2709",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,67 +27,91 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20110721 CVE Request -- libgssapi, libgssglue -- Ability to load untrusted configuration file, when loading GSS mechanisms and their definitions during initialization",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/07/21/3"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=694598",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082072.html",
"refsource": "MISC",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=694598"
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082072.html"
},
{
"name": "FEDORA-2012-7971",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082297.html"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082297.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082297.html"
},
{
"name": "45075",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45075"
"url": "http://lwn.net/Alerts/449415/",
"refsource": "MISC",
"name": "http://lwn.net/Alerts/449415/"
},
{
"name": "48490",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48490"
"url": "http://secunia.com/advisories/45075",
"refsource": "MISC",
"name": "http://secunia.com/advisories/45075"
},
{
"name": "http://www.citi.umich.edu/projects/nfsv4/linux/libgssglue/libgssglue-0.4.tar.gz",
"refsource": "CONFIRM",
"url": "http://www.citi.umich.edu/projects/nfsv4/linux/libgssglue/libgssglue-0.4.tar.gz"
"url": "http://secunia.com/advisories/50785",
"refsource": "MISC",
"name": "http://secunia.com/advisories/50785"
},
{
"name": "[oss-security] 20110722 Re: CVE Request -- libgssapi, libgssglue -- Ability to load untrusted configuration file, when loading GSS mechanisms and their definitions during initialization",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/07/22/4"
"url": "http://secunia.com/advisories/50973",
"refsource": "MISC",
"name": "http://secunia.com/advisories/50973"
},
{
"name": "FEDORA-2012-8067",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082072.html"
"url": "http://www.citi.umich.edu/projects/nfsv4/linux/libgssglue/libgssglue-0.4.tar.gz",
"refsource": "MISC",
"name": "http://www.citi.umich.edu/projects/nfsv4/linux/libgssglue/libgssglue-0.4.tar.gz"
},
{
"name": "[oss-security] 20110812 Re: CVE Request -- libgssapi, libgssglue -- Ability to load untrusted configuration file, when loading GSS mechanisms and their definitions during initialization",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/08/12/10"
"url": "http://www.openwall.com/lists/oss-security/2011/07/21/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/07/21/3"
},
{
"name": "50785",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50785"
"url": "http://www.openwall.com/lists/oss-security/2011/07/22/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/07/22/4"
},
{
"name": "50973",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50973"
"url": "http://www.openwall.com/lists/oss-security/2011/08/12/10",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/08/12/10"
},
{
"name": "SUSE-SU-2011:0696",
"refsource": "SUSE",
"url": "http://lwn.net/Alerts/449415/"
"url": "http://www.securityfocus.com/bid/48490",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/48490"
},
{
"url": "https://bugzilla.novell.com/show_bug.cgi?id=694598",
"refsource": "MISC",
"name": "https://bugzilla.novell.com/show_bug.cgi?id=694598"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2711",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,77 +27,101 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20110724 Re: Re: CVE Request -- cGit -- XSS flaw in rename hint",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/07/24/4"
"url": "http://hjemli.net/git/cgit/commit/?h=stable&id=bebe89d7c11a92bf206bf6e528c51ffa8ecbc0d5",
"refsource": "MISC",
"name": "http://hjemli.net/git/cgit/commit/?h=stable&id=bebe89d7c11a92bf206bf6e528c51ffa8ecbc0d5"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=725042",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=725042"
"url": "http://hjemli.net/pipermail/cgit/2011-July/000276.html",
"refsource": "MISC",
"name": "http://hjemli.net/pipermail/cgit/2011-July/000276.html"
},
{
"name": "48866",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48866"
"url": "http://secunia.com/advisories/45358",
"refsource": "MISC",
"name": "http://secunia.com/advisories/45358"
},
{
"name": "[oss-security] 20110724 Re: Re: CVE Request -- cGit -- XSS flaw in rename hint",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/07/24/3"
"url": "http://secunia.com/advisories/45541",
"refsource": "MISC",
"name": "http://secunia.com/advisories/45541"
},
{
"name": "[oss-security] 20110722 Re: CVE Request -- cGit -- XSS flaw in rename hint",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/07/22/6"
"url": "http://www.openwall.com/lists/oss-security/2011/07/22/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/07/22/2"
},
{
"name": "http://hjemli.net/git/cgit/commit/?h=stable&id=bebe89d7c11a92bf206bf6e528c51ffa8ecbc0d5",
"refsource": "CONFIRM",
"url": "http://hjemli.net/git/cgit/commit/?h=stable&id=bebe89d7c11a92bf206bf6e528c51ffa8ecbc0d5"
"url": "http://www.openwall.com/lists/oss-security/2011/07/22/6",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/07/22/6"
},
{
"name": "openSUSE-SU-2011:0891",
"refsource": "SUSE",
"url": "https://hermes.opensuse.org/messages/10998459"
"url": "http://www.openwall.com/lists/oss-security/2011/07/22/7",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/07/22/7"
},
{
"name": "74050",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/74050"
"url": "http://www.openwall.com/lists/oss-security/2011/07/24/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/07/24/3"
},
{
"name": "[oss-security] 20110722 CVE Request -- cGit -- XSS flaw in rename hint",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/07/22/2"
"url": "http://www.openwall.com/lists/oss-security/2011/07/24/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/07/24/4"
},
{
"name": "45358",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45358"
"url": "http://www.osvdb.org/74050",
"refsource": "MISC",
"name": "http://www.osvdb.org/74050"
},
{
"name": "[oss-security] 20110722 Re: CVE Request -- cGit -- XSS flaw in rename hint",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/07/22/7"
"url": "http://www.securityfocus.com/bid/48866",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/48866"
},
{
"name": "45541",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45541"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68754",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68754"
},
{
"name": "cgit-renamehint-xss(68754)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68754"
"url": "https://hermes.opensuse.org/messages/10998459",
"refsource": "MISC",
"name": "https://hermes.opensuse.org/messages/10998459"
},
{
"name": "[cgit] 20110722 [PATCH] Fix potential XSS vulnerability in rename hint",
"refsource": "MLIST",
"url": "http://hjemli.net/pipermail/cgit/2011-July/000276.html"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=725042",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=725042"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2718",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,72 +27,96 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "45515",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45515"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063410.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063410.html"
},
{
"name": "45365",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45365"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063418.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063418.html"
},
{
"name": "74111",
"refsource": "OSVDB",
"url": "http://osvdb.org/74111"
"url": "http://secunia.com/advisories/45365",
"refsource": "MISC",
"name": "http://secunia.com/advisories/45365"
},
{
"name": "48874",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48874"
"url": "http://secunia.com/advisories/45515",
"refsource": "MISC",
"name": "http://secunia.com/advisories/45515"
},
{
"name": "http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commit;h=3ae58f0cd6b89ad4767920f9b214c38d3f6d4393",
"refsource": "CONFIRM",
"url": "http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commit;h=3ae58f0cd6b89ad4767920f9b214c38d3f6d4393"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:124",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:124"
},
{
"name": "MDVSA-2011:124",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:124"
"url": "http://www.openwall.com/lists/oss-security/2011/07/25/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/07/25/4"
},
{
"name": "[oss-security] 20110726 Re: CVE-Request -- phpMyAdmin -- PMASA-2011-11 and PMASA-2011-12",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/07/26/10"
"url": "http://www.openwall.com/lists/oss-security/2011/07/26/10",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/07/26/10"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=725383",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=725383"
"url": "http://www.securityfocus.com/bid/48874",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/48874"
},
{
"name": "http://www.phpmyadmin.net/home_page/security/PMASA-2011-11.php",
"refsource": "CONFIRM",
"url": "http://www.phpmyadmin.net/home_page/security/PMASA-2011-11.php"
"url": "http://osvdb.org/74111",
"refsource": "MISC",
"name": "http://osvdb.org/74111"
},
{
"name": "FEDORA-2011-9725",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063410.html"
"url": "http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=3ae58f0cd6b89ad4767920f9b214c38d3f6d4393",
"refsource": "MISC",
"name": "http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=3ae58f0cd6b89ad4767920f9b214c38d3f6d4393"
},
{
"name": "phpmyadmin-schema-file-include(68768)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68768"
"url": "http://www.phpmyadmin.net/home_page/security/PMASA-2011-11.php",
"refsource": "MISC",
"name": "http://www.phpmyadmin.net/home_page/security/PMASA-2011-11.php"
},
{
"name": "FEDORA-2011-9734",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063418.html"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68768",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68768"
},
{
"name": "[oss-security] 20110725 CVE-Request -- phpMyAdmin -- PMASA-2011-11 and PMASA-2011-12",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/07/25/4"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=725383",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=725383"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-2146",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,37 +27,61 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://groups.google.com/group/sqlelixir/browse_thread/thread/efc16227514cffa?pli=1",
"url": "http://elixir.ematia.de/trac/ticket/119",
"refsource": "MISC",
"url": "http://groups.google.com/group/sqlelixir/browse_thread/thread/efc16227514cffa?pli=1"
"name": "http://elixir.ematia.de/trac/ticket/119"
},
{
"name": "[oss-security] 20120428 Re: weak use of crypto in python-elixir can lead to information disclosure (CVE and peer review request)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/04/28/2"
},
{
"name": "[oss-security] 20120427 weak use of crypto in python-elixir can lead to information disclosure (CVE and peer review request)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/04/27/8"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=810013",
"url": "http://groups.google.com/group/sqlelixir/browse_thread/thread/efc16227514cffa?pli=1",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=810013"
"name": "http://groups.google.com/group/sqlelixir/browse_thread/thread/efc16227514cffa?pli=1"
},
{
"name": "http://elixir.ematia.de/trac/ticket/119",
"url": "http://www.openwall.com/lists/oss-security/2012/04/27/8",
"refsource": "MISC",
"url": "http://elixir.ematia.de/trac/ticket/119"
"name": "http://www.openwall.com/lists/oss-security/2012/04/27/8"
},
{
"name": "[oss-security] 20120429 Re: weak use of crypto in python-elixir can lead to information disclosure (CVE and peer review request)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/04/29/1"
"url": "http://www.openwall.com/lists/oss-security/2012/04/28/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/04/28/2"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/04/29/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/04/29/1"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=810013",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=810013"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-2147",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,47 +27,71 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20120419 Re: [Packaging] Bug#668667: CVE Request (minor) -- Two Munin graphing framework flaws",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/04/19/5"
"url": "http://www.openwall.com/lists/oss-security/2012/04/17/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/04/17/2"
},
{
"name": "[oss-security] 20120417 Re: CVE Request (minor) -- Two Munin graphing framework flaws",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/04/17/2"
"url": "http://www.openwall.com/lists/oss-security/2012/04/18/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/04/18/2"
},
{
"name": "[oss-security] 20120427 Re: Bug#668667: CVE Request (minor) -- Two Munin graphing framework flaws",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/04/27/7"
"url": "http://www.openwall.com/lists/oss-security/2012/04/19/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/04/19/3"
},
{
"name": "munin-image-requests-dos(78924)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78924"
"url": "http://www.openwall.com/lists/oss-security/2012/04/19/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/04/19/4"
},
{
"name": "[oss-security] 20120418 Re: Bug#668667: CVE Request (minor) -- Two Munin graphing framework flaws",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/04/19/4"
"url": "http://www.openwall.com/lists/oss-security/2012/04/19/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/04/19/5"
},
{
"name": "[oss-security] 20120418 Re: CVE Request (minor) -- Two Munin graphing framework flaws",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/04/19/3"
"url": "http://www.openwall.com/lists/oss-security/2012/04/27/7",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/04/27/7"
},
{
"name": "[oss-security] 20120429 Re: Bug#668667: CVE Request (minor) -- Two Munin graphing framework flaws",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/04/29/2"
"url": "http://www.openwall.com/lists/oss-security/2012/04/29/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/04/29/2"
},
{
"name": "[oss-security] 20120417 RE: CVE Request (minor) -- Two Munin graphing framework flaws",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/04/18/2"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78924",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78924"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-2148",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "jbossas4",
"product": {
"product_data": [
{
"product_name": "AS",
"version": {
"version_data": [
{
"version_value": "7.1.1"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,12 +27,36 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "jbossas4",
"product": {
"product_data": [
{
"product_name": "AS",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "7.1.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://security-tracker.debian.org/tracker/CVE-2012-2148",
"url": "https://access.redhat.com/security/cve/cve-2012-2148",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2012-2148"
"name": "https://access.redhat.com/security/cve/cve-2012-2148"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-2148",
@ -63,9 +64,9 @@
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-2148"
},
{
"url": "https://access.redhat.com/security/cve/cve-2012-2148",
"url": "https://security-tracker.debian.org/tracker/CVE-2012-2148",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2012-2148"
"name": "https://security-tracker.debian.org/tracker/CVE-2012-2148"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-2328",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,32 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://sblim.cvs.sourceforge.net/viewvc/sblim/jsr48-client/src/org/sblim/cimclient/internal/cimxml/sax/NodeFactory.java?view=log#rev1.7",
"url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00015.html",
"refsource": "MISC",
"url": "http://sblim.cvs.sourceforge.net/viewvc/sblim/jsr48-client/src/org/sblim/cimclient/internal/cimxml/sax/NodeFactory.java?view=log#rev1.7"
"name": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00015.html"
},
{
"name": "http://sourceforge.net/p/sblim/bugs/2381/",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/p/sblim/bugs/2381/"
"url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00038.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00038.html"
},
{
"name": "RHSA-2012:0987",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0987.html"
"url": "http://rhn.redhat.com/errata/RHSA-2012-0987.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-0987.html"
},
{
"name": "openSUSE-SU-2012:1621",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00015.html"
"url": "http://sblim.cvs.sourceforge.net/viewvc/sblim/jsr48-client/src/org/sblim/cimclient/internal/cimxml/sax/NodeFactory.java?view=log#rev1.7",
"refsource": "MISC",
"name": "http://sblim.cvs.sourceforge.net/viewvc/sblim/jsr48-client/src/org/sblim/cimclient/internal/cimxml/sax/NodeFactory.java?view=log#rev1.7"
},
{
"name": "openSUSE-SU-2013:0144",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00038.html"
"url": "http://sourceforge.net/p/sblim/bugs/2381/",
"refsource": "MISC",
"name": "http://sourceforge.net/p/sblim/bugs/2381/"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-2330",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,42 +27,66 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://github.com/joyent/node/commit/c9a231d",
"refsource": "CONFIRM",
"url": "https://github.com/joyent/node/commit/c9a231d"
"url": "http://blog.nodejs.org/2012/05/04/version-0-6-17-stable/",
"refsource": "MISC",
"name": "http://blog.nodejs.org/2012/05/04/version-0-6-17-stable/"
},
{
"name": "http://blog.nodejs.org/2012/05/04/version-0-6-17-stable/",
"refsource": "CONFIRM",
"url": "http://blog.nodejs.org/2012/05/04/version-0-6-17-stable/"
"url": "http://secunia.com/advisories/49066",
"refsource": "MISC",
"name": "http://secunia.com/advisories/49066"
},
{
"name": "49066",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49066"
"url": "http://www.openwall.com/lists/oss-security/2012/05/08/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/05/08/4"
},
{
"name": "https://github.com/joyent/node/commit/7b3fb22",
"refsource": "CONFIRM",
"url": "https://github.com/joyent/node/commit/7b3fb22"
"url": "http://www.openwall.com/lists/oss-security/2012/05/08/8",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/05/08/8"
},
{
"name": "[oss-security] 20120508 CVE request: node.js <0.6.17/0.7.8 HTTP server information disclosure",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/05/08/4"
"url": "https://github.com/joyent/node/commit/7b3fb22",
"refsource": "MISC",
"name": "https://github.com/joyent/node/commit/7b3fb22"
},
{
"name": "[oss-security] 20120508 Re: CVE request: node.js <0.6.17/0.7.8 HTTP server information disclosure",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/05/08/8"
"url": "https://github.com/joyent/node/commit/c9a231d",
"refsource": "MISC",
"name": "https://github.com/joyent/node/commit/c9a231d"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K99038439?utm_source=f5support&amp;utm_medium=RSS",
"url": "https://support.f5.com/csp/article/K99038439?utm_source=f5support&amp;utm_medium=RSS"
"url": "https://support.f5.com/csp/article/K99038439?utm_source=f5support&amp%3Butm_medium=RSS",
"refsource": "MISC",
"name": "https://support.f5.com/csp/article/K99038439?utm_source=f5support&amp%3Butm_medium=RSS"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2012-2334 openoffice.org, libreoffice: Integer overflow leading to buffer overflow by processing invalid Escher graphics records length in the Powerpoint documents"
"value": "Integer overflow in filter/source/msfilter/msdffimp.cxx in OpenOffice.org (OOo) 3.3, 3.4 Beta, and possibly earlier, and LibreOffice before 3.5.3, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the length of an Escher graphics record in a PowerPoint (.ppt) document, which triggers a buffer overflow."
}
]
},
@ -39,8 +39,8 @@
"version": {
"version_data": [
{
"version_value": "n/a",
"version_affected": "?"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -113,11 +113,6 @@
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:091"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:0705",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:0705"
},
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-05/0091.html",
"refsource": "MISC",
@ -159,44 +154,14 @@
"name": "http://www.osvdb.org/82517"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2012-2334",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75695",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2012-2334"
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75695"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=821803",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=821803"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75695",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75695"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.8,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-2335",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,62 +27,81 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugs.php.net/bug.php?id=61910",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00003.html",
"refsource": "MISC",
"url": "https://bugs.php.net/bug.php?id=61910"
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00003.html"
},
{
"name": "SUSE-SU-2012:0721",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00004.html"
},
{
"name": "SUSE-SU-2012:0840",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00003.html"
},
{
"name": "49014",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49014"
},
{
"name": "http://git.php.net/?p=php-src.git;a=blob;f=sapi/cgi/cgi_main.c;h=a7ac26f0#l1569",
"url": "http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/",
"refsource": "MISC",
"url": "http://git.php.net/?p=php-src.git;a=blob;f=sapi/cgi/cgi_main.c;h=a7ac26f0#l1569"
"name": "http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/"
},
{
"name": "SSRT100992",
"refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862"
},
{
"name": "http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/",
"url": "http://secunia.com/advisories/49014",
"refsource": "MISC",
"url": "http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/"
"name": "http://secunia.com/advisories/49014"
},
{
"name": "VU#520827",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/520827"
},
{
"name": "http://www.php.net/archive/2012.php#id2012-05-06-1",
"url": "http://www.kb.cert.org/vuls/id/520827",
"refsource": "MISC",
"url": "http://www.php.net/archive/2012.php#id2012-05-06-1"
"name": "http://www.kb.cert.org/vuls/id/520827"
},
{
"name": "php-phpwrapperfcgi-code-exec(75652)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75652"
"url": "https://bugs.php.net/bug.php?id=61910",
"refsource": "MISC",
"name": "https://bugs.php.net/bug.php?id=61910"
},
{
"name": "HPSBMU02900",
"refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862"
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862",
"refsource": "MISC",
"name": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862"
},
{
"url": "http://git.php.net/?p=php-src.git%3Ba=blob%3Bf=sapi/cgi/cgi_main.c%3Bh=a7ac26f0#l1569",
"refsource": "MISC",
"name": "http://git.php.net/?p=php-src.git%3Ba=blob%3Bf=sapi/cgi/cgi_main.c%3Bh=a7ac26f0#l1569"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00004.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00004.html"
},
{
"url": "http://www.php.net/archive/2012.php#id2012-05-06-1",
"refsource": "MISC",
"name": "http://www.php.net/archive/2012.php#id2012-05-06-1"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75652",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75652"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2012-2336 php: incomplete CVE-2012-1823 fix - missing filtering of -T and -h"
"value": "sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to cause a denial of service (resource consumption) by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'T' case. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Uncontrolled Resource Consumption",
"cweId": "CWE-400"
"value": "n/a"
}
]
}
@ -32,31 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:5.1.6-39.el5_8",
"version_affected": "!"
},
{
"version_value": "0:5.3.3-13.el5_8",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:5.3.3-14.el6_3",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -74,16 +58,6 @@
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00003.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:1046",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:1046"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:1047",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:1047"
},
{
"url": "http://secunia.com/advisories/49014",
"refsource": "MISC",
@ -114,50 +88,10 @@
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00004.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:1045",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:1045"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2012-2336",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2012-2336"
},
{
"url": "https://bugs.php.net/patch-display.php?bug_id=61910&patch=CVE-2012-1823.patch&revision=1336251592&display=1",
"refsource": "MISC",
"name": "https://bugs.php.net/patch-display.php?bug_id=61910&patch=CVE-2012-1823.patch&revision=1336251592&display=1"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=820708",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=820708"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 7.5,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-2337",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,62 +27,86 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=820677",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=820677"
},
{
"name": "49219",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49219"
},
{
"name": "49948",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49948"
},
{
"name": "49244",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49244"
},
{
"name": "MDVSA-2012:079",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:079"
},
{
"name": "49291",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49291"
},
{
"name": "DSA-2478",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2478"
},
{
"name": "1027077",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027077"
},
{
"name": "https://www.suse.com/security/cve/CVE-2012-2337/",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081432.html",
"refsource": "MISC",
"url": "https://www.suse.com/security/cve/CVE-2012-2337/"
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081432.html"
},
{
"name": "FEDORA-2012-7998",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081432.html"
"url": "http://secunia.com/advisories/49219",
"refsource": "MISC",
"name": "http://secunia.com/advisories/49219"
},
{
"name": "http://www.sudo.ws/sudo/alerts/netmask.html",
"refsource": "CONFIRM",
"url": "http://www.sudo.ws/sudo/alerts/netmask.html"
"url": "http://secunia.com/advisories/49244",
"refsource": "MISC",
"name": "http://secunia.com/advisories/49244"
},
{
"url": "http://secunia.com/advisories/49291",
"refsource": "MISC",
"name": "http://secunia.com/advisories/49291"
},
{
"url": "http://secunia.com/advisories/49948",
"refsource": "MISC",
"name": "http://secunia.com/advisories/49948"
},
{
"url": "http://www.debian.org/security/2012/dsa-2478",
"refsource": "MISC",
"name": "http://www.debian.org/security/2012/dsa-2478"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:079",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:079"
},
{
"url": "http://www.securitytracker.com/id?1027077",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1027077"
},
{
"url": "http://www.sudo.ws/sudo/alerts/netmask.html",
"refsource": "MISC",
"name": "http://www.sudo.ws/sudo/alerts/netmask.html"
},
{
"url": "https://www.suse.com/security/cve/CVE-2012-2337/",
"refsource": "MISC",
"name": "https://www.suse.com/security/cve/CVE-2012-2337/"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=820677",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=820677"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-2354",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,17 +27,41 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=48e03792ca8faa2d781f9ef74606f3b3f0d3baec",
"refsource": "CONFIRM",
"url": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=48e03792ca8faa2d781f9ef74606f3b3f0d3baec"
"url": "http://openwall.com/lists/oss-security/2012/05/23/2",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2012/05/23/2"
},
{
"name": "[oss-security] 20120523 Moodle security notifications public",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2012/05/23/2"
"url": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=48e03792ca8faa2d781f9ef74606f3b3f0d3baec",
"refsource": "MISC",
"name": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=48e03792ca8faa2d781f9ef74606f3b3f0d3baec"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2012-6085 GnuPG: read_block() corrupt key input validation"
"value": "The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Improper Input Validation",
"cweId": "CWE-20"
"value": "n/a"
}
]
}
@ -32,31 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:1.4.5-18.el5_10",
"version_affected": "!"
},
{
"version_value": "0:2.0.10-6.el5_10",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:2.0.14-6.el6_4",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -109,60 +93,20 @@
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1682-1"
},
{
"url": "https://access.redhat.com/errata/RHSA-2013:1458",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:1458"
},
{
"url": "https://access.redhat.com/errata/RHSA-2013:1459",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:1459"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2012-6085",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2012-6085"
},
{
"url": "https://bugs.g10code.com/gnupg/issue1455",
"refsource": "MISC",
"name": "https://bugs.g10code.com/gnupg/issue1455"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=891142",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=891142"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80990",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80990"
}
]
},
"impact": {
"cvss": [
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.3,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=891142",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=891142"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-6086",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,22 +27,46 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "57103",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/57103"
"url": "http://www.openwall.com/lists/oss-security/2013/01/03/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/01/03/1"
},
{
"name": "https://support.zabbix.com/browse/ZBX-5924",
"refsource": "CONFIRM",
"url": "https://support.zabbix.com/browse/ZBX-5924"
"url": "http://www.securityfocus.com/bid/57103",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/57103"
},
{
"name": "[oss-security] 20130103 Re: CVE request: Curl insecure usage",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/01/03/1"
"url": "https://support.zabbix.com/browse/ZBX-5924",
"refsource": "MISC",
"name": "https://support.zabbix.com/browse/ZBX-5924"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-6087",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,22 +27,46 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-40615",
"refsource": "CONFIRM",
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-40615"
"url": "http://www.openwall.com/lists/oss-security/2013/01/03/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/01/03/1"
},
{
"name": "[oss-security] 20130103 Re: CVE request: Curl insecure usage",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/01/03/1"
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-40615",
"refsource": "MISC",
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-40615"
},
{
"name": "https://moodle.org/mod/forum/discuss.php?d=238393",
"refsource": "CONFIRM",
"url": "https://moodle.org/mod/forum/discuss.php?d=238393"
"url": "https://moodle.org/mod/forum/discuss.php?d=238393",
"refsource": "MISC",
"name": "https://moodle.org/mod/forum/discuss.php?d=238393"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-6088",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,47 +27,71 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=796375",
"url": "http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=3d74c43",
"refsource": "MISC",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=796375"
"name": "http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=3d74c43"
},
{
"name": "57138",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/57138"
"url": "http://rpm.org/wiki/Releases/4.10.2",
"refsource": "MISC",
"name": "http://rpm.org/wiki/Releases/4.10.2"
},
{
"name": "51706",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51706"
"url": "http://secunia.com/advisories/51706",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51706"
},
{
"name": "[oss-security] 20130103 Re: CVE Request -- rpm (X >= 4.10 and X < 3d74c43 commit): Signature checking function returned success on (possibly malicious ) rpm packages",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/01/03/9"
"url": "http://www.openwall.com/lists/oss-security/2013/01/03/9",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/01/03/9"
},
{
"name": "http://rpm.org/gitweb?p=rpm.git;a=commitdiff;h=3d74c43",
"refsource": "CONFIRM",
"url": "http://rpm.org/gitweb?p=rpm.git;a=commitdiff;h=3d74c43"
"url": "http://www.securityfocus.com/bid/57138",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/57138"
},
{
"name": "USN-1694-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1694-1"
"url": "http://www.ubuntu.com/usn/USN-1694-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1694-1"
},
{
"name": "rpm-security-bypass(80953)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80953"
"url": "https://bugzilla.novell.com/show_bug.cgi?id=796375",
"refsource": "MISC",
"name": "https://bugzilla.novell.com/show_bug.cgi?id=796375"
},
{
"name": "http://rpm.org/wiki/Releases/4.10.2",
"refsource": "CONFIRM",
"url": "http://rpm.org/wiki/Releases/4.10.2"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80953",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80953"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-6094",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "cups",
"product": {
"product_data": [
{
"product_name": "cups",
"version": {
"version_data": [
{
"version_value": "<= 1.7.5"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,12 +27,46 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "cups",
"product": {
"product_data": [
{
"product_name": "cups",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "<= 1.7.5"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://security-tracker.debian.org/tracker/CVE-2012-6094",
"url": "http://www.openwall.com/lists/oss-security/2013/01/04/5",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2012-6094"
"name": "http://www.openwall.com/lists/oss-security/2013/01/04/5"
},
{
"url": "http://www.securityfocus.com/bid/57158",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/57158"
},
{
"url": "https://access.redhat.com/security/cve/cve-2012-6094",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2012-6094"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-6094",
@ -68,24 +79,14 @@
"name": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-6094"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82451",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82451",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82451"
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82451"
},
{
"url": "https://security-tracker.debian.org/tracker/CVE-2012-6094",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/01/04/5",
"url": "http://www.openwall.com/lists/oss-security/2013/01/04/5"
},
{
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/57158",
"url": "http://www.securityfocus.com/bid/57158"
},
{
"refsource": "REDHAT",
"name": "Red Hat",
"url": "https://access.redhat.com/security/cve/cve-2012-6094"
"name": "https://security-tracker.debian.org/tracker/CVE-2012-6094"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-6095",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,32 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://proftpd.org/docs/NEWS-1.3.5rc1",
"refsource": "CONFIRM",
"url": "http://proftpd.org/docs/NEWS-1.3.5rc1"
"url": "http://bugs.proftpd.org/show_bug.cgi?id=3841",
"refsource": "MISC",
"name": "http://bugs.proftpd.org/show_bug.cgi?id=3841"
},
{
"name": "[oss-security] 20130107 Re: CVE Request -- proFTPD (X < 1.3.5.rc1): Symlink race condition when applying UserOwner to a newly (ProFTPD) created directory",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/01/07/3"
"url": "http://proftpd.org/docs/NEWS-1.3.5rc1",
"refsource": "MISC",
"name": "http://proftpd.org/docs/NEWS-1.3.5rc1"
},
{
"name": "http://bugs.proftpd.org/show_bug.cgi?id=3841",
"refsource": "CONFIRM",
"url": "http://bugs.proftpd.org/show_bug.cgi?id=3841"
"url": "http://secunia.com/advisories/51823",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51823"
},
{
"name": "51823",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51823"
"url": "http://www.debian.org/security/2013/dsa-2606",
"refsource": "MISC",
"name": "http://www.debian.org/security/2013/dsa-2606"
},
{
"name": "DSA-2606",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2606"
"url": "http://www.openwall.com/lists/oss-security/2013/01/07/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/01/07/3"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-6096",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,87 +27,111 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "20121209 Nagios Core 3.4.3: Stack based buffer overflow in web interface",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2012-December/089125.html"
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2012-December/089125.html",
"refsource": "MISC",
"name": "http://lists.grok.org.uk/pipermail/full-disclosure/2012-December/089125.html"
},
{
"name": "DSA-2616",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2616"
"url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00033.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00033.html"
},
{
"name": "openSUSE-SU-2013:0188",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00077.html"
"url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00060.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00060.html"
},
{
"name": "24084",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/24084"
"url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00077.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00077.html"
},
{
"name": "openSUSE-SU-2013:0140",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00033.html"
"url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00088.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00088.html"
},
{
"name": "51863",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51863"
"url": "http://secunia.com/advisories/51863",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51863"
},
{
"name": "openSUSE-SU-2013:0206",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00088.html"
"url": "http://www.debian.org/security/2013/dsa-2616",
"refsource": "MISC",
"name": "http://www.debian.org/security/2013/dsa-2616"
},
{
"name": "http://www.nagios.org/projects/nagioscore/history/core-3x",
"refsource": "CONFIRM",
"url": "http://www.nagios.org/projects/nagioscore/history/core-3x"
"url": "http://www.debian.org/security/2013/dsa-2653",
"refsource": "MISC",
"name": "http://www.debian.org/security/2013/dsa-2653"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=893269",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=893269"
"url": "http://www.exploit-db.com/exploits/24084",
"refsource": "MISC",
"name": "http://www.exploit-db.com/exploits/24084"
},
{
"name": "24159",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/24159"
"url": "http://www.exploit-db.com/exploits/24159",
"refsource": "MISC",
"name": "http://www.exploit-db.com/exploits/24159"
},
{
"name": "89170",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/89170"
"url": "http://www.nagios.org/projects/nagioscore/history/core-3x",
"refsource": "MISC",
"name": "http://www.nagios.org/projects/nagioscore/history/core-3x"
},
{
"name": "https://www.icinga.org/2013/01/14/icinga-1-6-2-1-7-4-1-8-4-released/",
"refsource": "CONFIRM",
"url": "https://www.icinga.org/2013/01/14/icinga-1-6-2-1-7-4-1-8-4-released/"
"url": "http://www.osvdb.org/89170",
"refsource": "MISC",
"name": "http://www.osvdb.org/89170"
},
{
"name": "openSUSE-SU-2013:0169",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00060.html"
"url": "http://www.securityfocus.com/bid/56879",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/56879"
},
{
"name": "https://dev.icinga.org/issues/3532",
"refsource": "CONFIRM",
"url": "https://dev.icinga.org/issues/3532"
"url": "https://dev.icinga.org/issues/3532",
"refsource": "MISC",
"name": "https://dev.icinga.org/issues/3532"
},
{
"name": "DSA-2653",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2653"
"url": "https://www.icinga.org/2013/01/14/icinga-1-6-2-1-7-4-1-8-4-released/",
"refsource": "MISC",
"name": "https://www.icinga.org/2013/01/14/icinga-1-6-2-1-7-4-1-8-4-released/"
},
{
"name": "56879",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/56879"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=893269",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=893269"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-6098",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,22 +27,46 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://moodle.org/mod/forum/discuss.php?d=220158",
"refsource": "CONFIRM",
"url": "https://moodle.org/mod/forum/discuss.php?d=220158"
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-27619",
"refsource": "MISC",
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-27619"
},
{
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-27619",
"refsource": "CONFIRM",
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-27619"
"url": "http://openwall.com/lists/oss-security/2013/01/21/1",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2013/01/21/1"
},
{
"name": "[oss-security] 20130121 Moodle security notifications public",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2013/01/21/1"
"url": "https://moodle.org/mod/forum/discuss.php?d=220158",
"refsource": "MISC",
"name": "https://moodle.org/mod/forum/discuss.php?d=220158"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-6100",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,22 +27,46 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://moodle.org/mod/forum/discuss.php?d=220161",
"refsource": "CONFIRM",
"url": "https://moodle.org/mod/forum/discuss.php?d=220161"
"url": "http://openwall.com/lists/oss-security/2013/01/21/1",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2013/01/21/1"
},
{
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-33340",
"refsource": "CONFIRM",
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-33340"
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-33340",
"refsource": "MISC",
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-33340"
},
{
"name": "[oss-security] 20130121 Moodle security notifications public",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2013/01/21/1"
"url": "https://moodle.org/mod/forum/discuss.php?d=220161",
"refsource": "MISC",
"name": "https://moodle.org/mod/forum/discuss.php?d=220161"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-6107",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,52 +27,76 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://issues.apache.org/jira/browse/AXIS2C-1619",
"url": "http://mail-archives.apache.org/mod_mbox/axis-c-dev/201301.mbox/browser",
"refsource": "MISC",
"url": "https://issues.apache.org/jira/browse/AXIS2C-1619"
"name": "http://mail-archives.apache.org/mod_mbox/axis-c-dev/201301.mbox/browser"
},
{
"name": "[axis-c-dev] 20130107 JIRA AXIS2C-1619 SSL/TLS hostname validation",
"refsource": "MLIST",
"url": "http://mail-archives.apache.org/mod_mbox/axis-c-dev/201301.mbox/browser"
"url": "http://www.securityfocus.com/bid/57267",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/57267"
},
{
"name": "57267",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/57267"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81211",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81211"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=894372",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=894372"
"url": "https://issues.apache.org/jira/browse/AXIS2C-1619",
"refsource": "MISC",
"name": "https://issues.apache.org/jira/browse/AXIS2C-1619"
},
{
"name": "axis2c-ssl-spoofing(81211)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81211"
"url": "https://lists.apache.org/thread.html/06e82460243af2ec9cc5a9af0a718943bc53c804b0a786ac61d518e4%40%3Cc-dev.axis.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/06e82460243af2ec9cc5a9af0a718943bc53c804b0a786ac61d518e4%40%3Cc-dev.axis.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[axis-c-dev] 20190831 [jira] [Resolved] (AXIS2C-1619) CVE-2012-6107: SSL/TLS Hostname validation",
"url": "https://lists.apache.org/thread.html/0e30b2b72099a995f6e91342b03d3e4b477677d0ea77e3ce55b53614@%3Cc-dev.axis.apache.org%3E"
"url": "https://lists.apache.org/thread.html/0e30b2b72099a995f6e91342b03d3e4b477677d0ea77e3ce55b53614%40%3Cc-dev.axis.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/0e30b2b72099a995f6e91342b03d3e4b477677d0ea77e3ce55b53614%40%3Cc-dev.axis.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[axis-c-dev] 20190831 [jira] [Commented] (AXIS2C-1619) CVE-2012-6107: SSL/TLS Hostname validation",
"url": "https://lists.apache.org/thread.html/06e82460243af2ec9cc5a9af0a718943bc53c804b0a786ac61d518e4@%3Cc-dev.axis.apache.org%3E"
"url": "https://lists.apache.org/thread.html/r469d2a5b453c95fc8335f581422a5e7ae4d31f10d22650fb85abfc2d%40%3Cc-dev.axis.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/r469d2a5b453c95fc8335f581422a5e7ae4d31f10d22650fb85abfc2d%40%3Cc-dev.axis.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[axis-c-dev] 20200128 [jira] [Comment Edited] (AXIS2C-1619) CVE-2012-6107: SSL/TLS Hostname validation",
"url": "https://lists.apache.org/thread.html/rfaf85467328c125126e2607196a7fb9510a9f9513dadf6d954b4af0c@%3Cc-dev.axis.apache.org%3E"
"url": "https://lists.apache.org/thread.html/rfaf85467328c125126e2607196a7fb9510a9f9513dadf6d954b4af0c%40%3Cc-dev.axis.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/rfaf85467328c125126e2607196a7fb9510a9f9513dadf6d954b4af0c%40%3Cc-dev.axis.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[axis-c-dev] 20200407 [jira] [Updated] (AXIS2C-1619) CVE-2012-6107: SSL/TLS Hostname validation",
"url": "https://lists.apache.org/thread.html/r469d2a5b453c95fc8335f581422a5e7ae4d31f10d22650fb85abfc2d@%3Cc-dev.axis.apache.org%3E"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=894372",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=894372"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2191",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,37 +27,61 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20130619 [CVE identifier assignment notification] CVE-2013-2191 python-bugzilla: Does not verify Bugzilla server certificate",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/06/19/6"
"url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00025.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00025.html"
},
{
"name": "openSUSE-SU-2013:1155",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00026.html"
"url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00026.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00026.html"
},
{
"name": "https://git.fedorahosted.org/cgit/python-bugzilla.git/commit/?id=a782282ee479ba4cc1b8b1d89700ac630ba83eef",
"refsource": "CONFIRM",
"url": "https://git.fedorahosted.org/cgit/python-bugzilla.git/commit/?id=a782282ee479ba4cc1b8b1d89700ac630ba83eef"
"url": "http://www.openwall.com/lists/oss-security/2013/06/19/6",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/06/19/6"
},
{
"name": "openSUSE-SU-2013:1154",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00025.html"
"url": "https://git.fedorahosted.org/cgit/python-bugzilla.git/commit/?id=a782282ee479ba4cc1b8b1d89700ac630ba83eef",
"refsource": "MISC",
"name": "https://git.fedorahosted.org/cgit/python-bugzilla.git/commit/?id=a782282ee479ba4cc1b8b1d89700ac630ba83eef"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=951594",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=951594"
"url": "https://lists.fedorahosted.org/pipermail/python-bugzilla/2013-June/000104.html",
"refsource": "MISC",
"name": "https://lists.fedorahosted.org/pipermail/python-bugzilla/2013-June/000104.html"
},
{
"name": "[python-bugzilla] 20130619 ANNOUNCE: python-bugzilla 0.9.0 released",
"refsource": "MLIST",
"url": "https://lists.fedorahosted.org/pipermail/python-bugzilla/2013-June/000104.html"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=951594",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=951594"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2194",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,52 +27,76 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "SUSE-SU-2014:0470",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html"
"url": "http://secunia.com/advisories/55082",
"refsource": "MISC",
"name": "http://secunia.com/advisories/55082"
},
{
"name": "55082",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55082"
"url": "http://security.gentoo.org/glsa/glsa-201309-24.xml",
"refsource": "MISC",
"name": "http://security.gentoo.org/glsa/glsa-201309-24.xml"
},
{
"name": "GLSA-201309-24",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201309-24.xml"
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
},
{
"name": "[oss-security] 20130620 Xen Security Advisory 55 (CVE-2013-2194,CVE-2013-2195,CVE-2013-2196) - Multiple vulnerabilities in libelf PV kernel handling",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/06/20/4"
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html"
},
{
"name": "[oss-security] 20130620 Re: Xen Security Advisory 55 - Multiple vulnerabilities in libelf PV kernel handling",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/06/20/2"
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html"
},
{
"name": "SUSE-SU-2014:0446",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
"url": "http://www.debian.org/security/2014/dsa-3006",
"refsource": "MISC",
"name": "http://www.debian.org/security/2014/dsa-3006"
},
{
"name": "DSA-3006",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-3006"
"url": "http://support.citrix.com/article/CTX138058",
"refsource": "MISC",
"name": "http://support.citrix.com/article/CTX138058"
},
{
"name": "SUSE-SU-2014:0411",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html"
"url": "http://www.openwall.com/lists/oss-security/2013/06/20/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/06/20/2"
},
{
"name": "http://support.citrix.com/article/CTX138058",
"refsource": "CONFIRM",
"url": "http://support.citrix.com/article/CTX138058"
"url": "http://www.openwall.com/lists/oss-security/2013/06/20/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/06/20/4"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2207",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,57 +27,81 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=15755",
"refsource": "CONFIRM",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=15755"
"url": "https://security.gentoo.org/glsa/201503-04",
"refsource": "MISC",
"name": "https://security.gentoo.org/glsa/201503-04"
},
{
"name": "55113",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55113"
"url": "http://secunia.com/advisories/55113",
"refsource": "MISC",
"name": "http://secunia.com/advisories/55113"
},
{
"name": "SUSE-SU-2015:1424",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:283",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:283"
},
{
"name": "[libc-alpha] 20130812 The GNU C Library version 2.18 is now available",
"refsource": "MLIST",
"url": "https://sourceware.org/ml/libc-alpha/2013-08/msg00160.html"
"url": "http://www.ubuntu.com/usn/USN-2985-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2985-1"
},
{
"name": "SUSE-SU-2016:0470",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html"
"url": "http://www.ubuntu.com/usn/USN-2985-2",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2985-2"
},
{
"name": "USN-2985-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2985-2"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=976408",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=976408"
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html"
},
{
"name": "GLSA-201503-04",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201503-04"
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=15755",
"refsource": "MISC",
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=15755"
},
{
"name": "MDVSA-2013:283",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:283"
"url": "https://sourceware.org/ml/libc-alpha/2013-08/msg00160.html",
"refsource": "MISC",
"name": "https://sourceware.org/ml/libc-alpha/2013-08/msg00160.html"
},
{
"name": "USN-2985-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2985-1"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=976408",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=976408"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2208",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20130621 Re: CVE Request -- tpp: Possibility of arbitrary code execution when processing untrusted TPP template",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/06/21/4"
},
{
"name": "GLSA-201309-19",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201309-19.xml"
},
{
"name": "https://github.com/akrennmair/tpp/pull/2",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=706644",
"refsource": "MISC",
"url": "https://github.com/akrennmair/tpp/pull/2"
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=706644"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=706644",
"url": "http://security.gentoo.org/glsa/glsa-201309-19.xml",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=706644"
"name": "http://security.gentoo.org/glsa/glsa-201309-19.xml"
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/06/21/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/06/21/4"
},
{
"url": "https://github.com/akrennmair/tpp/pull/2",
"refsource": "MISC",
"name": "https://github.com/akrennmair/tpp/pull/2"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2210",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based buffer overflow in the XML Signature Reference functionality in Apache Santuario XML Security for C++ (aka xml-security-c) before 1.7.2 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via malformed XPointer expressions. NOTE: this is due to an incorrect fix for CVE-2013-2154."
"value": "Heap-based buffer overflow in the XML Signature Reference functionality in Apache Santuario XML Security for C++ (aka xml-security-c) before 1.7.2 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via malformed XPointer expressions. NOTE: this is due to an incorrect fix for CVE-2013-2154."
}
]
},
@ -50,37 +27,61 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "20130626 CVE-2013-2210",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0216.html"
"url": "https://lists.apache.org/thread.html/680e6938b6412e26d5446054fd31de2011d33af11786b989127d1cc3%40%3Ccommits.santuario.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/680e6938b6412e26d5446054fd31de2011d33af11786b989127d1cc3%40%3Ccommits.santuario.apache.org%3E"
},
{
"name": "http://santuario.apache.org/secadv.data/CVE-2013-2210.txt",
"refsource": "CONFIRM",
"url": "http://santuario.apache.org/secadv.data/CVE-2013-2210.txt"
"url": "https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd%40%3Ccommits.santuario.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd%40%3Ccommits.santuario.apache.org%3E"
},
{
"name": "https://www.tenable.com/security/tns-2018-15",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2018-15"
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0216.html",
"refsource": "MISC",
"name": "http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0216.html"
},
{
"name": "DSA-2717",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2717"
"url": "http://santuario.apache.org/secadv.data/CVE-2013-2210.txt",
"refsource": "MISC",
"name": "http://santuario.apache.org/secadv.data/CVE-2013-2210.txt"
},
{
"refsource": "MLIST",
"name": "[santuario-commits] 20190823 svn commit: r1049214 - in /websites/production/santuario/content: cache/main.pageCache download.html index.html javaindex.html javareleasenotes.html secadv.data/CVE-2019-12400.asc secadv.html",
"url": "https://lists.apache.org/thread.html/680e6938b6412e26d5446054fd31de2011d33af11786b989127d1cc3@%3Ccommits.santuario.apache.org%3E"
"url": "http://www.debian.org/security/2013/dsa-2717",
"refsource": "MISC",
"name": "http://www.debian.org/security/2013/dsa-2717"
},
{
"refsource": "MLIST",
"name": "[santuario-commits] 20210917 svn commit: r1076843 - in /websites/production/santuario/content: cache/main.pageCache index.html javaindex.html secadv.data/CVE-2021-40690.txt.asc secadv.html",
"url": "https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd@%3Ccommits.santuario.apache.org%3E"
"url": "https://www.tenable.com/security/tns-2018-15",
"refsource": "MISC",
"name": "https://www.tenable.com/security/tns-2018-15"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2211",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,37 +27,61 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "55082",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55082"
"url": "http://secunia.com/advisories/55082",
"refsource": "MISC",
"name": "http://secunia.com/advisories/55082"
},
{
"name": "[oss-security] 20130626 Xen Security Advisory 57 (CVE-2013-2211) - libxl allows guest write access to sensitive console related xenstore keys",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/06/26/4"
"url": "http://security.gentoo.org/glsa/glsa-201309-24.xml",
"refsource": "MISC",
"name": "http://security.gentoo.org/glsa/glsa-201309-24.xml"
},
{
"name": "GLSA-201309-24",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201309-24.xml"
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
},
{
"name": "[oss-security] 20130625 Re: Xen Security Advisory 57 - libxl allows guest write access to sensitive console related xenstore keys",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/06/25/1"
"url": "http://www.debian.org/security/2014/dsa-3006",
"refsource": "MISC",
"name": "http://www.debian.org/security/2014/dsa-3006"
},
{
"name": "SUSE-SU-2014:0446",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
"url": "http://www.openwall.com/lists/oss-security/2013/06/25/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/06/25/1"
},
{
"name": "DSA-3006",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-3006"
"url": "http://www.openwall.com/lists/oss-security/2013/06/26/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/06/26/4"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2212",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,32 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "GLSA-201504-04",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201504-04"
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
},
{
"name": "SUSE-SU-2014:0373",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html"
},
{
"name": "[oss-security] 20130724 Xen Security Advisory 60 (CVE-2013-2212) - Excessive time to disable caching with HVM guests with PCI passthrough",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/07/24/6"
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html"
},
{
"name": "SUSE-SU-2014:0372",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html"
"url": "http://www.openwall.com/lists/oss-security/2013/07/24/6",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/07/24/6"
},
{
"name": "SUSE-SU-2014:0446",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
"url": "https://security.gentoo.org/glsa/201504-04",
"refsource": "MISC",
"name": "https://security.gentoo.org/glsa/201504-04"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2213",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -39,6 +39,7 @@
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "after 4.10.5"
}
]
@ -53,19 +54,19 @@
"references": {
"reference_data": [
{
"url": "http://openwall.com/lists/oss-security/2013/06/13/1",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=978243",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=978243"
"name": "http://openwall.com/lists/oss-security/2013/06/13/1"
},
{
"url": "http://openwall.com/lists/oss-security/2013/06/26/2",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2013/06/13/1",
"url": "http://openwall.com/lists/oss-security/2013/06/13/1"
"name": "http://openwall.com/lists/oss-security/2013/06/26/2"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=978243",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2013/06/26/2",
"url": "http://openwall.com/lists/oss-security/2013/06/26/2"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=978243"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2214",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "status.cgi in Nagios 4.0 before 4.0 beta4 and 3.x before 3.5.1 does not properly restrict access to certain users that are a contact for a service, which allows remote authenticated users to obtain sensitive information about hostnames via the servicegroup (1) overview, (2) summary, or (3) grid style in status.cgi. NOTE: this behavior is by design in most 3.x versions, but the upstream vendor \"decided to change it for Nagios 4\" and 3.5.1."
"value": "status.cgi in Nagios 4.0 before 4.0 beta4 and 3.x before 3.5.1 does not properly restrict access to certain users that are a contact for a service, which allows remote authenticated users to obtain sensitive information about hostnames via the servicegroup (1) overview, (2) summary, or (3) grid style in status.cgi. NOTE: this behavior is by design in most 3.x versions, but the upstream vendor \"decided to change it for Nagios 4\" and 3.5.1."
}
]
},
@ -50,32 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20130626 Re: CVE request: unauthorized host/service views displayed in servicegroup view",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2013/q2/622"
"url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00029.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00029.html"
},
{
"name": "openSUSE-SU-2013:1158",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00029.html"
"url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00031.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00031.html"
},
{
"name": "[oss-security] 20130626 CVE request: unauthorized host/service views displayed in servicegroup view",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2013/q2/619"
"url": "http://seclists.org/oss-sec/2013/q2/619",
"refsource": "MISC",
"name": "http://seclists.org/oss-sec/2013/q2/619"
},
{
"name": "openSUSE-SU-2013:1160",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00031.html"
"url": "http://seclists.org/oss-sec/2013/q2/622",
"refsource": "MISC",
"name": "http://seclists.org/oss-sec/2013/q2/622"
},
{
"name": "http://tracker.nagios.org/view.php?id=456",
"refsource": "CONFIRM",
"url": "http://tracker.nagios.org/view.php?id=456"
"url": "http://tracker.nagios.org/view.php?id=456",
"refsource": "MISC",
"name": "http://tracker.nagios.org/view.php?id=456"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2217",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "USN-2008-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2008-1"
"url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00062.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00062.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=978696",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=978696"
"url": "http://www.openwall.com/lists/oss-security/2013/06/27/8",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/06/27/8"
},
{
"name": "[oss-security] 20130628 Re: CVE Request -- python-suds: Insecure temporary directory use when initializing file-based URL cache",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/06/27/8"
"url": "http://www.ubuntu.com/usn/USN-2008-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2008-1"
},
{
"name": "openSUSE-SU-2013:1208",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00062.html"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=978696",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=978696"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-6418",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,47 +27,71 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20131220 Re: CVE already assigned for 1026891?",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2013/q4/531"
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
"refsource": "MISC",
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
},
{
"name": "[pywbem-devel] 20131216 TOCTOU issue (time of check, time of use)",
"refsource": "MLIST",
"url": "http://sourceforge.net/p/pywbem/mailman/message/31757312/"
"url": "http://seclists.org/oss-sec/2013/q4/531",
"refsource": "MISC",
"name": "http://seclists.org/oss-sec/2013/q4/531"
},
{
"name": "58327",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/58327"
"url": "http://secunia.com/advisories/58327",
"refsource": "MISC",
"name": "http://secunia.com/advisories/58327"
},
{
"name": "64544",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/64544"
"url": "http://sourceforge.net/p/pywbem/code/627/",
"refsource": "MISC",
"name": "http://sourceforge.net/p/pywbem/code/627/"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
"url": "http://sourceforge.net/p/pywbem/mailman/message/31757312/",
"refsource": "MISC",
"name": "http://sourceforge.net/p/pywbem/mailman/message/31757312/"
},
{
"name": "SUSE-SU-2014:0580",
"refsource": "SUSE",
"url": "https://www.suse.com/support/update/announcement/2014/suse-su-20140580-1.html"
"url": "http://www.securityfocus.com/bid/64544",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/64544"
},
{
"name": "http://sourceforge.net/p/pywbem/code/627/",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/p/pywbem/code/627/"
"url": "https://www.suse.com/support/update/announcement/2014/suse-su-20140580-1.html",
"refsource": "MISC",
"name": "https://www.suse.com/support/update/announcement/2014/suse-su-20140580-1.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1039801",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039801"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039801",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1039801"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-6419",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,42 +27,66 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "64250",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/64250"
},
{
"name": "https://review.openstack.org/#/c/61428/2/nova/api/metadata/handler.py",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0231.html",
"refsource": "MISC",
"url": "https://review.openstack.org/#/c/61428/2/nova/api/metadata/handler.py"
"name": "http://rhn.redhat.com/errata/RHSA-2014-0231.html"
},
{
"name": "RHSA-2014:0091",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0091.html"
},
{
"name": "RHSA-2014:0231",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0231.html"
},
{
"name": "[oss-security] 20131211 [OSSA 2013-033] Metadata queries from Neutron to Nova are not restricted by tenant (CVE-2013-6419)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/12/11/8"
},
{
"name": "https://review.openstack.org/#/c/61439/1/neutron/agent/metadata/agent.py",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0091.html",
"refsource": "MISC",
"url": "https://review.openstack.org/#/c/61439/1/neutron/agent/metadata/agent.py"
"name": "http://rhn.redhat.com/errata/RHSA-2014-0091.html"
},
{
"name": "https://bugs.launchpad.net/neutron/+bug/1235450",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/neutron/+bug/1235450"
"url": "http://www.openwall.com/lists/oss-security/2013/12/11/8",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/12/11/8"
},
{
"url": "http://www.securityfocus.com/bid/64250",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/64250"
},
{
"url": "https://bugs.launchpad.net/neutron/+bug/1235450",
"refsource": "MISC",
"name": "https://bugs.launchpad.net/neutron/+bug/1235450"
},
{
"url": "https://review.openstack.org/#/c/61428/2/nova/api/metadata/handler.py",
"refsource": "MISC",
"name": "https://review.openstack.org/#/c/61428/2/nova/api/metadata/handler.py"
},
{
"url": "https://review.openstack.org/#/c/61439/1/neutron/agent/metadata/agent.py",
"refsource": "MISC",
"name": "https://review.openstack.org/#/c/61439/1/neutron/agent/metadata/agent.py"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2013-6424 xorg-x11-server: integer underflow when handling trapezoids"
"value": "Integer underflow in the xTrapezoidValid macro in render/picture.h in X.Org allows context-dependent attackers to cause a denial of service (crash) via a negative bottom value."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Integer Overflow or Wraparound",
"cweId": "CWE-190"
"value": "n/a"
}
]
}
@ -32,27 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:1.1.1-48.101.el5_10.2",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:1.13.0-23.1.el6_5",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -100,16 +88,6 @@
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2500-1"
},
{
"url": "https://access.redhat.com/errata/RHSA-2013:1868",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:1868"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2013-6424",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2013-6424"
},
{
"url": "https://bugs.freedesktop.org/show_bug.cgi?id=67484",
"refsource": "MISC",
@ -120,11 +98,6 @@
"refsource": "MISC",
"name": "https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1197921"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1037984",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1037984"
},
{
"url": "https://security.gentoo.org/glsa/201701-64",
"refsource": "MISC",
@ -136,30 +109,5 @@
"name": "https://security.gentoo.org/glsa/201710-30"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 7.4,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "COMPLETE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "COMPLETE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C",
"version": "2.0"
}
]
}
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-6427",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,32 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "USN-2085-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2085-1"
},
{
"name": "openSUSE-SU-2014:0127",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00087.html"
},
{
"name": "[oss-security] 20131204 Re: CVE needed for hplip insecure auto update feature?",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2013/12/05/2"
},
{
"name": "DSA-2829",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2829"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=853405",
"url": "http://www.debian.org/security/2013/dsa-2829",
"refsource": "MISC",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=853405"
"name": "http://www.debian.org/security/2013/dsa-2829"
},
{
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00087.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00087.html"
},
{
"url": "http://www.ubuntu.com/usn/USN-2085-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2085-1"
},
{
"url": "http://openwall.com/lists/oss-security/2013/12/05/2",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2013/12/05/2"
},
{
"url": "https://bugzilla.novell.com/show_bug.cgi?id=853405",
"refsource": "MISC",
"name": "https://bugzilla.novell.com/show_bug.cgi?id=853405"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-6428",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,22 +27,46 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://launchpad.net/bugs/1256983",
"refsource": "CONFIRM",
"url": "https://launchpad.net/bugs/1256983"
"url": "http://rhn.redhat.com/errata/RHSA-2014-0090.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2014-0090.html"
},
{
"name": "RHSA-2014:0090",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0090.html"
"url": "http://seclists.org/oss-sec/2013/q4/479",
"refsource": "MISC",
"name": "http://seclists.org/oss-sec/2013/q4/479"
},
{
"name": "[oss-security] 20131211 [OSSA 2013-035] Heat ReST API doesn't respect tenant scoping (CVE-2013-6428)",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2013/q4/479"
"url": "https://launchpad.net/bugs/1256983",
"refsource": "MISC",
"name": "https://launchpad.net/bugs/1256983"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-6429",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,42 +27,66 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "20140114 CVE-2013-6429 Fix for XML External Entity (XXE) injection (CVE-2013-4152) in Spring Framework was incomplete",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/530770/100/0/threaded"
"url": "http://rhn.redhat.com/errata/RHSA-2014-0400.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2014-0400.html"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755"
"url": "http://secunia.com/advisories/57915",
"refsource": "MISC",
"name": "http://secunia.com/advisories/57915"
},
{
"name": "https://jira.springsource.org/browse/SPR-11078?page=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel",
"refsource": "CONFIRM",
"url": "https://jira.springsource.org/browse/SPR-11078?page=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel"
"url": "http://www.gopivotal.com/security/cve-2013-6429",
"refsource": "MISC",
"name": "http://www.gopivotal.com/security/cve-2013-6429"
},
{
"name": "http://www.gopivotal.com/security/cve-2013-6429",
"refsource": "CONFIRM",
"url": "http://www.gopivotal.com/security/cve-2013-6429"
"url": "http://www.securityfocus.com/archive/1/530770/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/530770/100/0/threaded"
},
{
"name": "RHSA-2014:0400",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0400.html"
"url": "http://www.securityfocus.com/bid/64947",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/64947"
},
{
"name": "64947",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/64947"
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755",
"refsource": "MISC",
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755"
},
{
"name": "57915",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/57915"
"url": "https://jira.springsource.org/browse/SPR-11078?page=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel",
"refsource": "MISC",
"name": "https://jira.springsource.org/browse/SPR-11078?page=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-6430",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -39,6 +39,7 @@
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "before 3.2.2"
}
]
@ -53,19 +54,19 @@
"references": {
"reference_data": [
{
"url": "http://www.gopivotal.com/security/cve-2013-6430",
"refsource": "MISC",
"name": "http://www.gopivotal.com/security/cve-2013-6430",
"url": "http://www.gopivotal.com/security/cve-2013-6430"
"name": "http://www.gopivotal.com/security/cve-2013-6430"
},
{
"url": "https://github.com/spring-projects/spring-framework/commit/7a7df6637478607bef0277bf52a4e0a03e20a248",
"refsource": "MISC",
"name": "https://github.com/spring-projects/spring-framework/commit/7a7df6637478607bef0277bf52a4e0a03e20a248",
"url": "https://github.com/spring-projects/spring-framework/commit/7a7df6637478607bef0277bf52a4e0a03e20a248"
"name": "https://github.com/spring-projects/spring-framework/commit/7a7df6637478607bef0277bf52a4e0a03e20a248"
},
{
"url": "https://jira.springsource.org/browse/SPR-9983",
"refsource": "MISC",
"name": "https://jira.springsource.org/browse/SPR-9983",
"url": "https://jira.springsource.org/browse/SPR-9983"
"name": "https://jira.springsource.org/browse/SPR-9983"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2013-6431 kernel: net: fib: fib6_add: potential NULL pointer dereference"
"value": "The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "NULL Pointer Dereference",
"cweId": "CWE-476"
"value": "n/a"
}
]
}
@ -32,16 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise MRG 2",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:3.8.13-rt27.33.el6rt",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -64,11 +63,6 @@
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2014-0100.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2014:0100",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2014:0100"
},
{
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.5",
"refsource": "MISC",
@ -85,44 +79,14 @@
"name": "http://www.openwall.com/lists/oss-security/2013/12/06/5"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2013-6431",
"url": "https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2013-6431"
"name": "https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039054",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1039054"
},
{
"url": "https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.4,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:M/Au:S/C:N/I:N/A:C",
"version": "2.0"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-6432",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,47 +27,71 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "USN-2113-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2113-1"
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.html"
},
{
"name": "[oss-security] 20131206 Re: CVE request: Kernel: ping: NULL pointer dereference on write to msg_name",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/12/06/6"
"url": "http://www.ubuntu.com/usn/USN-2113-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2113-1"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4"
"url": "http://www.ubuntu.com/usn/USN-2117-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2117-1"
},
{
"name": "USN-2117-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2117-1"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cf970c002d270c36202bd5b9c2804d3097a52da0",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cf970c002d270c36202bd5b9c2804d3097a52da0"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1039046",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039046"
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4"
},
{
"name": "https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0"
"url": "http://www.openwall.com/lists/oss-security/2013/12/06/6",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/12/06/6"
},
{
"name": "openSUSE-SU-2014:0205",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.html"
"url": "https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=cf970c002d270c36202bd5b9c2804d3097a52da0",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=cf970c002d270c36202bd5b9c2804d3097a52da0"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039046",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1039046"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2013-6434 rhev: remote-viewer spice tls-stripping issue"
"value": "The remote-viewer in Red Hat Enterprise Virtualization Manager (RHEV-M) before 3.3, when using a native SPICE client invocation method, initially makes insecure connections to the SPICE server, which allows man-in-the-middle attackers to spoof the SPICE server."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Channel Accessible by Non-Endpoint",
"cweId": "CWE-300"
"value": "n/a"
}
]
}
@ -32,16 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "RHEV Manager version 3.3",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:3.3.0-45",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -68,46 +67,6 @@
"url": "http://www.securitytracker.com/id/1029653",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id/1029653"
},
{
"url": "https://access.redhat.com/errata/RHSA-2014:0038",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2014:0038"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2013-6434",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2013-6434"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039839",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1039839"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.3,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:A/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}