"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-02-13 04:05:38 +00:00
parent 42885b6a95
commit 606c5d80b4
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
68 changed files with 3115 additions and 3794 deletions

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2243",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "linux-2.6",
"product": {
"product_data": [
{
"product_name": "linux-2.6",
"version": {
"version_data": [
{
"version_value": "before 2.6.33"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "linux-2.6",
"product": {
"product_data": [
{
"product_name": "linux-2.6",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "before 2.6.33"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://security-tracker.debian.org/tracker/CVE-2010-2243",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2010-2243"
},
{
"url": "https://access.redhat.com/security/cve/cve-2010-2243",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2010-2243"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20100625 Re: CVE request: kernel: timekeeping: Prevent oops when GENERIC_TIME=n",
"url": "https://www.openwall.com/lists/oss-security/2010/06/25/1"
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad6759fbf35d104dbf573cd6f4c6784ad6823f7e",
"refsource": "MISC",
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad6759fbf35d104dbf573cd6f4c6784ad6823f7e"
},
{
"refsource": "CONFIRM",
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad6759fbf35d104dbf573cd6f4c6784ad6823f7e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad6759fbf35d104dbf573cd6f4c6784ad6823f7e"
"url": "https://security-tracker.debian.org/tracker/CVE-2010-2243",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2010-2243"
},
{
"url": "https://www.openwall.com/lists/oss-security/2010/06/25/1",
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2010/06/25/1"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2244",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,47 +27,71 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20100625 Re: CVE Request: avahi DoS",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127748459505200&w=2"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043800.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043800.html"
},
{
"name": "[oss-security] 20100623 CVE Request: avahi DoS",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/06/23/4"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043820.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043820.html"
},
{
"name": "FEDORA-2010-10584",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043800.html"
"url": "http://marc.info/?l=oss-security&m=127748459505200&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=127748459505200&w=2"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=607293",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=607293"
"url": "http://www.debian.org/security/2010/dsa-2086",
"refsource": "MISC",
"name": "http://www.debian.org/security/2010/dsa-2086"
},
{
"name": "MDVSA-2010:204",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:204"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:204",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:204"
},
{
"name": "1024200",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024200"
"url": "http://www.openwall.com/lists/oss-security/2010/06/23/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/06/23/4"
},
{
"name": "DSA-2086",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2086"
"url": "http://www.securitytracker.com/id?1024200",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1024200"
},
{
"name": "FEDORA-2010-10581",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043820.html"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=607293",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=607293"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2246",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://derf.homelinux.org/git/feh/plain/ChangeLog",
"refsource": "CONFIRM",
"url": "http://derf.homelinux.org/git/feh/plain/ChangeLog"
"url": "http://derf.homelinux.org/git/feh/plain/ChangeLog",
"refsource": "MISC",
"name": "http://derf.homelinux.org/git/feh/plain/ChangeLog"
},
{
"name": "[oss-security] 20100628 Re: CVE request: feh",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/06/28/4"
"url": "http://openwall.com/lists/oss-security/2010/06/25/4",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/06/25/4"
},
{
"name": "41161",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/41161"
"url": "http://openwall.com/lists/oss-security/2010/06/28/4",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/06/28/4"
},
{
"name": "[oss-security] 20100625 CVE request: feh",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/06/25/4"
"url": "http://www.securityfocus.com/bid/41161",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/41161"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2247",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "makepasswd",
"product": {
"product_data": [
{
"product_name": "makepasswd",
"version": {
"version_data": [
{
"version_value": "1.10"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "makepasswd",
"product": {
"product_data": [
{
"product_name": "makepasswd",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.10"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://security-tracker.debian.org/tracker/CVE-2010-2247",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2010-2247"
},
{
"url": "https://access.redhat.com/security/cve/cve-2010-2247",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2010-2247"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-1db19e75db",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JLAGK43ZTRNAMRO7JI2AW4BAZS35QSEE/"
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLHAXN3XRR7RJ73SJTBSW3GZT4GLHI33/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLHAXN3XRR7RJ73SJTBSW3GZT4GLHI33/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-a5b60d0c2b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HLHAXN3XRR7RJ73SJTBSW3GZT4GLHI33/"
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JLAGK43ZTRNAMRO7JI2AW4BAZS35QSEE/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JLAGK43ZTRNAMRO7JI2AW4BAZS35QSEE/"
},
{
"url": "https://security-tracker.debian.org/tracker/CVE-2010-2247",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2010-2247"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-2248 kernel: cifs: Fix a kernel BUG with remote OS/2 server"
"value": "fs/cifs/cifssmb.c in the CIFS implementation in the Linux kernel before 2.6.34-rc4 allows remote attackers to cause a denial of service (panic) via an SMB response packet with an invalid CountHigh value, as demonstrated by a response from an OS/2 server, related to the CIFSSMBWrite and CIFSSMBWrite2 functions."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Reachable Assertion",
"cweId": "CWE-617"
"value": "n/a"
}
]
}
@ -32,38 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "MRG for RHEL-5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:2.6.24.7-161.el5rt",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 4",
"version": {
"version_data": [
{
"version_value": "0:2.6.9-89.0.28.EL",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5",
"version": {
"version_data": [
{
"version_value": "0:2.6.18-194.11.1.el5",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -81,11 +58,6 @@
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0631",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0631"
},
{
"url": "http://secunia.com/advisories/43315",
"refsource": "MISC",
@ -126,16 +98,6 @@
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1000-1"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0610",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0610"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0606",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0606"
},
{
"url": "https://rhn.redhat.com/errata/RHSA-2010-0606.html",
"refsource": "MISC",
@ -171,41 +133,11 @@
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/42242"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-2248",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-2248"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=608583",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=608583"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 7.1,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
}
]
}
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-2249 libpng: Memory leak when processing Physical Scale (sCAL) images"
"value": "Memory leak in pngrutil.c in libpng before 1.2.44, and 1.4.x before 1.4.3, allows remote attackers to cause a denial of service (memory consumption and application crash) via a PNG image containing malformed Physical Scale (aka sCAL) chunks."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Missing Release of Memory after Effective Lifetime",
"cweId": "CWE-401"
"value": "n/a"
}
]
}
@ -32,46 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 3",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "2:1.2.2-30",
"version_affected": "!"
},
{
"version_value": "0:1.0.13-21",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 4",
"version": {
"version_data": [
{
"version_value": "2:1.2.7-3.el4_8.3",
"version_affected": "!"
},
{
"version_value": "0:1.0.16-3.el4_8.4",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5",
"version": {
"version_data": [
{
"version_value": "2:1.2.10-7.1.el5_5.3",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -275,49 +244,14 @@
"name": "http://www.vupen.com/english/advisories/2010/3046"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0534",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59816",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0534"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-2249",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-2249"
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59816"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=608644",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=608644"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59816",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59816"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.3,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2474",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,32 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "40568",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40568"
"url": "http://secunia.com/advisories/40568",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40568"
},
{
"name": "40681",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40681"
"url": "http://secunia.com/advisories/40681",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40681"
},
{
"name": "https://jira.jboss.org/browse/JBESB-3345",
"refsource": "CONFIRM",
"url": "https://jira.jboss.org/browse/JBESB-3345"
"url": "http://www.redhat.com/docs/en-US/JBoss_SOA_Platform/5.0.2/html/5.0.2_Release_Notes/index.html",
"refsource": "MISC",
"name": "http://www.redhat.com/docs/en-US/JBoss_SOA_Platform/5.0.2/html/5.0.2_Release_Notes/index.html"
},
{
"name": "http://www.redhat.com/docs/en-US/JBoss_SOA_Platform/5.0.2/html/5.0.2_Release_Notes/index.html",
"refsource": "CONFIRM",
"url": "http://www.redhat.com/docs/en-US/JBoss_SOA_Platform/5.0.2/html/5.0.2_Release_Notes/index.html"
"url": "https://jira.jboss.org/browse/JBESB-3345",
"refsource": "MISC",
"name": "https://jira.jboss.org/browse/JBESB-3345"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=609442",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=609442"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=609442",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=609442"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2477",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,52 +27,76 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://pylonshq.com/articles/archives/2010/6/paste_174_released_addresses_xss_security_hole",
"refsource": "CONFIRM",
"url": "http://pylonshq.com/articles/archives/2010/6/paste_174_released_addresses_xss_security_hole"
"url": "http://bitbucket.org/ianb/paste/changeset/fcae59df8b56",
"refsource": "MISC",
"name": "http://bitbucket.org/ianb/paste/changeset/fcae59df8b56"
},
{
"name": "http://bitbucket.org/ianb/paste/changeset/fcae59df8b56",
"refsource": "CONFIRM",
"url": "http://bitbucket.org/ianb/paste/changeset/fcae59df8b56"
"url": "http://groups.google.com/group/paste-users/browse_thread/thread/3b3fff3dadd0b1e5?pli=1",
"refsource": "MISC",
"name": "http://groups.google.com/group/paste-users/browse_thread/thread/3b3fff3dadd0b1e5?pli=1"
},
{
"name": "41160",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/41160"
"url": "http://groups.google.com/group/pylons-discuss/msg/8c256dc076a408d8?dmode=source&output=gplain",
"refsource": "MISC",
"name": "http://groups.google.com/group/pylons-discuss/msg/8c256dc076a408d8?dmode=source&output=gplain"
},
{
"name": "http://groups.google.com/group/paste-users/browse_thread/thread/3b3fff3dadd0b1e5?pli=1",
"refsource": "CONFIRM",
"url": "http://groups.google.com/group/paste-users/browse_thread/thread/3b3fff3dadd0b1e5?pli=1"
"url": "http://marc.info/?l=oss-security&m=127785414818815&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=127785414818815&w=2"
},
{
"name": "42500",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42500"
"url": "http://marc.info/?l=oss-security&m=127792576822169&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=127792576822169&w=2"
},
{
"name": "USN-1026-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1026-1"
"url": "http://pylonshq.com/articles/archives/2010/6/paste_174_released_addresses_xss_security_hole",
"refsource": "MISC",
"name": "http://pylonshq.com/articles/archives/2010/6/paste_174_released_addresses_xss_security_hole"
},
{
"name": "[pylons-discuss] 20100624 Paste 1.7.4, security fix for XSS hole",
"refsource": "MLIST",
"url": "http://groups.google.com/group/pylons-discuss/msg/8c256dc076a408d8?dmode=source&output=gplain"
"url": "http://secunia.com/advisories/42500",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42500"
},
{
"name": "[oss-security] 20100629 CVE request: XSS in python paste",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127785414818815&w=2"
"url": "http://www.securityfocus.com/bid/41160",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/41160"
},
{
"name": "[oss-security] 20100630 Re: CVE request: XSS in python paste",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127792576822169&w=2"
"url": "http://www.ubuntu.com/usn/USN-1026-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1026-1"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-2478 kernel: ethtool: kernel buffer overflow in ETHTOOL_GRXCLSRLALL"
"value": "Integer overflow in the ethtool_get_rxnfc function in net/core/ethtool.c in the Linux kernel before 2.6.33.7 on 32-bit platforms allows local users to cause a denial of service or possibly have unspecified other impact via an ETHTOOL_GRXCLSRLALL ethtool command with a large info.rule_cnt value that triggers a buffer overflow, a different vulnerability than CVE-2010-3084."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"cweId": "CWE-119"
"value": "n/a"
}
]
}
@ -40,8 +39,8 @@
"version": {
"version_data": [
{
"version_value": "n/a",
"version_affected": "="
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -99,41 +98,11 @@
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/41223"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-2478",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-2478"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=608950",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=608950"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 7.2,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "COMPLETE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "COMPLETE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
]
}
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2479",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,47 +27,71 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "39613",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39613"
"url": "http://htmlpurifier.org/news/2010/0531-4.1.1-released",
"refsource": "MISC",
"name": "http://htmlpurifier.org/news/2010/0531-4.1.1-released"
},
{
"name": "http://wiki.mahara.org/Release_Notes/1.1.9",
"refsource": "CONFIRM",
"url": "http://wiki.mahara.org/Release_Notes/1.1.9"
"url": "http://repo.or.cz/w/htmlpurifier.git/commitdiff/18e538317a877a0509ae71a860429c41770da230",
"refsource": "MISC",
"name": "http://repo.or.cz/w/htmlpurifier.git/commitdiff/18e538317a877a0509ae71a860429c41770da230"
},
{
"name": "http://htmlpurifier.org/news/2010/0531-4.1.1-released",
"refsource": "CONFIRM",
"url": "http://htmlpurifier.org/news/2010/0531-4.1.1-released"
"url": "http://secunia.com/advisories/39613",
"refsource": "MISC",
"name": "http://secunia.com/advisories/39613"
},
{
"name": "41259",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/41259"
"url": "http://secunia.com/advisories/40431",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40431"
},
{
"name": "http://wiki.mahara.org/Release_Notes/1.2.5",
"refsource": "CONFIRM",
"url": "http://wiki.mahara.org/Release_Notes/1.2.5"
"url": "http://wiki.mahara.org/Release_Notes/1.0.15",
"refsource": "MISC",
"name": "http://wiki.mahara.org/Release_Notes/1.0.15"
},
{
"name": "http://repo.or.cz/w/htmlpurifier.git/commitdiff/18e538317a877a0509ae71a860429c41770da230",
"refsource": "CONFIRM",
"url": "http://repo.or.cz/w/htmlpurifier.git/commitdiff/18e538317a877a0509ae71a860429c41770da230"
"url": "http://wiki.mahara.org/Release_Notes/1.1.9",
"refsource": "MISC",
"name": "http://wiki.mahara.org/Release_Notes/1.1.9"
},
{
"name": "http://wiki.mahara.org/Release_Notes/1.0.15",
"refsource": "CONFIRM",
"url": "http://wiki.mahara.org/Release_Notes/1.0.15"
"url": "http://wiki.mahara.org/Release_Notes/1.2.5",
"refsource": "MISC",
"name": "http://wiki.mahara.org/Release_Notes/1.2.5"
},
{
"name": "40431",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40431"
"url": "http://www.securityfocus.com/bid/41259",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/41259"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4346",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,77 +27,101 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=662189",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=662189"
"url": "http://secunia.com/advisories/46397",
"refsource": "MISC",
"name": "http://secunia.com/advisories/46397"
},
{
"name": "46397",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46397"
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"name": "[oss-security] 20101209 Re: [taviso@cmpxchg8b.com: [PATCH] install_special_mapping skips security_file_mmap check.]",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/09/13"
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "MISC",
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=462e635e5b73ba9a4c03913b77138cd57ce4b050",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=462e635e5b73ba9a4c03913b77138cd57ce4b050"
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc6",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc6"
},
{
"name": "[linux-kernel] 20101209 [PATCH] install_special_mapping skips security_file_mmap check.",
"refsource": "MLIST",
"url": "https://lkml.org/lkml/2010/12/9/222"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=462e635e5b73ba9a4c03913b77138cd57ce4b050",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=462e635e5b73ba9a4c03913b77138cd57ce4b050"
},
{
"name": "[oss-security] 20101210 Re: Subject: CVE request: kernel: install_special_mapping skips security_file_mmap check",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/10/3"
"url": "http://openwall.com/lists/oss-security/2010/12/09/12",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/09/12"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
"url": "http://openwall.com/lists/oss-security/2010/12/09/13",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/09/13"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc6",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc6"
"url": "http://openwall.com/lists/oss-security/2010/12/10/2",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/10/2"
},
{
"name": "MDVSA-2011:029",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"
"url": "http://openwall.com/lists/oss-security/2010/12/10/3",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/10/3"
},
{
"name": "45323",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45323"
"url": "http://secunia.com/advisories/42570",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42570"
},
{
"name": "[oss-security] 20101210 Subject: CVE request: kernel: install_special_mapping skips security_file_mmap check",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/10/2"
"url": "http://www.securityfocus.com/bid/45323",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45323"
},
{
"name": "[oss-security] 20101209 [taviso@cmpxchg8b.com: [PATCH] install_special_mapping skips security_file_mmap check.]",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/09/12"
"url": "https://lkml.org/lkml/2010/12/9/222",
"refsource": "MISC",
"name": "https://lkml.org/lkml/2010/12/9/222"
},
{
"name": "42570",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42570"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=662189",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=662189"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4347",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,72 +27,96 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=663542",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=663542"
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
},
{
"name": "42778",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42778"
"url": "http://www.vupen.com/english/advisories/2011/0298",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0298"
},
{
"name": "SUSE-SA:2011:001",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"
},
{
"name": "45408",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45408"
"url": "http://secunia.com/advisories/42778",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42778"
},
{
"name": "SUSE-SA:2011:007",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
"url": "http://www.vupen.com/english/advisories/2011/0012",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0012"
},
{
"name": "ADV-2011-0298",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0298"
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ed3aada1bf34c5a9e98af167f125f8a740fc726a",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ed3aada1bf34c5a9e98af167f125f8a740fc726a"
},
{
"name": "[oss-security] 20101215 CVE Request: local privilege escalation via /sys/kernel/debug/acpi/custom_method",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/15/3"
"url": "http://openwall.com/lists/oss-security/2010/12/15/3",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/15/3"
},
{
"name": "ADV-2011-0012",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0012"
"url": "http://openwall.com/lists/oss-security/2010/12/15/7",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/15/7"
},
{
"name": "[oss-security] 20101215 Re: CVE Request: local privilege escalation via /sys/kernel/debug/acpi/custom_method",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/15/7"
"url": "http://www.exploit-db.com/exploits/15774/",
"refsource": "MISC",
"name": "http://www.exploit-db.com/exploits/15774/"
},
{
"name": "15774",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/15774/"
"url": "http://www.securityfocus.com/bid/45408",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45408"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ed3aada1bf34c5a9e98af167f125f8a740fc726a",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ed3aada1bf34c5a9e98af167f125f8a740fc726a"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64155",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64155"
},
{
"name": "kernel-debugfs-privilege-esc(64155)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64155"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=663542",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=663542"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4348",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,72 +27,96 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "ADV-2011-0002",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0002"
},
{
"name": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php",
"url": "http://secunia.com/advisories/51199",
"refsource": "MISC",
"url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php"
"name": "http://secunia.com/advisories/51199"
},
{
"name": "[oss-security] 20101216 Re: CVE request: MantisBT <=1.2.3 (db_type) Cross-Site Scripting & Path Disclosure Vulnerability",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/16/1"
"url": "http://security.gentoo.org/glsa/glsa-201211-01.xml",
"refsource": "MISC",
"name": "http://security.gentoo.org/glsa/glsa-201211-01.xml"
},
{
"name": "GLSA-201211-01",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201211-01.xml"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html"
},
{
"name": "http://www.mantisbt.org/blog/?p=123",
"refsource": "CONFIRM",
"url": "http://www.mantisbt.org/blog/?p=123"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html"
},
{
"name": "http://www.mantisbt.org/bugs/view.php?id=12607",
"refsource": "CONFIRM",
"url": "http://www.mantisbt.org/bugs/view.php?id=12607"
"url": "http://openwall.com/lists/oss-security/2010/12/15/4",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/15/4"
},
{
"name": "51199",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51199"
"url": "http://openwall.com/lists/oss-security/2010/12/16/1",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/16/1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=663230",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=663230"
"url": "http://secunia.com/advisories/42772",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42772"
},
{
"name": "FEDORA-2010-19078",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html"
"url": "http://www.mantisbt.org/blog/?p=123",
"refsource": "MISC",
"name": "http://www.mantisbt.org/blog/?p=123"
},
{
"name": "[oss-security] 20101215 CVE request: MantisBT <=1.2.3 (db_type) Cross-Site Scripting & Path Disclosure Vulnerability",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/15/4"
"url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112",
"refsource": "MISC",
"name": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112"
},
{
"name": "42772",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42772"
"url": "http://www.mantisbt.org/bugs/view.php?id=12607",
"refsource": "MISC",
"name": "http://www.mantisbt.org/bugs/view.php?id=12607"
},
{
"name": "FEDORA-2010-19070",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html"
"url": "http://www.vupen.com/english/advisories/2011/0002",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0002"
},
{
"name": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112",
"refsource": "CONFIRM",
"url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112"
"url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php",
"refsource": "MISC",
"name": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=663230",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=663230"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4349",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,77 +27,101 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "ADV-2011-0002",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0002"
},
{
"name": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php",
"url": "http://secunia.com/advisories/51199",
"refsource": "MISC",
"url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php"
"name": "http://secunia.com/advisories/51199"
},
{
"name": "[oss-security] 20101216 Re: CVE request: MantisBT <=1.2.3 (db_type) Cross-Site Scripting & Path Disclosure Vulnerability",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/16/1"
"url": "http://security.gentoo.org/glsa/glsa-201211-01.xml",
"refsource": "MISC",
"name": "http://security.gentoo.org/glsa/glsa-201211-01.xml"
},
{
"name": "GLSA-201211-01",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201211-01.xml"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html"
},
{
"name": "http://www.mantisbt.org/blog/?p=123",
"refsource": "CONFIRM",
"url": "http://www.mantisbt.org/blog/?p=123"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html"
},
{
"name": "http://www.mantisbt.org/bugs/view.php?id=12607",
"refsource": "CONFIRM",
"url": "http://www.mantisbt.org/bugs/view.php?id=12607"
"url": "http://openwall.com/lists/oss-security/2010/12/15/4",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/15/4"
},
{
"name": "mantisbt-dbtype-path-disclosure(64463)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64463"
"url": "http://openwall.com/lists/oss-security/2010/12/16/1",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/16/1"
},
{
"name": "51199",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51199"
"url": "http://secunia.com/advisories/42772",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42772"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=663230",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=663230"
"url": "http://www.mantisbt.org/blog/?p=123",
"refsource": "MISC",
"name": "http://www.mantisbt.org/blog/?p=123"
},
{
"name": "FEDORA-2010-19078",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html"
"url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112",
"refsource": "MISC",
"name": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112"
},
{
"name": "[oss-security] 20101215 CVE request: MantisBT <=1.2.3 (db_type) Cross-Site Scripting & Path Disclosure Vulnerability",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/15/4"
"url": "http://www.mantisbt.org/bugs/view.php?id=12607",
"refsource": "MISC",
"name": "http://www.mantisbt.org/bugs/view.php?id=12607"
},
{
"name": "42772",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42772"
"url": "http://www.vupen.com/english/advisories/2011/0002",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0002"
},
{
"name": "FEDORA-2010-19070",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html"
"url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php",
"refsource": "MISC",
"name": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php"
},
{
"name": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112",
"refsource": "CONFIRM",
"url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64463",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64463"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=663230",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=663230"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4350",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,72 +27,96 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "ADV-2011-0002",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0002"
},
{
"name": "[oss-security] 20101215 CVE request: MantisBT <=1.2.3 (db_type) Local File Inclusion Vulnerability",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/15/5"
},
{
"name": "GLSA-201211-01",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201211-01.xml"
},
{
"name": "http://www.mantisbt.org/blog/?p=123",
"refsource": "CONFIRM",
"url": "http://www.mantisbt.org/blog/?p=123"
},
{
"name": "[oss-security] 20101216 Re: CVE request: MantisBT <=1.2.3 (db_type) Local File Inclusion Vulnerability",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/16/2"
},
{
"name": "http://www.mantisbt.org/bugs/view.php?id=12607",
"refsource": "CONFIRM",
"url": "http://www.mantisbt.org/bugs/view.php?id=12607"
},
{
"name": "51199",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51199"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=663230",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=663230"
},
{
"name": "FEDORA-2010-19078",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html"
},
{
"name": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4984.php",
"url": "http://secunia.com/advisories/51199",
"refsource": "MISC",
"url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4984.php"
"name": "http://secunia.com/advisories/51199"
},
{
"name": "42772",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42772"
"url": "http://security.gentoo.org/glsa/glsa-201211-01.xml",
"refsource": "MISC",
"name": "http://security.gentoo.org/glsa/glsa-201211-01.xml"
},
{
"name": "FEDORA-2010-19070",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html"
},
{
"name": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112",
"refsource": "CONFIRM",
"url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html"
},
{
"url": "http://secunia.com/advisories/42772",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42772"
},
{
"url": "http://www.mantisbt.org/blog/?p=123",
"refsource": "MISC",
"name": "http://www.mantisbt.org/blog/?p=123"
},
{
"url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112",
"refsource": "MISC",
"name": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112"
},
{
"url": "http://www.mantisbt.org/bugs/view.php?id=12607",
"refsource": "MISC",
"name": "http://www.mantisbt.org/bugs/view.php?id=12607"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0002",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0002"
},
{
"url": "http://openwall.com/lists/oss-security/2010/12/15/5",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/15/5"
},
{
"url": "http://openwall.com/lists/oss-security/2010/12/16/2",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/16/2"
},
{
"url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4984.php",
"refsource": "MISC",
"name": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4984.php"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=663230",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=663230"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-4351 IcedTea jnlp security manager bypass"
"value": "The JNLP SecurityManager in IcedTea (IcedTea.so) 1.7 before 1.7.7, 1.8 before 1.8.4, and 1.9 before 1.9.4 for Java OpenJDK returns from the checkPermission method instead of throwing an exception in certain circumstances, which might allow context-dependent attackers to bypass the intended security policy by creating instances of ClassLoader."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Authentication Bypass by Primary Weakness",
"cweId": "CWE-305"
"value": "n/a"
}
]
}
@ -32,16 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "1:1.6.0.0-1.17.b17.el5",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -94,11 +93,6 @@
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0215"
},
{
"url": "https://access.redhat.com/errata/RHSA-2011:0176",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0176"
},
{
"url": "http://blog.fuseyism.com/index.php/2011/01/18/security-icedtea6-177-184-194-released/",
"refsource": "MISC",
@ -160,44 +154,14 @@
"name": "http://www.zerodayinitiative.com/advisories/ZDI-11-014/"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-4351",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64893",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-4351"
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64893"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=663680",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=663680"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64893",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64893"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 7.5,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4352",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,117 +27,141 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "ADV-2011-0178",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0178"
},
{
"name": "[oss-security] 20101216 CVE Request -- D-BUS -- Stack frame overflow by validating message with excessive number of nested variants",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/16/3"
},
{
"name": "openSUSE-SU-2012:1418",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html"
},
{
"name": "FEDORA-2010-19166",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052550.html"
},
{
"name": "http://cgit.freedesktop.org/dbus/dbus/commit/?id=7d65a3a6ed8815e34a99c680ac3869fde49dbbd4",
"refsource": "CONFIRM",
"url": "http://cgit.freedesktop.org/dbus/dbus/commit/?id=7d65a3a6ed8815e34a99c680ac3869fde49dbbd4"
},
{
"name": "http://www.remlab.net/op/dbus-variant-recursion.shtml",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
"refsource": "MISC",
"url": "http://www.remlab.net/op/dbus-variant-recursion.shtml"
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
},
{
"name": "42911",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42911"
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html"
},
{
"name": "[oss-security] 20101221 Re: Re: CVE Request -- D-BUS -- Stack frame overflow by validating message with excessive number of nested variants",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/21/3"
"url": "http://www.vupen.com/english/advisories/2011/0464",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0464"
},
{
"name": "42580",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42580"
"url": "http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html"
},
{
"name": "42960",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42960"
"url": "http://cgit.freedesktop.org/dbus/dbus/commit/?id=7d65a3a6ed8815e34a99c680ac3869fde49dbbd4",
"refsource": "MISC",
"name": "http://cgit.freedesktop.org/dbus/dbus/commit/?id=7d65a3a6ed8815e34a99c680ac3869fde49dbbd4"
},
{
"name": "DSA-2149",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2149"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052550.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052550.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=663673",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=663673"
"url": "http://openwall.com/lists/oss-security/2010/12/16/3",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/16/3"
},
{
"name": "45377",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45377"
"url": "http://openwall.com/lists/oss-security/2010/12/16/6",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/16/6"
},
{
"name": "SUSE-SR:2011:004",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html"
"url": "http://openwall.com/lists/oss-security/2010/12/21/3",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/21/3"
},
{
"name": "USN-1044-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1044-1"
"url": "http://secunia.com/advisories/42580",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42580"
},
{
"name": "https://bugs.freedesktop.org/show_bug.cgi?id=32321",
"refsource": "CONFIRM",
"url": "https://bugs.freedesktop.org/show_bug.cgi?id=32321"
"url": "http://secunia.com/advisories/42760",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42760"
},
{
"name": "ADV-2011-0464",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0464"
"url": "http://secunia.com/advisories/42911",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42911"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
"url": "http://secunia.com/advisories/42960",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42960"
},
{
"name": "ADV-2011-0161",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0161"
"url": "http://www.debian.org/security/2011/dsa-2149",
"refsource": "MISC",
"name": "http://www.debian.org/security/2011/dsa-2149"
},
{
"name": "ADV-2010-3325",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3325"
"url": "http://www.remlab.net/op/dbus-variant-recursion.shtml",
"refsource": "MISC",
"name": "http://www.remlab.net/op/dbus-variant-recursion.shtml"
},
{
"name": "42760",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42760"
"url": "http://www.securityfocus.com/bid/45377",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45377"
},
{
"name": "[oss-security] 20101216 Re: CVE Request -- D-BUS -- Stack frame overflow by validating message with excessive number of nested variants",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/16/6"
"url": "http://www.ubuntu.com/usn/USN-1044-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1044-1"
},
{
"url": "http://www.vupen.com/english/advisories/2010/3325",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/3325"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0161",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0161"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0178",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0178"
},
{
"url": "https://bugs.freedesktop.org/show_bug.cgi?id=32321",
"refsource": "MISC",
"name": "https://bugs.freedesktop.org/show_bug.cgi?id=32321"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=663673",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=663673"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4523",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,102 +27,126 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://www.h-online.com/open/news/item/When-a-smart-card-can-root-your-computer-1154829.html",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html",
"refsource": "MISC",
"url": "http://www.h-online.com/open/news/item/When-a-smart-card-can-root-your-computer-1154829.html"
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name": "43068",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43068"
},
{
"name": "ADV-2011-0212",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0212"
},
{
"name": "[oss-security] 20101222 Re: CVE request: opensc buffer overflow",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/22/3"
},
{
"name": "https://www.opensc-project.org/opensc/changeset/4913",
"refsource": "CONFIRM",
"url": "https://www.opensc-project.org/opensc/changeset/4913"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607427",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607427"
},
{
"name": "MDVSA-2011:011",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:011"
},
{
"name": "FEDORA-2010-19193",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052777.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=664831",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=664831"
},
{
"name": "42807",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42807"
},
{
"name": "http://labs.mwrinfosecurity.com/files/Advisories/mwri_opensc-get-serial-buffer-overflow_2010-12-13.pdf",
"url": "http://secunia.com/advisories/43068",
"refsource": "MISC",
"url": "http://labs.mwrinfosecurity.com/files/Advisories/mwri_opensc-get-serial-buffer-overflow_2010-12-13.pdf"
"name": "http://secunia.com/advisories/43068"
},
{
"name": "SUSE-SR:2011:002",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
"url": "http://www.vupen.com/english/advisories/2011/0212",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0212"
},
{
"name": "ADV-2011-0109",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0109"
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607427",
"refsource": "MISC",
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607427"
},
{
"name": "42658",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42658"
"url": "http://labs.mwrinfosecurity.com/files/Advisories/mwri_opensc-get-serial-buffer-overflow_2010-12-13.pdf",
"refsource": "MISC",
"name": "http://labs.mwrinfosecurity.com/files/Advisories/mwri_opensc-get-serial-buffer-overflow_2010-12-13.pdf"
},
{
"name": "ADV-2011-0009",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0009"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052777.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052777.html"
},
{
"name": "https://bugs.launchpad.net/ubuntu/+source/opensc/+bug/692483",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/ubuntu/+source/opensc/+bug/692483"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052796.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052796.html"
},
{
"name": "FEDORA-2010-19192",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052796.html"
"url": "http://openwall.com/lists/oss-security/2010/12/21/2",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/21/2"
},
{
"name": "[oss-security] 20101221 CVE request: opensc buffer overflow",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/21/2"
"url": "http://openwall.com/lists/oss-security/2010/12/22/3",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/22/3"
},
{
"name": "45435",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45435"
"url": "http://secunia.com/advisories/42658",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42658"
},
{
"url": "http://secunia.com/advisories/42807",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42807"
},
{
"url": "http://www.h-online.com/open/news/item/When-a-smart-card-can-root-your-computer-1154829.html",
"refsource": "MISC",
"name": "http://www.h-online.com/open/news/item/When-a-smart-card-can-root-your-computer-1154829.html"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:011",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:011"
},
{
"url": "http://www.securityfocus.com/bid/45435",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45435"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0009",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0009"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0109",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0109"
},
{
"url": "https://bugs.launchpad.net/ubuntu/+source/opensc/+bug/692483",
"refsource": "MISC",
"name": "https://bugs.launchpad.net/ubuntu/+source/opensc/+bug/692483"
},
{
"url": "https://www.opensc-project.org/opensc/changeset/4913",
"refsource": "MISC",
"name": "https://www.opensc-project.org/opensc/changeset/4913"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=664831",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=664831"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4524",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,72 +27,96 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=664718",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=664718"
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607693",
"refsource": "MISC",
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607693"
},
{
"name": "[oss-security] 20101221 Re: CVE Request -- MHonArc: Improper escaping of certain HTML sequences (XSS)",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/22/4"
"url": "http://lists.mandriva.com/security-announce/2011-01/msg00004.php",
"refsource": "MISC",
"name": "http://lists.mandriva.com/security-announce/2011-01/msg00004.php"
},
{
"name": "[oss-security] 20101221 Re: CVE Request -- MHonArc: Improper escaping of certain HTML sequences (XSS)",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/22/5"
"url": "http://openwall.com/lists/oss-security/2010/12/21/4",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/21/4"
},
{
"name": "ADV-2010-3344",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3344"
"url": "http://openwall.com/lists/oss-security/2010/12/21/7",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/21/7"
},
{
"name": "ADV-2011-0067",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0067"
"url": "http://openwall.com/lists/oss-security/2010/12/22/4",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/22/4"
},
{
"name": "45528",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45528"
"url": "http://openwall.com/lists/oss-security/2010/12/22/5",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/22/5"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607693",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607693"
"url": "http://savannah.nongnu.org/bugs/?32013",
"refsource": "MISC",
"name": "http://savannah.nongnu.org/bugs/?32013"
},
{
"name": "42694",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42694"
"url": "http://secunia.com/advisories/42694",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42694"
},
{
"name": "http://savannah.nongnu.org/bugs/?32013",
"refsource": "CONFIRM",
"url": "http://savannah.nongnu.org/bugs/?32013"
"url": "http://www.mail-archive.com/mhonarc-dev%40mhonarc.org/msg01296.html",
"refsource": "MISC",
"name": "http://www.mail-archive.com/mhonarc-dev%40mhonarc.org/msg01296.html"
},
{
"name": "[oss-security] 20101221 Re: CVE Request -- MHonArc: Improper escaping of certain HTML sequences (XSS)",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/21/7"
"url": "http://www.securityfocus.com/bid/45528",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45528"
},
{
"name": "MDVSA-2011:003",
"refsource": "MANDRIVA",
"url": "http://lists.mandriva.com/security-announce/2011-01/msg00004.php"
"url": "http://www.vupen.com/english/advisories/2010/3344",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/3344"
},
{
"name": "[mhonarc-dev] 20101230 [bug #32013] CVE-2010-4524: Improper escaping of certain HTML sequences (XSS)",
"refsource": "MLIST",
"url": "http://www.mail-archive.com/mhonarc-dev@mhonarc.org/msg01296.html"
"url": "http://www.vupen.com/english/advisories/2011/0067",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0067"
},
{
"name": "[oss-security] 20101221 CVE Request -- MHonArc: Improper escaping of certain HTML sequences (XSS)",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/21/4"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=664718",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=664718"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4525",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,62 +27,86 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "kernel-kvmvcpueventsinterrupt-info-disc(64519)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64519"
},
{
"name": "[oss-security] 20110105 Re: CVE-2010-4525 kvm: x86: zero kvm_vcpu_events->interrupt.pad infoleak",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/01/05/9"
},
{
"name": "RHSA-2011:0007",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html"
},
{
"name": "70377",
"refsource": "OSVDB",
"url": "http://osvdb.org/70377"
},
{
"name": "RHSA-2011:0028",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0028.html"
},
{
"name": "45676",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45676"
},
{
"name": "[oss-security] 20110105 CVE-2010-4525 kvm: x86: zero kvm_vcpu_events->interrupt.pad infoleak",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/01/05/1"
},
{
"name": "[oss-security] 20110106 Re: CVE-2010-4525 kvm: x86: zero kvm_vcpu_events->interrupt.pad infoleak",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/01/06/3"
},
{
"name": "42890",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42890"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4525",
"url": "http://secunia.com/advisories/42890",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4525"
"name": "http://secunia.com/advisories/42890"
},
{
"name": "ADV-2011-0123",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0123"
"url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0007.html"
},
{
"url": "http://osvdb.org/70377",
"refsource": "MISC",
"name": "http://osvdb.org/70377"
},
{
"url": "http://www.openwall.com/lists/oss-security/2011/01/05/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/01/05/1"
},
{
"url": "http://www.openwall.com/lists/oss-security/2011/01/05/9",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/01/05/9"
},
{
"url": "http://www.openwall.com/lists/oss-security/2011/01/06/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/01/06/3"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2011-0028.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0028.html"
},
{
"url": "http://www.securityfocus.com/bid/45676",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45676"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0123",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0123"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4525",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4525"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64519",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64519"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4290",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,22 +27,46 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20111113 Re: Fwd: DSA 2338-1 moodle security update",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/11/14/1"
"url": "http://openwall.com/lists/oss-security/2011/11/14/1",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/11/14/1"
},
{
"name": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=5a3010310bff0b3946804a72ca2d6bc166a0028f",
"refsource": "CONFIRM",
"url": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=5a3010310bff0b3946804a72ca2d6bc166a0028f"
"url": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=5a3010310bff0b3946804a72ca2d6bc166a0028f",
"refsource": "MISC",
"name": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=5a3010310bff0b3946804a72ca2d6bc166a0028f"
},
{
"name": "http://moodle.org/mod/forum/discuss.php?d=175592",
"refsource": "CONFIRM",
"url": "http://moodle.org/mod/forum/discuss.php?d=175592"
"url": "http://moodle.org/mod/forum/discuss.php?d=175592",
"refsource": "MISC",
"name": "http://moodle.org/mod/forum/discuss.php?d=175592"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4300",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,22 +27,46 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=f6b07c4da54a9db24723beb147e8a19a3d487e00",
"refsource": "CONFIRM",
"url": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=f6b07c4da54a9db24723beb147e8a19a3d487e00"
"url": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=f6b07c4da54a9db24723beb147e8a19a3d487e00",
"refsource": "MISC",
"name": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=f6b07c4da54a9db24723beb147e8a19a3d487e00"
},
{
"name": "http://moodle.org/mod/forum/discuss.php?d=188311",
"refsource": "CONFIRM",
"url": "http://moodle.org/mod/forum/discuss.php?d=188311"
"url": "http://moodle.org/mod/forum/discuss.php?d=188311",
"refsource": "MISC",
"name": "http://moodle.org/mod/forum/discuss.php?d=188311"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=747444",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747444"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747444",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=747444"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4301",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,22 +27,46 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://moodle.org/mod/forum/discuss.php?d=188313",
"refsource": "CONFIRM",
"url": "http://moodle.org/mod/forum/discuss.php?d=188313"
"url": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=f1f70bd4dde6cd1ea4bdb8ab28fa3d36a53b89d8",
"refsource": "MISC",
"name": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=f1f70bd4dde6cd1ea4bdb8ab28fa3d36a53b89d8"
},
{
"name": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=f1f70bd4dde6cd1ea4bdb8ab28fa3d36a53b89d8",
"refsource": "CONFIRM",
"url": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=f1f70bd4dde6cd1ea4bdb8ab28fa3d36a53b89d8"
"url": "http://moodle.org/mod/forum/discuss.php?d=188313",
"refsource": "MISC",
"name": "http://moodle.org/mod/forum/discuss.php?d=188313"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=747444",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747444"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747444",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=747444"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4308",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&s=MDL-28615",
"refsource": "CONFIRM",
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&s=MDL-28615"
"url": "http://www.debian.org/security/2012/dsa-2421",
"refsource": "MISC",
"name": "http://www.debian.org/security/2012/dsa-2421"
},
{
"name": "http://moodle.org/mod/forum/discuss.php?d=188322",
"refsource": "CONFIRM",
"url": "http://moodle.org/mod/forum/discuss.php?d=188322"
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&s=MDL-28615",
"refsource": "MISC",
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&s=MDL-28615"
},
{
"name": "DSA-2421",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2421"
"url": "http://moodle.org/mod/forum/discuss.php?d=188322",
"refsource": "MISC",
"name": "http://moodle.org/mod/forum/discuss.php?d=188322"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=747444",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747444"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747444",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=747444"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4309",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,22 +27,46 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://moodle.org/mod/forum/discuss.php?d=188323",
"refsource": "CONFIRM",
"url": "http://moodle.org/mod/forum/discuss.php?d=188323"
"url": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=5eb1cec34f013fdcb559b66bc401f2845ce0bbb7",
"refsource": "MISC",
"name": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=5eb1cec34f013fdcb559b66bc401f2845ce0bbb7"
},
{
"name": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=5eb1cec34f013fdcb559b66bc401f2845ce0bbb7",
"refsource": "CONFIRM",
"url": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=5eb1cec34f013fdcb559b66bc401f2845ce0bbb7"
"url": "http://moodle.org/mod/forum/discuss.php?d=188323",
"refsource": "MISC",
"name": "http://moodle.org/mod/forum/discuss.php?d=188323"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=747444",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747444"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747444",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=747444"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4318",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,52 +27,76 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "46886",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46886"
},
{
"name": "RHSA-2013:0520",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0520.html"
},
{
"name": "https://bugs.gentoo.org/show_bug.cgi?id=390887",
"url": "http://hg.dovecot.org/dovecot-2.0/rev/5e9eaf63a6b1",
"refsource": "MISC",
"url": "https://bugs.gentoo.org/show_bug.cgi?id=390887"
"name": "http://hg.dovecot.org/dovecot-2.0/rev/5e9eaf63a6b1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=754980",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0520.html",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=754980"
"name": "http://rhn.redhat.com/errata/RHSA-2013-0520.html"
},
{
"name": "52311",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52311"
"url": "http://secunia.com/advisories/46886",
"refsource": "MISC",
"name": "http://secunia.com/advisories/46886"
},
{
"name": "http://hg.dovecot.org/dovecot-2.0/rev/5e9eaf63a6b1",
"refsource": "CONFIRM",
"url": "http://hg.dovecot.org/dovecot-2.0/rev/5e9eaf63a6b1"
"url": "http://secunia.com/advisories/52311",
"refsource": "MISC",
"name": "http://secunia.com/advisories/52311"
},
{
"name": "[dovecot-news] 20111117 v2.0.16 released",
"refsource": "MLIST",
"url": "http://www.dovecot.org/list/dovecot-news/2011-November/000200.html"
"url": "http://www.dovecot.org/list/dovecot-news/2011-November/000200.html",
"refsource": "MISC",
"name": "http://www.dovecot.org/list/dovecot-news/2011-November/000200.html"
},
{
"name": "[oss-security] 20111118 Re: CVE Request -- Dovecot -- Validate certificate's CN against requested remote server hostname when proxying",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/11/18/7"
"url": "http://www.openwall.com/lists/oss-security/2011/11/18/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/11/18/5"
},
{
"name": "[oss-security] 20111118 Re: CVE Request -- Dovecot -- Validate certificate's CN against requested remote server hostname when proxying",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/11/18/5"
"url": "http://www.openwall.com/lists/oss-security/2011/11/18/7",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/11/18/7"
},
{
"url": "https://bugs.gentoo.org/show_bug.cgi?id=390887",
"refsource": "MISC",
"name": "https://bugs.gentoo.org/show_bug.cgi?id=390887"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=754980",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=754980"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4320",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,37 +27,61 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "46915",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46915"
"url": "http://secunia.com/advisories/46915",
"refsource": "MISC",
"name": "http://secunia.com/advisories/46915"
},
{
"name": "[oss-security] 20111119 CVE request: ejabberd before 2.1.9",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/11/19/1"
"url": "http://www.openwall.com/lists/oss-security/2011/11/19/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/11/19/1"
},
{
"name": "77302",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/77302"
"url": "http://www.openwall.com/lists/oss-security/2011/11/19/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/11/19/2"
},
{
"name": "https://support.process-one.net/browse/EJAB-1498",
"refsource": "CONFIRM",
"url": "https://support.process-one.net/browse/EJAB-1498"
"url": "http://www.osvdb.org/77302",
"refsource": "MISC",
"name": "http://www.osvdb.org/77302"
},
{
"name": "[oss-security] 20111119 Re: CVE request: ejabberd before 2.1.9",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/11/19/2"
"url": "http://www.process-one.net/en/ejabberd/release_notes/release_note_ejabberd_2.1.9",
"refsource": "MISC",
"name": "http://www.process-one.net/en/ejabberd/release_notes/release_note_ejabberd_2.1.9"
},
{
"name": "http://www.process-one.net/en/ejabberd/release_notes/release_note_ejabberd_2.1.9",
"refsource": "CONFIRM",
"url": "http://www.process-one.net/en/ejabberd/release_notes/release_note_ejabberd_2.1.9"
"url": "https://support.process-one.net/browse/EJAB-1498",
"refsource": "MISC",
"name": "https://support.process-one.net/browse/EJAB-1498"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4328",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,67 +27,91 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20111121 Re: CVE Request (minor) -- gnash -- Unsafe management of HTTP cookies",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/11/21/12"
},
{
"name": "openSUSE-SU-2012:0330",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2012-03/msg00003.html"
},
{
"name": "http://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55",
"refsource": "CONFIRM",
"url": "http://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55"
},
{
"name": "[oss-security] 20111121 CVE Request (minor) -- gnash -- Unsafe management of HTTP cookies",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/11/21/7"
},
{
"name": "48325",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48325"
},
{
"name": "50747",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/50747"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649384",
"url": "http://secunia.com/advisories/48466",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649384"
"name": "http://secunia.com/advisories/48466"
},
{
"name": "openSUSE-SU-2012:0369",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2012-03/msg00026.html"
},
{
"name": "DSA-2435",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2435"
},
{
"name": "77243",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/77243"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=755518",
"url": "http://www.debian.org/security/2012/dsa-2435",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=755518"
"name": "http://www.debian.org/security/2012/dsa-2435"
},
{
"name": "48466",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48466"
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649384",
"refsource": "MISC",
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649384"
},
{
"url": "http://git.savannah.gnu.org/gitweb/?p=gnash.git%3Ba=commitdiff%3Bh=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55",
"refsource": "MISC",
"name": "http://git.savannah.gnu.org/gitweb/?p=gnash.git%3Ba=commitdiff%3Bh=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55"
},
{
"url": "http://lists.opensuse.org/opensuse-updates/2012-03/msg00003.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2012-03/msg00003.html"
},
{
"url": "http://lists.opensuse.org/opensuse-updates/2012-03/msg00026.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2012-03/msg00026.html"
},
{
"url": "http://secunia.com/advisories/48325",
"refsource": "MISC",
"name": "http://secunia.com/advisories/48325"
},
{
"url": "http://www.openwall.com/lists/oss-security/2011/11/21/12",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/11/21/12"
},
{
"url": "http://www.openwall.com/lists/oss-security/2011/11/21/7",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/11/21/7"
},
{
"url": "http://www.osvdb.org/77243",
"refsource": "MISC",
"name": "http://www.osvdb.org/77243"
},
{
"url": "http://www.securityfocus.com/bid/50747",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/50747"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=755518",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=755518"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4330",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,37 +27,61 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20111121 Re: kernel: hfs: add sanity check for file name length",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/11/21/14"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=bc5b8a9003132ae44559edd63a1623",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=bc5b8a9003132ae44559edd63a1623"
},
{
"name": "50750",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/50750"
"url": "http://www.openwall.com/lists/oss-security/2011/11/21/14",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/11/21/14"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=755431",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=755431"
"url": "http://www.openwall.com/lists/oss-security/2011/11/21/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/11/21/5"
},
{
"name": "[oss-security] 20111121 kernel: hfs: add sanity check for file name length",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/11/21/5"
"url": "http://www.securityfocus.com/bid/50750",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/50750"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=bc5b8a9003132ae44559edd63a1623",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=bc5b8a9003132ae44559edd63a1623"
"url": "https://lkml.org/lkml/2011/11/9/303",
"refsource": "MISC",
"name": "https://lkml.org/lkml/2011/11/9/303"
},
{
"name": "[linux-kernel] 20111109 [BUG][SECURITY] Kernel stack overflow in hfs_mac2asc()",
"refsource": "MLIST",
"url": "https://lkml.org/lkml/2011/11/9/303"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=755431",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=755431"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4339",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,82 +27,106 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
"url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf",
"refsource": "MISC",
"name": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
},
{
"name": "MDVSA-2011:196",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:196"
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "MISC",
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"name": "47228",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/47228"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071575.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071575.html"
},
{
"name": "47376",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/47376"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071580.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071580.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=742837",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=742837"
"url": "http://openwall.com/lists/oss-security/2011/12/13/1",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/12/13/1"
},
{
"name": "impitool-pid-dos(71763)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71763"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0123.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0123.html"
},
{
"name": "51036",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/51036"
"url": "http://secunia.com/advisories/47173",
"refsource": "MISC",
"name": "http://secunia.com/advisories/47173"
},
{
"name": "DSA-2376",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2376"
"url": "http://secunia.com/advisories/47228",
"refsource": "MISC",
"name": "http://secunia.com/advisories/47228"
},
{
"name": "RHSA-2011:1814",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1814.html"
"url": "http://secunia.com/advisories/47376",
"refsource": "MISC",
"name": "http://secunia.com/advisories/47376"
},
{
"name": "FEDORA-2011-17071",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071575.html"
"url": "http://www.debian.org/security/2011/dsa-2376",
"refsource": "MISC",
"name": "http://www.debian.org/security/2011/dsa-2376"
},
{
"name": "[oss-security] 20111213 OpenIPMI: IPMI event daemon creates PID file with world writeable permissions",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/12/13/1"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:196",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:196"
},
{
"name": "47173",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/47173"
"url": "http://www.redhat.com/support/errata/RHSA-2011-1814.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-1814.html"
},
{
"name": "FEDORA-2011-17065",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071580.html"
"url": "http://www.securityfocus.com/bid/51036",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/51036"
},
{
"name": "RHSA-2013:0123",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0123.html"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71763",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71763"
},
{
"name": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf",
"refsource": "CONFIRM",
"url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=742837",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=742837"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3408",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,22 +27,46 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=839166",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=839166"
"url": "http://puppetlabs.com/security/cve/cve-2012-3408/",
"refsource": "MISC",
"name": "http://puppetlabs.com/security/cve/cve-2012-3408/"
},
{
"name": "http://puppetlabs.com/security/cve/cve-2012-3408/",
"refsource": "CONFIRM",
"url": "http://puppetlabs.com/security/cve/cve-2012-3408/"
"url": "https://github.com/puppetlabs/puppet/commit/ab9150baa1b738467a33b01df1d90e076253fbbd",
"refsource": "MISC",
"name": "https://github.com/puppetlabs/puppet/commit/ab9150baa1b738467a33b01df1d90e076253fbbd"
},
{
"name": "https://github.com/puppetlabs/puppet/commit/ab9150baa1b738467a33b01df1d90e076253fbbd",
"refsource": "CONFIRM",
"url": "https://github.com/puppetlabs/puppet/commit/ab9150baa1b738467a33b01df1d90e076253fbbd"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=839166",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=839166"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3410",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,62 +27,86 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20120712 Re: CVE Request: Overflow fix in bash 4.2 patch 33",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/07/11/22"
},
{
"name": "MDVSA-2012:128",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:128"
},
{
"name": "bash-devfd-bo(77551)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77551"
},
{
"name": "openSUSE-SU-2012:0898",
"refsource": "SUSE",
"url": "https://hermes.opensuse.org/messages/15227834"
},
{
"name": "51086",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51086"
},
{
"name": "[oss-security] 20120711 CVE Request: Overflow fix in bash 4.2 patch 33",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/07/11/11"
},
{
"name": "54937",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/54937"
},
{
"name": "GLSA-201210-05",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201210-05.xml"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681278",
"url": "ftp://ftp.gnu.org/pub/gnu/bash/bash-4.2-patches/bash42-033",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681278"
"name": "ftp://ftp.gnu.org/pub/gnu/bash/bash-4.2-patches/bash42-033"
},
{
"name": "ftp://ftp.gnu.org/pub/gnu/bash/bash-4.2-patches/bash42-033",
"refsource": "CONFIRM",
"url": "ftp://ftp.gnu.org/pub/gnu/bash/bash-4.2-patches/bash42-033"
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681278",
"refsource": "MISC",
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681278"
},
{
"name": "[oss-security] 20120712 Re: CVE Request: Overflow fix in bash 4.2 patch 33",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/07/12/4"
"url": "http://secunia.com/advisories/51086",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51086"
},
{
"url": "http://security.gentoo.org/glsa/glsa-201210-05.xml",
"refsource": "MISC",
"name": "http://security.gentoo.org/glsa/glsa-201210-05.xml"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:128",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:128"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/07/11/11",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/07/11/11"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/07/11/22",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/07/11/22"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/07/12/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/07/12/4"
},
{
"url": "http://www.securityfocus.com/bid/54937",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/54937"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77551",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77551"
},
{
"url": "https://hermes.opensuse.org/messages/15227834",
"refsource": "MISC",
"name": "https://hermes.opensuse.org/messages/15227834"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2012-3416 condor: host based authentication does not implement forward-confirmed reverse dns"
"value": "Condor before 7.8.2 allows remote attackers to bypass host-based authentication and execute actions such as ALLOW_ADMINISTRATOR or ALLOW_WRITE by connecting from a system with a spoofed reverse DNS hostname."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Improper Access Control",
"cweId": "CWE-284"
"value": "n/a"
}
]
}
@ -32,27 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "MRG for RHEL-5 v. 2",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:7.6.5-0.14.2.el5",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise MRG 2",
"version": {
"version_data": [
{
"version_value": "0:7.6.5-0.14.2.el6_3",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -105,56 +93,11 @@
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1027395"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:1168",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:1168"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:1169",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:1169"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2012-3416",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2012-3416"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=841175",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=841175"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77748",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77748"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 7.5,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3417",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,47 +27,71 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "openSUSE-SU-2012:1058",
"refsource": "SUSE",
"url": "https://hermes.opensuse.org/messages/15509723"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=566717",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=566717"
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
},
{
"name": "[oss-security] 20120719 CVE Request: quota: incorrect use of tcp_wrappers",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/07/19/2"
"url": "http://www.openwall.com/lists/oss-security/2012/07/19/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/07/19/2"
},
{
"name": "RHSA-2013:0120",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0120.html"
"url": "http://www.openwall.com/lists/oss-security/2012/07/19/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/07/19/5"
},
{
"name": "[oss-security] 20120719 Re: CVE Request: quota: incorrect use of tcp_wrappers",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/07/19/5"
"url": "http://linuxquota.git.sourceforge.net/git/gitweb.cgi?p=linuxquota/linuxquota%3Ba=commitdiff%3Bh=0abbfe92536fa5854eb65572de0cf131f80e2387",
"refsource": "MISC",
"name": "http://linuxquota.git.sourceforge.net/git/gitweb.cgi?p=linuxquota/linuxquota%3Ba=commitdiff%3Bh=0abbfe92536fa5854eb65572de0cf131f80e2387"
},
{
"name": "http://linuxquota.git.sourceforge.net/git/gitweb.cgi?p=linuxquota/linuxquota;a=commitdiff;h=0abbfe92536fa5854eb65572de0cf131f80e2387",
"refsource": "CONFIRM",
"url": "http://linuxquota.git.sourceforge.net/git/gitweb.cgi?p=linuxquota/linuxquota;a=commitdiff;h=0abbfe92536fa5854eb65572de0cf131f80e2387"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0120.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0120.html"
},
{
"name": "http://sourceforge.net/tracker/?func=detail&aid=2743481&group_id=18136&atid=118136",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/tracker/?func=detail&aid=2743481&group_id=18136&atid=118136"
"url": "http://sourceforge.net/tracker/?func=detail&aid=2743481&group_id=18136&atid=118136",
"refsource": "MISC",
"name": "http://sourceforge.net/tracker/?func=detail&aid=2743481&group_id=18136&atid=118136"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
"url": "https://hermes.opensuse.org/messages/15509723",
"refsource": "MISC",
"name": "https://hermes.opensuse.org/messages/15509723"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=566717",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=566717"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3426",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,77 +27,101 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://github.com/openstack/keystone/commit/d9600434da14976463a0bd03abd8e0309f0db454",
"refsource": "CONFIRM",
"url": "http://github.com/openstack/keystone/commit/d9600434da14976463a0bd03abd8e0309f0db454"
"url": "http://github.com/openstack/keystone/commit/29e74e73a6e51cffc0371b32354558391826a4aa",
"refsource": "MISC",
"name": "http://github.com/openstack/keystone/commit/29e74e73a6e51cffc0371b32354558391826a4aa"
},
{
"name": "http://github.com/openstack/keystone/commit/29e74e73a6e51cffc0371b32354558391826a4aa",
"refsource": "CONFIRM",
"url": "http://github.com/openstack/keystone/commit/29e74e73a6e51cffc0371b32354558391826a4aa"
"url": "http://github.com/openstack/keystone/commit/375838cfceb88cacc312ff6564e64eb18ee6a355",
"refsource": "MISC",
"name": "http://github.com/openstack/keystone/commit/375838cfceb88cacc312ff6564e64eb18ee6a355"
},
{
"name": "https://bugs.launchpad.net/keystone/+bug/998185",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/keystone/+bug/998185"
"url": "http://github.com/openstack/keystone/commit/628149b3dc6b58b91fd08e6ca8d91c728ccb8626",
"refsource": "MISC",
"name": "http://github.com/openstack/keystone/commit/628149b3dc6b58b91fd08e6ca8d91c728ccb8626"
},
{
"name": "https://bugs.launchpad.net/keystone/+bug/997194",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/keystone/+bug/997194"
"url": "http://github.com/openstack/keystone/commit/a67b24878a6156eab17b9098fa649f0279256f5d",
"refsource": "MISC",
"name": "http://github.com/openstack/keystone/commit/a67b24878a6156eab17b9098fa649f0279256f5d"
},
{
"name": "https://launchpad.net/keystone/essex/2012.1.1/+download/keystone-2012.1.1.tar.gz",
"refsource": "CONFIRM",
"url": "https://launchpad.net/keystone/essex/2012.1.1/+download/keystone-2012.1.1.tar.gz"
"url": "http://github.com/openstack/keystone/commit/d9600434da14976463a0bd03abd8e0309f0db454",
"refsource": "MISC",
"name": "http://github.com/openstack/keystone/commit/d9600434da14976463a0bd03abd8e0309f0db454"
},
{
"name": "50494",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50494"
"url": "http://github.com/openstack/keystone/commit/ea03d05ed5de0c015042876100d37a6a14bf56de",
"refsource": "MISC",
"name": "http://github.com/openstack/keystone/commit/ea03d05ed5de0c015042876100d37a6a14bf56de"
},
{
"name": "http://github.com/openstack/keystone/commit/ea03d05ed5de0c015042876100d37a6a14bf56de",
"refsource": "CONFIRM",
"url": "http://github.com/openstack/keystone/commit/ea03d05ed5de0c015042876100d37a6a14bf56de"
"url": "http://secunia.com/advisories/50045",
"refsource": "MISC",
"name": "http://secunia.com/advisories/50045"
},
{
"name": "https://bugs.launchpad.net/keystone/+bug/996595",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/keystone/+bug/996595"
"url": "http://secunia.com/advisories/50494",
"refsource": "MISC",
"name": "http://secunia.com/advisories/50494"
},
{
"name": "[oss-security] 20120727 [OSSA 2012-010] Various Keystone token expiration issues (CVE-2012-3426)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/07/27/4"
"url": "http://www.openwall.com/lists/oss-security/2012/07/27/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/07/27/4"
},
{
"name": "http://github.com/openstack/keystone/commit/628149b3dc6b58b91fd08e6ca8d91c728ccb8626",
"refsource": "CONFIRM",
"url": "http://github.com/openstack/keystone/commit/628149b3dc6b58b91fd08e6ca8d91c728ccb8626"
"url": "http://www.ubuntu.com/usn/USN-1552-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1552-1"
},
{
"name": "USN-1552-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1552-1"
"url": "https://bugs.launchpad.net/keystone/+bug/996595",
"refsource": "MISC",
"name": "https://bugs.launchpad.net/keystone/+bug/996595"
},
{
"name": "http://github.com/openstack/keystone/commit/375838cfceb88cacc312ff6564e64eb18ee6a355",
"refsource": "CONFIRM",
"url": "http://github.com/openstack/keystone/commit/375838cfceb88cacc312ff6564e64eb18ee6a355"
"url": "https://bugs.launchpad.net/keystone/+bug/997194",
"refsource": "MISC",
"name": "https://bugs.launchpad.net/keystone/+bug/997194"
},
{
"name": "http://github.com/openstack/keystone/commit/a67b24878a6156eab17b9098fa649f0279256f5d",
"refsource": "CONFIRM",
"url": "http://github.com/openstack/keystone/commit/a67b24878a6156eab17b9098fa649f0279256f5d"
"url": "https://bugs.launchpad.net/keystone/+bug/998185",
"refsource": "MISC",
"name": "https://bugs.launchpad.net/keystone/+bug/998185"
},
{
"name": "50045",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50045"
"url": "https://launchpad.net/keystone/essex/2012.1.1/+download/keystone-2012.1.1.tar.gz",
"refsource": "MISC",
"name": "https://launchpad.net/keystone/essex/2012.1.1/+download/keystone-2012.1.1.tar.gz"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3427",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,32 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2012:1376",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1376.html"
"url": "http://rhn.redhat.com/errata/RHSA-2012-1376.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-1376.html"
},
{
"name": "55945",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/55945"
"url": "http://secunia.com/advisories/51016",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51016"
},
{
"name": "51016",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51016"
"url": "http://www.osvdb.org/86409",
"refsource": "MISC",
"name": "http://www.osvdb.org/86409"
},
{
"name": "jbosseap-info-disc(79398)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79398"
"url": "http://www.securityfocus.com/bid/55945",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/55945"
},
{
"name": "86409",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/86409"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79398",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79398"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3428",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,47 +27,71 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://issues.jboss.org/browse/JBPAPP-9584",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1591.html",
"refsource": "MISC",
"url": "https://issues.jboss.org/browse/JBPAPP-9584"
"name": "http://rhn.redhat.com/errata/RHSA-2012-1591.html"
},
{
"name": "RHSA-2012:1594",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1594.html"
"url": "http://rhn.redhat.com/errata/RHSA-2012-1592.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-1592.html"
},
{
"name": "https://issues.jboss.org/browse/JBJCA-864",
"refsource": "CONFIRM",
"url": "https://issues.jboss.org/browse/JBJCA-864"
"url": "http://rhn.redhat.com/errata/RHSA-2012-1594.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-1594.html"
},
{
"name": "51607",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51607"
"url": "http://secunia.com/advisories/51607",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51607"
},
{
"name": "https://issues.jboss.org/secure/ReleaseNote.jspa?projectId=12310691&version=12319522",
"refsource": "CONFIRM",
"url": "https://issues.jboss.org/secure/ReleaseNote.jspa?projectId=12310691&version=12319522"
"url": "https://issues.jboss.org/browse/JBJCA-864",
"refsource": "MISC",
"name": "https://issues.jboss.org/browse/JBJCA-864"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=843358",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=843358"
"url": "https://issues.jboss.org/browse/JBPAPP-9584",
"refsource": "MISC",
"name": "https://issues.jboss.org/browse/JBPAPP-9584"
},
{
"name": "RHSA-2012:1592",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1592.html"
"url": "https://issues.jboss.org/secure/ReleaseNote.jspa?projectId=12310691&version=12319522",
"refsource": "MISC",
"name": "https://issues.jboss.org/secure/ReleaseNote.jspa?projectId=12310691&version=12319522"
},
{
"name": "RHSA-2012:1591",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1591.html"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=843358",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=843358"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3430",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,97 +27,121 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "USN-1572-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1572-1"
"url": "http://secunia.com/advisories/50633",
"refsource": "MISC",
"name": "http://secunia.com/advisories/50633"
},
{
"name": "USN-1579-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1579-1"
"url": "http://www.ubuntu.com/usn/USN-1567-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1567-1"
},
{
"name": "USN-1578-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1578-1"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=06b6a1cf6e776426766298d055bb3991957d90a7",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=06b6a1cf6e776426766298d055bb3991957d90a7"
},
{
"name": "50732",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50732"
"url": "http://rhn.redhat.com/errata/RHSA-2012-1323.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-1323.html"
},
{
"name": "50811",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50811"
"url": "http://secunia.com/advisories/50732",
"refsource": "MISC",
"name": "http://secunia.com/advisories/50732"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.0.44",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.0.44"
"url": "http://secunia.com/advisories/50811",
"refsource": "MISC",
"name": "http://secunia.com/advisories/50811"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=06b6a1cf6e776426766298d055bb3991957d90a7",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=06b6a1cf6e776426766298d055bb3991957d90a7"
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.0.44",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.0.44"
},
{
"name": "USN-1567-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1567-1"
"url": "http://www.openwall.com/lists/oss-security/2012/07/26/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/07/26/5"
},
{
"name": "RHSA-2012:1323",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1323.html"
"url": "http://www.ubuntu.com/usn/USN-1568-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1568-1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=820039",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=820039"
"url": "http://www.ubuntu.com/usn/USN-1572-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1572-1"
},
{
"name": "USN-1577-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1577-1"
"url": "http://www.ubuntu.com/usn/USN-1575-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1575-1"
},
{
"name": "SUSE-SU-2012:1679",
"refsource": "SUSE",
"url": "https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html"
"url": "http://www.ubuntu.com/usn/USN-1577-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1577-1"
},
{
"name": "USN-1568-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1568-1"
"url": "http://www.ubuntu.com/usn/USN-1578-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1578-1"
},
{
"name": "USN-1575-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1575-1"
"url": "http://www.ubuntu.com/usn/USN-1579-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1579-1"
},
{
"name": "https://github.com/torvalds/linux/commit/06b6a1cf6e776426766298d055bb3991957d90a7",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/06b6a1cf6e776426766298d055bb3991957d90a7"
"url": "http://www.ubuntu.com/usn/USN-1580-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1580-1"
},
{
"name": "50633",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50633"
"url": "https://github.com/torvalds/linux/commit/06b6a1cf6e776426766298d055bb3991957d90a7",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/06b6a1cf6e776426766298d055bb3991957d90a7"
},
{
"name": "USN-1580-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1580-1"
"url": "https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html",
"refsource": "MISC",
"name": "https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html"
},
{
"name": "[oss-security] 20120726 Re: CVE Request -- kernel: recv{from,msg}() on an rds socket can leak kernel memory",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/07/26/5"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=820039",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=820039"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3435",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,62 +27,86 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "20087",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/20087"
"url": "http://git.zabbixzone.com/zabbix2.0/.git/commitdiff/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54",
"refsource": "MISC",
"name": "http://git.zabbixzone.com/zabbix2.0/.git/commitdiff/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54"
},
{
"name": "50475",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50475"
"url": "http://osvdb.org/84127",
"refsource": "MISC",
"name": "http://osvdb.org/84127"
},
{
"name": "http://git.zabbixzone.com/zabbix2.0/.git/commitdiff/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54",
"refsource": "CONFIRM",
"url": "http://git.zabbixzone.com/zabbix2.0/.git/commitdiff/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54"
"url": "http://secunia.com/advisories/49809",
"refsource": "MISC",
"name": "http://secunia.com/advisories/49809"
},
{
"name": "DSA-2539",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2539"
"url": "http://secunia.com/advisories/50475",
"refsource": "MISC",
"name": "http://secunia.com/advisories/50475"
},
{
"name": "https://support.zabbix.com/browse/ZBX-5348",
"refsource": "CONFIRM",
"url": "https://support.zabbix.com/browse/ZBX-5348"
"url": "http://www.debian.org/security/2012/dsa-2539",
"refsource": "MISC",
"name": "http://www.debian.org/security/2012/dsa-2539"
},
{
"name": "49809",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49809"
"url": "http://www.exploit-db.com/exploits/20087",
"refsource": "MISC",
"name": "http://www.exploit-db.com/exploits/20087"
},
{
"name": "[oss-security] 20120727 Zabbix SQL injection flaw (CVE request)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/07/27/6"
"url": "http://www.openwall.com/lists/oss-security/2012/07/27/6",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/07/27/6"
},
{
"name": "54661",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/54661"
"url": "http://www.openwall.com/lists/oss-security/2012/07/28/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/07/28/3"
},
{
"name": "84127",
"refsource": "OSVDB",
"url": "http://osvdb.org/84127"
"url": "http://www.securityfocus.com/bid/54661",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/54661"
},
{
"name": "[oss-security] 20120728 Re: Zabbix SQL injection flaw (CVE request)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/07/28/3"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77195",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77195"
},
{
"name": "zabbix-popupbitem-sql-injection(77195)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77195"
"url": "https://support.zabbix.com/browse/ZBX-5348",
"refsource": "MISC",
"name": "https://support.zabbix.com/browse/ZBX-5348"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3436",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,62 +27,86 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "50042",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50042"
"url": "http://bugs.openttd.org/task/5254",
"refsource": "MISC",
"name": "http://bugs.openttd.org/task/5254"
},
{
"name": "http://security.openttd.org/en/CVE-2012-3436",
"refsource": "CONFIRM",
"url": "http://security.openttd.org/en/CVE-2012-3436"
"url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00043.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00043.html"
},
{
"name": "[oss-security] 20120728 Re: CVE request for OpenTTD",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/07/28/7"
"url": "http://secunia.com/advisories/50042",
"refsource": "MISC",
"name": "http://secunia.com/advisories/50042"
},
{
"name": "openSUSE-SU-2012:1063",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00043.html"
"url": "http://security.openttd.org/en/CVE-2012-3436",
"refsource": "MISC",
"name": "http://security.openttd.org/en/CVE-2012-3436"
},
{
"name": "54720",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/54720"
"url": "http://vcs.openttd.org/svn/changeset/24439",
"refsource": "MISC",
"name": "http://vcs.openttd.org/svn/changeset/24439"
},
{
"name": "[oss-security] 20120731 Re: CVE request for OpenTTD",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/07/31/5"
"url": "http://vcs.openttd.org/svn/changeset/24449",
"refsource": "MISC",
"name": "http://vcs.openttd.org/svn/changeset/24449"
},
{
"name": "openttd-water-dos(77266)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77266"
"url": "http://www.openwall.com/lists/oss-security/2012/07/27/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/07/27/5"
},
{
"name": "http://vcs.openttd.org/svn/changeset/24449",
"refsource": "CONFIRM",
"url": "http://vcs.openttd.org/svn/changeset/24449"
"url": "http://www.openwall.com/lists/oss-security/2012/07/28/7",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/07/28/7"
},
{
"name": "http://bugs.openttd.org/task/5254",
"refsource": "CONFIRM",
"url": "http://bugs.openttd.org/task/5254"
"url": "http://www.openwall.com/lists/oss-security/2012/07/31/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/07/31/5"
},
{
"name": "[oss-security] 20120727 CVE request for OpenTTD",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/07/27/5"
"url": "http://www.securityfocus.com/bid/54720",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/54720"
},
{
"name": "http://vcs.openttd.org/svn/changeset/24439",
"refsource": "CONFIRM",
"url": "http://vcs.openttd.org/svn/changeset/24439"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77266",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77266"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2013-0290 kernel: net: infinite loop in __skb_recv_datagram()"
"value": "The __skb_recv_datagram function in net/core/datagram.c in the Linux kernel before 3.8 does not properly handle the MSG_PEEK flag with zero-length data, which allows local users to cause a denial of service (infinite loop and system hang) via a crafted application."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Loop with Unreachable Exit Condition ('Infinite Loop')",
"cweId": "CWE-835"
"value": "n/a"
}
]
}
@ -32,16 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise MRG 2",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:3.6.11-rt30.25.el6rt",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -59,11 +58,6 @@
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176"
},
{
"url": "https://access.redhat.com/errata/RHSA-2013:0622",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:0622"
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=77c1090f94d1b0b5186fb13a1b71b47b1343f87f",
"refsource": "MISC",
@ -90,44 +84,14 @@
"name": "http://www.openwall.com/lists/oss-security/2013/02/15/2"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2013-0290",
"url": "https://github.com/torvalds/linux/commit/77c1090f94d1b0b5186fb13a1b71b47b1343f87f",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2013-0290"
"name": "https://github.com/torvalds/linux/commit/77c1090f94d1b0b5186fb13a1b71b47b1343f87f"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=911473",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=911473"
},
{
"url": "https://github.com/torvalds/linux/commit/77c1090f94d1b0b5186fb13a1b71b47b1343f87f",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/77c1090f94d1b0b5186fb13a1b71b47b1343f87f"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.9,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0292",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,87 +27,111 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"name": "33614",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/33614"
},
{
"name": "MDVSA-2013:071",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:071"
},
{
"name": "52225",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52225"
},
{
"name": "dbus-message-sender-priv-esc(82135)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82135"
},
{
"name": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=911658",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
"refsource": "MISC",
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=911658"
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
},
{
"name": "52375",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52375"
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "MISC",
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"name": "USN-1753-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1753-1"
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=911658",
"refsource": "MISC",
"name": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=911658"
},
{
"name": "RHSA-2013:0568",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0568.html"
"url": "http://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca",
"refsource": "MISC",
"name": "http://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca"
},
{
"name": "57985",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/57985"
"url": "http://osvdb.org/90302",
"refsource": "MISC",
"name": "http://osvdb.org/90302"
},
{
"name": "52404",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52404"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0568.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0568.html"
},
{
"name": "[oss-security] 20130215 CVE-2013-0292: authentication bypass due to insufficient checks in dbus-glib < 0.100.1",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/02/15/10"
"url": "http://secunia.com/advisories/52225",
"refsource": "MISC",
"name": "http://secunia.com/advisories/52225"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
"url": "http://secunia.com/advisories/52375",
"refsource": "MISC",
"name": "http://secunia.com/advisories/52375"
},
{
"name": "90302",
"refsource": "OSVDB",
"url": "http://osvdb.org/90302"
"url": "http://secunia.com/advisories/52404",
"refsource": "MISC",
"name": "http://secunia.com/advisories/52404"
},
{
"name": "http://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca",
"refsource": "CONFIRM",
"url": "http://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca"
"url": "http://www.exploit-db.com/exploits/33614",
"refsource": "MISC",
"name": "http://www.exploit-db.com/exploits/33614"
},
{
"name": "https://bugs.freedesktop.org/show_bug.cgi?id=60916",
"refsource": "CONFIRM",
"url": "https://bugs.freedesktop.org/show_bug.cgi?id=60916"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:071",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:071"
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/02/15/10",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/02/15/10"
},
{
"url": "http://www.securityfocus.com/bid/57985",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/57985"
},
{
"url": "http://www.ubuntu.com/usn/USN-1753-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1753-1"
},
{
"url": "https://bugs.freedesktop.org/show_bug.cgi?id=60916",
"refsource": "MISC",
"name": "https://bugs.freedesktop.org/show_bug.cgi?id=60916"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82135",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82135"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0293",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "oVirt Node",
"product": {
"product_data": [
{
"product_name": "oVirt Node",
"version": {
"version_data": [
{
"version_value": "2.6.0"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,12 +27,41 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "oVirt Node",
"product": {
"product_data": [
{
"product_name": "oVirt Node",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "2.6.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://security-tracker.debian.org/tracker/CVE-2013-0293",
"url": "http://www.openwall.com/lists/oss-security/2013/02/28/13",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2013-0293"
"name": "http://www.openwall.com/lists/oss-security/2013/02/28/13"
},
{
"url": "http://www.securityfocus.com/bid/58227",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/58227"
},
{
"url": "https://access.redhat.com/security/cve/cve-2013-0293",
@ -63,19 +69,14 @@
"name": "https://access.redhat.com/security/cve/cve-2013-0293"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82474",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/02/28/13",
"url": "http://www.openwall.com/lists/oss-security/2013/02/28/13"
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82474"
},
{
"url": "https://security-tracker.debian.org/tracker/CVE-2013-0293",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/58227",
"url": "http://www.securityfocus.com/bid/58227"
},
{
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82474",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82474"
"name": "https://security-tracker.debian.org/tracker/CVE-2013-0293"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0308",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,92 +27,116 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "1028205",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1028205"
},
{
"name": "RHSA-2013:0589",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0589.html"
},
{
"name": "https://raw.github.com/git/git/master/Documentation/RelNotes/1.8.1.4.txt",
"refsource": "CONFIRM",
"url": "https://raw.github.com/git/git/master/Documentation/RelNotes/1.8.1.4.txt"
},
{
"name": "http://support.apple.com/kb/HT5937",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5937"
},
{
"name": "git-gitimapsend-spoofing(82329)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82329"
},
{
"name": "APPLE-SA-2013-09-18-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00007.html"
},
{
"name": "52361",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52361"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701586",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701586"
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
},
{
"name": "[ANNOUNCE] 20130220 Git v1.8.1.4",
"refsource": "MLIST",
"url": "http://marc.info/?l=git&m=136134619013145&w=2"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
},
{
"name": "openSUSE-SU-2013:0380",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00005.html"
},
{
"name": "58148",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/58148"
},
{
"name": "52443",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52443"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=909977",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701586",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=909977"
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701586"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=804730",
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00007.html",
"refsource": "MISC",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=804730"
"name": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00007.html"
},
{
"name": "openSUSE-SU-2013:0382",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00007.html"
"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00005.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00005.html"
},
{
"name": "52467",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52467"
"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00007.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00007.html"
},
{
"url": "http://marc.info/?l=git&m=136134619013145&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=git&m=136134619013145&w=2"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2013-0589.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0589.html"
},
{
"url": "http://secunia.com/advisories/52361",
"refsource": "MISC",
"name": "http://secunia.com/advisories/52361"
},
{
"url": "http://secunia.com/advisories/52443",
"refsource": "MISC",
"name": "http://secunia.com/advisories/52443"
},
{
"url": "http://secunia.com/advisories/52467",
"refsource": "MISC",
"name": "http://secunia.com/advisories/52467"
},
{
"url": "http://support.apple.com/kb/HT5937",
"refsource": "MISC",
"name": "http://support.apple.com/kb/HT5937"
},
{
"url": "http://www.securityfocus.com/bid/58148",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/58148"
},
{
"url": "http://www.securitytracker.com/id/1028205",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id/1028205"
},
{
"url": "https://bugzilla.novell.com/show_bug.cgi?id=804730",
"refsource": "MISC",
"name": "https://bugzilla.novell.com/show_bug.cgi?id=804730"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82329",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82329"
},
{
"url": "https://raw.github.com/git/git/master/Documentation/RelNotes/1.8.1.4.txt",
"refsource": "MISC",
"name": "https://raw.github.com/git/git/master/Documentation/RelNotes/1.8.1.4.txt"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=909977",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=909977"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0309",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,37 +27,61 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2013:0496",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0496.html"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0496.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0496.html"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=027ef6c87853b0a9df53175063028edb4950d476",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=027ef6c87853b0a9df53175063028edb4950d476"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=027ef6c87853b0a9df53175063028edb4950d476",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=027ef6c87853b0a9df53175063028edb4950d476"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=912898",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=912898"
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.6.2",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.6.2"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.6.2",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.6.2"
"url": "http://www.openwall.com/lists/oss-security/2013/02/20/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/02/20/4"
},
{
"name": "https://github.com/torvalds/linux/commit/027ef6c87853b0a9df53175063028edb4950d476",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/027ef6c87853b0a9df53175063028edb4950d476"
"url": "https://github.com/torvalds/linux/commit/027ef6c87853b0a9df53175063028edb4950d476",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/027ef6c87853b0a9df53175063028edb4950d476"
},
{
"name": "[oss-security] 20130219 Re: CVE request -- Linux kernel: mm: thp: pmd_present and PROT_NONE local DoS",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/02/20/4"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=912898",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=912898"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2013-0310 kernel: net: CIPSO_V4_TAG_LOCAL tag NULL pointer dereference"
"value": "The cipso_v4_validate function in net/ipv4/cipso_ipv4.c in the Linux kernel before 3.4.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via an IPOPT_CIPSO IP_OPTIONS setsockopt system call."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "NULL Pointer Dereference",
"cweId": "CWE-476"
"value": "n/a"
}
]
}
@ -32,16 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 6",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:2.6.32-358.el6",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -59,11 +58,6 @@
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0496.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2013:0496",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:0496"
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=89d7ae34cdda4195809a5a987f697a517a2a3177",
"refsource": "MISC",
@ -80,44 +74,14 @@
"name": "http://www.openwall.com/lists/oss-security/2013/02/20/5"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2013-0310",
"url": "https://github.com/torvalds/linux/commit/89d7ae34cdda4195809a5a987f697a517a2a3177",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2013-0310"
"name": "https://github.com/torvalds/linux/commit/89d7ae34cdda4195809a5a987f697a517a2a3177"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=912900",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=912900"
},
{
"url": "https://github.com/torvalds/linux/commit/89d7ae34cdda4195809a5a987f697a517a2a3177",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/89d7ae34cdda4195809a5a987f697a517a2a3177"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.4,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:M/Au:S/C:N/I:N/A:C",
"version": "2.0"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0311",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,62 +27,86 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2013:0496",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0496.html"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176"
},
{
"name": "openSUSE-SU-2013:1187",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0496.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0496.html"
},
{
"name": "https://github.com/torvalds/linux/commit/bd97120fc3d1a11f3124c7c9ba1d91f51829eb85",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/bd97120fc3d1a11f3124c7c9ba1d91f51829eb85"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bd97120fc3d1a11f3124c7c9ba1d91f51829eb85",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bd97120fc3d1a11f3124c7c9ba1d91f51829eb85"
},
{
"name": "RHSA-2013:0882",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0882.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html"
},
{
"name": "MDVSA-2013:176",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0579.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0579.html"
},
{
"name": "RHSA-2013:0928",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0928.html"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0882.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0882.html"
},
{
"name": "[oss-security] 20130219 Re: CVE request -- Linux kernel: vhost: fix length for cross region descriptor",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/02/20/6"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0928.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0928.html"
},
{
"name": "RHSA-2013:0579",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0579.html"
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/patch-3.7.bz2",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/patch-3.7.bz2"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bd97120fc3d1a11f3124c7c9ba1d91f51829eb85",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bd97120fc3d1a11f3124c7c9ba1d91f51829eb85"
"url": "http://www.openwall.com/lists/oss-security/2013/02/20/6",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/02/20/6"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=912905",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=912905"
"url": "https://github.com/torvalds/linux/commit/bd97120fc3d1a11f3124c7c9ba1d91f51829eb85",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/bd97120fc3d1a11f3124c7c9ba1d91f51829eb85"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/patch-3.7.bz2",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/patch-3.7.bz2"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=912905",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=912905"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0313",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,32 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20130220 Re: CVE request - Linux kernel: evm: NULL pointer de-reference flaw",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/02/20/16"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a67adb997419fb53540d4a4f79c6471c60bc69b6",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a67adb997419fb53540d4a4f79c6471c60bc69b6"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=913266",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=913266"
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.5",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.5"
},
{
"name": "https://github.com/torvalds/linux/commit/a67adb997419fb53540d4a4f79c6471c60bc69b6",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/a67adb997419fb53540d4a4f79c6471c60bc69b6"
"url": "http://www.openwall.com/lists/oss-security/2013/02/20/16",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/02/20/16"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a67adb997419fb53540d4a4f79c6471c60bc69b6",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a67adb997419fb53540d4a4f79c6471c60bc69b6"
"url": "https://github.com/torvalds/linux/commit/a67adb997419fb53540d4a4f79c6471c60bc69b6",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/a67adb997419fb53540d4a4f79c6471c60bc69b6"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.5",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.5"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=913266",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=913266"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0314",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=913327",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0613.html",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=913327"
"name": "http://rhn.redhat.com/errata/RHSA-2013-0613.html"
},
{
"name": "52552",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52552"
"url": "http://secunia.com/advisories/52552",
"refsource": "MISC",
"name": "http://secunia.com/advisories/52552"
},
{
"name": "91120",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/91120"
"url": "http://www.osvdb.org/91120",
"refsource": "MISC",
"name": "http://www.osvdb.org/91120"
},
{
"name": "RHSA-2013:0613",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0613.html"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=913327",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=913327"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2013-0327 jenkins: cross-site request forgery (CSRF) on Jenkins master"
"value": "Cross-site request forgery (CSRF) vulnerability in Jenkins master in Jenkins before 1.502 and LTS before 1.480.3 allows remote attackers to hijack the authentication of users via unknown vectors."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Cross-Site Request Forgery (CSRF)",
"cweId": "CWE-352"
"value": "n/a"
}
]
}
@ -32,28 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "RHEL 6 Version of OpenShift Enterprise",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:1.502-1.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.0.3-1.el6op",
"version_affected": "!"
},
{
"version_value": "1:1.4.1-4.el6",
"version_affected": "!"
},
{
"version_value": "1:1.3.0-4.el6op",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -81,51 +68,16 @@
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/02/21/7"
},
{
"url": "https://access.redhat.com/errata/RHSA-2013:0638",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:0638"
},
{
"url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-02-16",
"refsource": "MISC",
"name": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-02-16"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2013-0327",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2013-0327"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914875",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=914875"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.3,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
}
]
}
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4221",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,37 +27,61 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2013:1862",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1862.html"
},
{
"name": "http://restlet.org/learn/2.1/changes",
"refsource": "CONFIRM",
"url": "http://restlet.org/learn/2.1/changes"
},
{
"name": "http://blog.diniscruz.com/2013/08/using-xmldecoder-to-execute-server-side.html",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1862.html",
"refsource": "MISC",
"url": "http://blog.diniscruz.com/2013/08/using-xmldecoder-to-execute-server-side.html"
"name": "http://rhn.redhat.com/errata/RHSA-2013-1862.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=995275",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=995275"
"url": "http://blog.diniscruz.com/2013/08/using-xmldecoder-to-execute-server-side.html",
"refsource": "MISC",
"name": "http://blog.diniscruz.com/2013/08/using-xmldecoder-to-execute-server-side.html"
},
{
"name": "https://github.com/restlet/restlet-framework-java/issues/774",
"refsource": "CONFIRM",
"url": "https://github.com/restlet/restlet-framework-java/issues/774"
"url": "http://restlet.org/learn/2.1/changes",
"refsource": "MISC",
"name": "http://restlet.org/learn/2.1/changes"
},
{
"name": "RHSA-2013:1410",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1410.html"
"url": "http://rhn.redhat.com/errata/RHSA-2013-1410.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1410.html"
},
{
"url": "https://github.com/restlet/restlet-framework-java/issues/774",
"refsource": "MISC",
"name": "https://github.com/restlet/restlet-framework-java/issues/774"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=995275",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=995275"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2013-4222 OpenStack: Keystone disabling a tenant does not disable a user token"
"value": "OpenStack Identity (Keystone) Folsom, Grizzly 2013.1.3 and earlier, and Havana before havana-3 does not properly revoke user tokens when a tenant is disabled, which allows remote authenticated users to retain access via the token."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Insufficient Session Expiration",
"cweId": "CWE-613"
"value": "n/a"
}
]
}
@ -32,16 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "OpenStack 3 for RHEL 6",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:2013.1.4-1.el6ost",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -69,50 +68,10 @@
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2002-1"
},
{
"url": "https://access.redhat.com/errata/RHSA-2013:1524",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:1524"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2013-4222",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2013-4222"
},
{
"url": "https://bugs.launchpad.net/ossn/+bug/1179955",
"refsource": "MISC",
"name": "https://bugs.launchpad.net/ossn/+bug/1179955"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=995598",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=995598"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"version": "2.0"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4231",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size."
"value": "Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size."
}
]
},
@ -50,52 +27,76 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://bugzilla.maptools.org/show_bug.cgi?id=2450",
"refsource": "CONFIRM",
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2450"
"url": "http://rhn.redhat.com/errata/RHSA-2014-0223.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2014-0223.html"
},
{
"name": "RHSA-2014:0223",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0223.html"
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2450",
"refsource": "MISC",
"name": "http://bugzilla.maptools.org/show_bug.cgi?id=2450"
},
{
"name": "DSA-2744",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2744"
"url": "http://secunia.com/advisories/54543",
"refsource": "MISC",
"name": "http://secunia.com/advisories/54543"
},
{
"name": "54543",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54543"
"url": "http://secunia.com/advisories/54628",
"refsource": "MISC",
"name": "http://secunia.com/advisories/54628"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=995965",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=995965"
"url": "http://www.asmail.be/msg0055359936.html",
"refsource": "MISC",
"name": "http://www.asmail.be/msg0055359936.html"
},
{
"name": "[tiff] 20130801 Vulnerabilities in libtiff 4.0.3",
"refsource": "MLIST",
"url": "http://www.asmail.be/msg0055359936.html"
"url": "http://www.debian.org/security/2013/dsa-2744",
"refsource": "MISC",
"name": "http://www.debian.org/security/2013/dsa-2744"
},
{
"name": "54628",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54628"
"url": "http://www.openwall.com/lists/oss-security/2013/08/10/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/08/10/2"
},
{
"name": "[oss-security] 20130809 Re: CVE Request -- Four (stack-based) buffer overflows and one use-after-free in libtiff v4.0.3 reported by Pedro Ribeiro",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/08/10/2"
"url": "http://www.securityfocus.com/bid/61695",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/61695"
},
{
"name": "61695",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/61695"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=995965",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=995965"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2013-4232 libtiff (tiff2pdf): use-after-free in t2p_readwrite_pdf_image()"
"value": "Use-after-free vulnerability in the t2p_readwrite_pdf_image function in tools/tiff2pdf.c in libtiff 4.0.3 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted TIFF image."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Use After Free",
"cweId": "CWE-416"
"value": "n/a"
}
]
}
@ -32,27 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:3.8.2-19.el5_10",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:3.9.4-10.el6_5",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -70,16 +58,6 @@
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2014-0223.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2014:0222",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2014:0222"
},
{
"url": "https://access.redhat.com/errata/RHSA-2014:0223",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2014:0223"
},
{
"url": "http://secunia.com/advisories/54543",
"refsource": "MISC",
@ -110,41 +88,11 @@
"refsource": "MISC",
"name": "http://bugzilla.maptools.org/show_bug.cgi?id=2449"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2013-4232",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2013-4232"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=995975",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=995975"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.1,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "An out-of-bounds write flaw was found in the way the glibc's readdir_r() function handled file system entries longer than the NAME_MAX character constant. A remote attacker could provide a specially crafted NTFS or CIFS file system that, when processed by an application using readdir_r(), would cause that application to crash or, potentially, allow the attacker to execute arbitrary code with the privileges of the user running the application."
"value": "sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted (1) NTFS or (2) CIFS image."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Out-of-bounds Write",
"cweId": "CWE-787"
"value": "n/a"
}
]
}
@ -32,16 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 6",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:2.12-1.149.el6",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -84,21 +83,6 @@
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/61729"
},
{
"url": "https://access.redhat.com/errata/RHSA-2014:1391",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2014:1391"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2013-4237",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2013-4237"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=995839",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=995839"
},
{
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=14699",
"refsource": "MISC",
@ -108,37 +92,11 @@
"url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=91ce40854d0b7f865cf5024ef95a8026b76096f3",
"refsource": "MISC",
"name": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=91ce40854d0b7f865cf5024ef95a8026b76096f3"
}
]
},
"work_around": [
{
"lang": "en",
"value": "Do not open untrusted filesystem image files on production systems."
}
],
"impact": {
"cvss": [
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.8,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=995839",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=995839"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4238",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,82 +27,106 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2013:1582",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1582.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
"url": "http://seclists.org/fulldisclosure/2014/Dec/23",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2014/Dec/23"
},
{
"name": "openSUSE-SU-2013:1463",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00043.html"
"url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
},
{
"name": "openSUSE-SU-2013:1440",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00029.html"
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"refsource": "MISC",
"name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
},
{
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
"url": "http://bugs.python.org/issue18709",
"refsource": "MISC",
"name": "http://bugs.python.org/issue18709"
},
{
"name": "DSA-2880",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2880"
"url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00026.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00026.html"
},
{
"name": "USN-1982-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1982-1"
"url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00027.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00027.html"
},
{
"name": "openSUSE-SU-2013:1437",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00026.html"
"url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00028.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00028.html"
},
{
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Dec/23"
"url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00029.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00029.html"
},
{
"name": "openSUSE-SU-2013:1462",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00042.html"
"url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00042.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00042.html"
},
{
"name": "openSUSE-SU-2013:1438",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00027.html"
"url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00043.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00043.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=996381",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=996381"
"url": "http://rhn.redhat.com/errata/RHSA-2013-1582.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1582.html"
},
{
"name": "http://bugs.python.org/issue18709",
"refsource": "CONFIRM",
"url": "http://bugs.python.org/issue18709"
"url": "http://www.debian.org/security/2014/dsa-2880",
"refsource": "MISC",
"name": "http://www.debian.org/security/2014/dsa-2880"
},
{
"name": "openSUSE-SU-2013:1439",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00028.html"
"url": "http://www.ubuntu.com/usn/USN-1982-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1982-1"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0086",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=996381",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=996381"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4239",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20130812 Re: CVE Request -- libvirt: memory corruption in xenDaemonListDefinedDomains function",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/08/12/12"
"url": "http://libvirt.org/news.html",
"refsource": "MISC",
"name": "http://libvirt.org/news.html"
},
{
"name": "http://libvirt.org/news.html",
"refsource": "CONFIRM",
"url": "http://libvirt.org/news.html"
"url": "http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=0e671a16",
"refsource": "MISC",
"name": "http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=0e671a16"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=996241",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=996241"
"url": "http://www.openwall.com/lists/oss-security/2013/08/12/12",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/08/12/12"
},
{
"name": "http://libvirt.org/git/?p=libvirt.git;a=commitdiff;h=0e671a16",
"refsource": "CONFIRM",
"url": "http://libvirt.org/git/?p=libvirt.git;a=commitdiff;h=0e671a16"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=996241",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=996241"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2013-4243 libtiff (gif2tiff): possible heap-based buffer overflow in readgifimage()"
"value": "Heap-based buffer overflow in the readgifimage function in the gif2tiff tool in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted height and width values in a GIF image."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Heap-based Buffer Overflow",
"cweId": "CWE-122"
"value": "n/a"
}
]
}
@ -32,27 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:3.8.2-19.el5_10",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:3.9.4-10.el6_5",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -70,16 +58,6 @@
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2014-0223.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2014:0222",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2014:0222"
},
{
"url": "https://access.redhat.com/errata/RHSA-2014:0223",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2014:0223"
},
{
"url": "https://security.gentoo.org/glsa/201701-16",
"refsource": "MISC",
@ -110,41 +88,11 @@
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/62082"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2013-4243",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2013-4243"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=996052",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=996052"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.1,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2013-4244 libtiff (gif2tiff): OOB Write in LZW decompressor"
"value": "The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Out-of-bounds Write",
"cweId": "CWE-787"
"value": "n/a"
}
]
}
@ -32,27 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:3.8.2-19.el5_10",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:3.9.4-10.el6_5",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -70,60 +58,20 @@
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2014-0223.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2014:0222",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2014:0222"
},
{
"url": "https://access.redhat.com/errata/RHSA-2014:0223",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2014:0223"
},
{
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2452",
"refsource": "MISC",
"name": "http://bugzilla.maptools.org/show_bug.cgi?id=2452"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2013-4244",
"url": "https://github.com/vadz/libtiff/commit/ce6841d9e41d621ba23cf18b190ee6a23b2cc833",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2013-4244"
"name": "https://github.com/vadz/libtiff/commit/ce6841d9e41d621ba23cf18b190ee6a23b2cc833"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=996468",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=996468"
},
{
"url": "https://github.com/vadz/libtiff/commit/ce6841d9e41d621ba23cf18b190ee6a23b2cc833",
"refsource": "MISC",
"name": "https://github.com/vadz/libtiff/commit/ce6841d9e41d621ba23cf18b190ee6a23b2cc833"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.1,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-6330",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The server in Red Hat JBoss Operations Network (JON), when SSL authentication is not configured for JON server / agent communication, allows remote attackers to execute arbitrary code via a crafted HTTP request, related to message deserialization. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-3737."
"value": "The server in Red Hat JBoss Operations Network (JON), when SSL authentication is not configured for JON server / agent communication, allows remote attackers to execute arbitrary code via a crafted HTTP request, related to message deserialization. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-3737."
}
]
},
@ -50,22 +27,46 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://www.tenable.com/security/research/tra-2016-22",
"url": "http://www.securityfocus.com/bid/92568",
"refsource": "MISC",
"url": "https://www.tenable.com/security/research/tra-2016-22"
"name": "http://www.securityfocus.com/bid/92568"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1368864",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1368864"
"url": "https://www.tenable.com/security/research/tra-2016-22",
"refsource": "MISC",
"name": "https://www.tenable.com/security/research/tra-2016-22"
},
{
"name": "92568",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92568"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1368864",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1368864"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-6340",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,17 +27,41 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1370315",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370315"
"url": "http://www.securityfocus.com/bid/92655",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/92655"
},
{
"name": "92655",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92655"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370315",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1370315"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-6341",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "92665",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92665"
"url": "http://www.securityfocus.com/bid/92665",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/92665"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1363816",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1363816"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1363816",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1363816"
},
{
"name": "https://www.ovirt.org/release/4.0.3/",
"refsource": "CONFIRM",
"url": "https://www.ovirt.org/release/4.0.3/"
"url": "https://www.ovirt.org/release/4.0.3/",
"refsource": "MISC",
"name": "https://www.ovirt.org/release/4.0.3/"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1369793",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369793"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369793",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1369793"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-6342",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,17 +27,41 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "FEDORA-2016-348a7b6285",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N4ZQOPXSMJAJIXH5MRPQS2ZISYJPSLQK/"
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4ZQOPXSMJAJIXH5MRPQS2ZISYJPSLQK/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4ZQOPXSMJAJIXH5MRPQS2ZISYJPSLQK/"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1371328",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1371328"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1371328",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1371328"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-6490",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,32 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20160728 CVE Request Qemu: virtio: infinite loop in virtqueue_pop",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/07/28/4"
"url": "https://security.gentoo.org/glsa/201609-01",
"refsource": "MISC",
"name": "https://security.gentoo.org/glsa/201609-01"
},
{
"name": "[oss-security] 20160728 Re: CVE Request Qemu: virtio: infinite loop in virtqueue_pop",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/07/28/9"
"url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=1e7aed70144b4673fc26e73062064b6724795e5f",
"refsource": "MISC",
"name": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=1e7aed70144b4673fc26e73062064b6724795e5f"
},
{
"name": "GLSA-201609-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201609-01"
"url": "http://www.openwall.com/lists/oss-security/2016/07/28/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2016/07/28/4"
},
{
"name": "http://git.qemu.org/?p=qemu.git;a=commit;h=1e7aed70144b4673fc26e73062064b6724795e5f",
"refsource": "CONFIRM",
"url": "http://git.qemu.org/?p=qemu.git;a=commit;h=1e7aed70144b4673fc26e73062064b6724795e5f"
"url": "http://www.openwall.com/lists/oss-security/2016/07/28/9",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2016/07/28/9"
},
{
"name": "[qemu-devel] 20160726 [PATCH] virtio: check vring descriptor buffer length",
"refsource": "MLIST",
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-07/msg06246.html"
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-07/msg06246.html",
"refsource": "MISC",
"name": "https://lists.gnu.org/archive/html/qemu-devel/2016-07/msg06246.html"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-9101",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,42 +27,66 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "openSUSE-SU-2016:3237",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html"
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
},
{
"name": "GLSA-201701-49",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-49"
"url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html"
},
{
"name": "[oss-security] 20161030 Re: CVE request Qemu: net: eepro100 memory leakage at device unplug",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/10/30/5"
"url": "https://security.gentoo.org/glsa/201701-49",
"refsource": "MISC",
"name": "https://security.gentoo.org/glsa/201701-49"
},
{
"name": "[oss-security] 20161028 CVE request Qemu: net: eepro100 memory leakage at device unplug",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/10/27/14"
"url": "http://www.openwall.com/lists/oss-security/2016/10/27/14",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2016/10/27/14"
},
{
"name": "[qemu-devel] 20161013 [PATCH] eepro100: Fix memory leak and simplify code for VMStateDescription",
"refsource": "MLIST",
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg03024.html"
"url": "http://www.openwall.com/lists/oss-security/2016/10/30/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2016/10/30/5"
},
{
"name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
"url": "http://www.securityfocus.com/bid/93957",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/93957"
},
{
"name": "93957",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93957"
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg03024.html",
"refsource": "MISC",
"name": "https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg03024.html"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-9102",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,42 +27,66 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "GLSA-201611-11",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201611-11"
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
},
{
"name": "93962",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93962"
"url": "https://security.gentoo.org/glsa/201611-11",
"refsource": "MISC",
"name": "https://security.gentoo.org/glsa/201611-11"
},
{
"name": "[qemu-devel] 20161010 Re: [PATCH] 9pfs: fix memory leak in v9fs_xattrcreate",
"refsource": "MLIST",
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg01861.html"
"url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ff55e94d23ae94c8628b0115320157c763eb3e06",
"refsource": "MISC",
"name": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ff55e94d23ae94c8628b0115320157c763eb3e06"
},
{
"name": "[oss-security] 20161028 CVE request Qemu: 9pfs: memory leakage when creating extended attribute",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/10/27/15"
"url": "http://www.openwall.com/lists/oss-security/2016/10/27/15",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2016/10/27/15"
},
{
"name": "http://git.qemu.org/?p=qemu.git;a=commit;h=ff55e94d23ae94c8628b0115320157c763eb3e06",
"refsource": "CONFIRM",
"url": "http://git.qemu.org/?p=qemu.git;a=commit;h=ff55e94d23ae94c8628b0115320157c763eb3e06"
"url": "http://www.openwall.com/lists/oss-security/2016/10/30/6",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2016/10/30/6"
},
{
"name": "[oss-security] 20161030 Re: CVE request Qemu: 9pfs: memory leakage when creating extended attribute",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/10/30/6"
"url": "http://www.securityfocus.com/bid/93962",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/93962"
},
{
"name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg01861.html",
"refsource": "MISC",
"name": "https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg01861.html"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-9106",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,42 +27,66 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20161030 Re: CVE request Qemu: 9pfs: memory leakage in v9fs_write",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/10/30/10"
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
},
{
"name": "93964",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93964"
"url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html"
},
{
"name": "[oss-security] 20161028 CVE request Qemu: 9pfs: memory leakage in v9fs_write",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/10/28/4"
"url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=fdfcc9aeea1492f4b819a24c94dfb678145b1bf9",
"refsource": "MISC",
"name": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=fdfcc9aeea1492f4b819a24c94dfb678145b1bf9"
},
{
"name": "openSUSE-SU-2016:3237",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html"
"url": "http://www.openwall.com/lists/oss-security/2016/10/28/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2016/10/28/4"
},
{
"name": "http://git.qemu.org/?p=qemu.git;a=commit;h=fdfcc9aeea1492f4b819a24c94dfb678145b1bf9",
"refsource": "CONFIRM",
"url": "http://git.qemu.org/?p=qemu.git;a=commit;h=fdfcc9aeea1492f4b819a24c94dfb678145b1bf9"
"url": "http://www.openwall.com/lists/oss-security/2016/10/30/10",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2016/10/30/10"
},
{
"name": "[qemu-devel] 20161012 Re: [PATCH v2] 9pfs: fix memory leak in v9fs_write",
"refsource": "MLIST",
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg02623.html"
"url": "http://www.securityfocus.com/bid/93964",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/93964"
},
{
"name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg02623.html",
"refsource": "MISC",
"name": "https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg02623.html"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2016-9911 Qemu: usb: ehci: memory leakage in ehci_init_transfer"
"value": "Quick Emulator (Qemu) built with the USB EHCI Emulation support is vulnerable to a memory leakage issue. It could occur while processing packet data in 'ehci_init_transfer'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Improper Clearing of Heap Memory Before Release ('Heap Inspection')",
"cweId": "CWE-244"
"value": "n/a"
}
]
}
@ -32,82 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "10:2.9.0-10.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7",
"version": {
"version_data": [
{
"version_value": "10:2.9.0-10.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat OpenStack Platform 10.0 (Newton)",
"version": {
"version_data": [
{
"version_value": "10:2.9.0-10.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat OpenStack Platform 11.0 (Ocata)",
"version": {
"version_data": [
{
"version_value": "10:2.9.0-10.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat OpenStack Platform 8.0 (Liberty)",
"version": {
"version_data": [
{
"version_value": "10:2.9.0-10.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat OpenStack Platform 9.0 (Mitaka)",
"version": {
"version_data": [
{
"version_value": "10:2.9.0-10.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "10:2.9.0-14.el7",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -149,55 +82,6 @@
"url": "http://www.securityfocus.com/bid/94762",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/94762"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2016-9911",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-9911"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402272",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1402272"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 2.3,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:A/AC:M/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
{
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
}
]
}