diff --git a/2010/2xxx/CVE-2010-2243.json b/2010/2xxx/CVE-2010-2243.json index 43d957edbb6..71537a8bc0f 100644 --- a/2010/2xxx/CVE-2010-2243.json +++ b/2010/2xxx/CVE-2010-2243.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-2243", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "linux-2.6", - "product": { - "product_data": [ - { - "product_name": "linux-2.6", - "version": { - "version_data": [ - { - "version_value": "before 2.6.33" - } - ] - } - } - ] - } - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "linux-2.6", + "product": { + "product_data": [ + { + "product_name": "linux-2.6", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "before 2.6.33" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ - { - "url": "https://security-tracker.debian.org/tracker/CVE-2010-2243", - "refsource": "MISC", - "name": "https://security-tracker.debian.org/tracker/CVE-2010-2243" - }, { "url": "https://access.redhat.com/security/cve/cve-2010-2243", "refsource": "MISC", "name": "https://access.redhat.com/security/cve/cve-2010-2243" }, { - "refsource": "MLIST", - "name": "[oss-security] 20100625 Re: CVE request: kernel: timekeeping: Prevent oops when GENERIC_TIME=n", - "url": "https://www.openwall.com/lists/oss-security/2010/06/25/1" + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad6759fbf35d104dbf573cd6f4c6784ad6823f7e", + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad6759fbf35d104dbf573cd6f4c6784ad6823f7e" }, { - "refsource": "CONFIRM", - "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad6759fbf35d104dbf573cd6f4c6784ad6823f7e", - "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad6759fbf35d104dbf573cd6f4c6784ad6823f7e" + "url": "https://security-tracker.debian.org/tracker/CVE-2010-2243", + "refsource": "MISC", + "name": "https://security-tracker.debian.org/tracker/CVE-2010-2243" + }, + { + "url": "https://www.openwall.com/lists/oss-security/2010/06/25/1", + "refsource": "MISC", + "name": "https://www.openwall.com/lists/oss-security/2010/06/25/1" } ] } diff --git a/2010/2xxx/CVE-2010-2244.json b/2010/2xxx/CVE-2010-2244.json index 56800e3fc46..988680b2272 100644 --- a/2010/2xxx/CVE-2010-2244.json +++ b/2010/2xxx/CVE-2010-2244.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-2244", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,47 +27,71 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[oss-security] 20100625 Re: CVE Request: avahi DoS", - "refsource": "MLIST", - "url": "http://marc.info/?l=oss-security&m=127748459505200&w=2" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043800.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043800.html" }, { - "name": "[oss-security] 20100623 CVE Request: avahi DoS", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2010/06/23/4" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043820.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043820.html" }, { - "name": "FEDORA-2010-10584", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043800.html" + "url": "http://marc.info/?l=oss-security&m=127748459505200&w=2", + "refsource": "MISC", + "name": "http://marc.info/?l=oss-security&m=127748459505200&w=2" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=607293", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=607293" + "url": "http://www.debian.org/security/2010/dsa-2086", + "refsource": "MISC", + "name": "http://www.debian.org/security/2010/dsa-2086" }, { - "name": "MDVSA-2010:204", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:204" + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:204", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:204" }, { - "name": "1024200", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id?1024200" + "url": "http://www.openwall.com/lists/oss-security/2010/06/23/4", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2010/06/23/4" }, { - "name": "DSA-2086", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2010/dsa-2086" + "url": "http://www.securitytracker.com/id?1024200", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id?1024200" }, { - "name": "FEDORA-2010-10581", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043820.html" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=607293", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=607293" } ] } diff --git a/2010/2xxx/CVE-2010-2246.json b/2010/2xxx/CVE-2010-2246.json index 09a83012da1..ca5d0c399a5 100644 --- a/2010/2xxx/CVE-2010-2246.json +++ b/2010/2xxx/CVE-2010-2246.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-2246", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://derf.homelinux.org/git/feh/plain/ChangeLog", - "refsource": "CONFIRM", - "url": "http://derf.homelinux.org/git/feh/plain/ChangeLog" + "url": "http://derf.homelinux.org/git/feh/plain/ChangeLog", + "refsource": "MISC", + "name": "http://derf.homelinux.org/git/feh/plain/ChangeLog" }, { - "name": "[oss-security] 20100628 Re: CVE request: feh", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/06/28/4" + "url": "http://openwall.com/lists/oss-security/2010/06/25/4", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/06/25/4" }, { - "name": "41161", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/41161" + "url": "http://openwall.com/lists/oss-security/2010/06/28/4", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/06/28/4" }, { - "name": "[oss-security] 20100625 CVE request: feh", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/06/25/4" + "url": "http://www.securityfocus.com/bid/41161", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/41161" } ] } diff --git a/2010/2xxx/CVE-2010-2247.json b/2010/2xxx/CVE-2010-2247.json index c904262f2bb..9818a797161 100644 --- a/2010/2xxx/CVE-2010-2247.json +++ b/2010/2xxx/CVE-2010-2247.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-2247", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "makepasswd", - "product": { - "product_data": [ - { - "product_name": "makepasswd", - "version": { - "version_data": [ - { - "version_value": "1.10" - } - ] - } - } - ] - } - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "makepasswd", + "product": { + "product_data": [ + { + "product_name": "makepasswd", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.10" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ - { - "url": "https://security-tracker.debian.org/tracker/CVE-2010-2247", - "refsource": "MISC", - "name": "https://security-tracker.debian.org/tracker/CVE-2010-2247" - }, { "url": "https://access.redhat.com/security/cve/cve-2010-2247", "refsource": "MISC", "name": "https://access.redhat.com/security/cve/cve-2010-2247" }, { - "refsource": "FEDORA", - "name": "FEDORA-2020-1db19e75db", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JLAGK43ZTRNAMRO7JI2AW4BAZS35QSEE/" + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLHAXN3XRR7RJ73SJTBSW3GZT4GLHI33/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLHAXN3XRR7RJ73SJTBSW3GZT4GLHI33/" }, { - "refsource": "FEDORA", - "name": "FEDORA-2020-a5b60d0c2b", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HLHAXN3XRR7RJ73SJTBSW3GZT4GLHI33/" + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JLAGK43ZTRNAMRO7JI2AW4BAZS35QSEE/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JLAGK43ZTRNAMRO7JI2AW4BAZS35QSEE/" + }, + { + "url": "https://security-tracker.debian.org/tracker/CVE-2010-2247", + "refsource": "MISC", + "name": "https://security-tracker.debian.org/tracker/CVE-2010-2247" } ] } diff --git a/2010/2xxx/CVE-2010-2248.json b/2010/2xxx/CVE-2010-2248.json index ef826ff3fa4..bce0dca62fb 100644 --- a/2010/2xxx/CVE-2010-2248.json +++ b/2010/2xxx/CVE-2010-2248.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2010-2248 kernel: cifs: Fix a kernel BUG with remote OS/2 server" + "value": "fs/cifs/cifssmb.c in the CIFS implementation in the Linux kernel before 2.6.34-rc4 allows remote attackers to cause a denial of service (panic) via an SMB response packet with an invalid CountHigh value, as demonstrated by a response from an OS/2 server, related to the CIFSSMBWrite and CIFSSMBWrite2 functions." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Reachable Assertion", - "cweId": "CWE-617" + "value": "n/a" } ] } @@ -32,38 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "MRG for RHEL-5", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:2.6.24.7-161.el5rt", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 4", - "version": { - "version_data": [ - { - "version_value": "0:2.6.9-89.0.28.EL", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 5", - "version": { - "version_data": [ - { - "version_value": "0:2.6.18-194.11.1.el5", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -81,11 +58,6 @@ "refsource": "MISC", "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051" }, - { - "url": "https://access.redhat.com/errata/RHSA-2010:0631", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2010:0631" - }, { "url": "http://secunia.com/advisories/43315", "refsource": "MISC", @@ -126,16 +98,6 @@ "refsource": "MISC", "name": "http://www.ubuntu.com/usn/USN-1000-1" }, - { - "url": "https://access.redhat.com/errata/RHSA-2010:0610", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2010:0610" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2010:0606", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2010:0606" - }, { "url": "https://rhn.redhat.com/errata/RHSA-2010-0606.html", "refsource": "MISC", @@ -171,41 +133,11 @@ "refsource": "MISC", "name": "http://www.securityfocus.com/bid/42242" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2010-2248", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2010-2248" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=608583", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=608583" } ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "MEDIUM", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "COMPLETE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 7.1, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", - "version": "2.0" - } - ] } } \ No newline at end of file diff --git a/2010/2xxx/CVE-2010-2249.json b/2010/2xxx/CVE-2010-2249.json index 139b7036828..ab96f0e5193 100644 --- a/2010/2xxx/CVE-2010-2249.json +++ b/2010/2xxx/CVE-2010-2249.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2010-2249 libpng: Memory leak when processing Physical Scale (sCAL) images" + "value": "Memory leak in pngrutil.c in libpng before 1.2.44, and 1.4.x before 1.4.3, allows remote attackers to cause a denial of service (memory consumption and application crash) via a PNG image containing malformed Physical Scale (aka sCAL) chunks." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Missing Release of Memory after Effective Lifetime", - "cweId": "CWE-401" + "value": "n/a" } ] } @@ -32,46 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 3", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "2:1.2.2-30", - "version_affected": "!" - }, - { - "version_value": "0:1.0.13-21", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 4", - "version": { - "version_data": [ - { - "version_value": "2:1.2.7-3.el4_8.3", - "version_affected": "!" - }, - { - "version_value": "0:1.0.16-3.el4_8.4", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 5", - "version": { - "version_data": [ - { - "version_value": "2:1.2.10-7.1.el5_5.3", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -275,49 +244,14 @@ "name": "http://www.vupen.com/english/advisories/2010/3046" }, { - "url": "https://access.redhat.com/errata/RHSA-2010:0534", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59816", "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2010:0534" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2010-2249", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2010-2249" + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59816" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=608644", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=608644" - }, - { - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59816", - "refsource": "MISC", - "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59816" - } - ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "MEDIUM", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 4.3, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", - "version": "2.0" } ] } diff --git a/2010/2xxx/CVE-2010-2474.json b/2010/2xxx/CVE-2010-2474.json index dcfd9fe4c19..0709da244f5 100644 --- a/2010/2xxx/CVE-2010-2474.json +++ b/2010/2xxx/CVE-2010-2474.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-2474", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,32 +27,56 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "40568", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/40568" + "url": "http://secunia.com/advisories/40568", + "refsource": "MISC", + "name": "http://secunia.com/advisories/40568" }, { - "name": "40681", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/40681" + "url": "http://secunia.com/advisories/40681", + "refsource": "MISC", + "name": "http://secunia.com/advisories/40681" }, { - "name": "https://jira.jboss.org/browse/JBESB-3345", - "refsource": "CONFIRM", - "url": "https://jira.jboss.org/browse/JBESB-3345" + "url": "http://www.redhat.com/docs/en-US/JBoss_SOA_Platform/5.0.2/html/5.0.2_Release_Notes/index.html", + "refsource": "MISC", + "name": "http://www.redhat.com/docs/en-US/JBoss_SOA_Platform/5.0.2/html/5.0.2_Release_Notes/index.html" }, { - "name": "http://www.redhat.com/docs/en-US/JBoss_SOA_Platform/5.0.2/html/5.0.2_Release_Notes/index.html", - "refsource": "CONFIRM", - "url": "http://www.redhat.com/docs/en-US/JBoss_SOA_Platform/5.0.2/html/5.0.2_Release_Notes/index.html" + "url": "https://jira.jboss.org/browse/JBESB-3345", + "refsource": "MISC", + "name": "https://jira.jboss.org/browse/JBESB-3345" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=609442", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=609442" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=609442", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=609442" } ] } diff --git a/2010/2xxx/CVE-2010-2477.json b/2010/2xxx/CVE-2010-2477.json index ad64fb0f531..8232490445f 100644 --- a/2010/2xxx/CVE-2010-2477.json +++ b/2010/2xxx/CVE-2010-2477.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-2477", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,52 +27,76 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://pylonshq.com/articles/archives/2010/6/paste_174_released_addresses_xss_security_hole", - "refsource": "CONFIRM", - "url": "http://pylonshq.com/articles/archives/2010/6/paste_174_released_addresses_xss_security_hole" + "url": "http://bitbucket.org/ianb/paste/changeset/fcae59df8b56", + "refsource": "MISC", + "name": "http://bitbucket.org/ianb/paste/changeset/fcae59df8b56" }, { - "name": "http://bitbucket.org/ianb/paste/changeset/fcae59df8b56", - "refsource": "CONFIRM", - "url": "http://bitbucket.org/ianb/paste/changeset/fcae59df8b56" + "url": "http://groups.google.com/group/paste-users/browse_thread/thread/3b3fff3dadd0b1e5?pli=1", + "refsource": "MISC", + "name": "http://groups.google.com/group/paste-users/browse_thread/thread/3b3fff3dadd0b1e5?pli=1" }, { - "name": "41160", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/41160" + "url": "http://groups.google.com/group/pylons-discuss/msg/8c256dc076a408d8?dmode=source&output=gplain", + "refsource": "MISC", + "name": "http://groups.google.com/group/pylons-discuss/msg/8c256dc076a408d8?dmode=source&output=gplain" }, { - "name": "http://groups.google.com/group/paste-users/browse_thread/thread/3b3fff3dadd0b1e5?pli=1", - "refsource": "CONFIRM", - "url": "http://groups.google.com/group/paste-users/browse_thread/thread/3b3fff3dadd0b1e5?pli=1" + "url": "http://marc.info/?l=oss-security&m=127785414818815&w=2", + "refsource": "MISC", + "name": "http://marc.info/?l=oss-security&m=127785414818815&w=2" }, { - "name": "42500", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42500" + "url": "http://marc.info/?l=oss-security&m=127792576822169&w=2", + "refsource": "MISC", + "name": "http://marc.info/?l=oss-security&m=127792576822169&w=2" }, { - "name": "USN-1026-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1026-1" + "url": "http://pylonshq.com/articles/archives/2010/6/paste_174_released_addresses_xss_security_hole", + "refsource": "MISC", + "name": "http://pylonshq.com/articles/archives/2010/6/paste_174_released_addresses_xss_security_hole" }, { - "name": "[pylons-discuss] 20100624 Paste 1.7.4, security fix for XSS hole", - "refsource": "MLIST", - "url": "http://groups.google.com/group/pylons-discuss/msg/8c256dc076a408d8?dmode=source&output=gplain" + "url": "http://secunia.com/advisories/42500", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42500" }, { - "name": "[oss-security] 20100629 CVE request: XSS in python paste", - "refsource": "MLIST", - "url": "http://marc.info/?l=oss-security&m=127785414818815&w=2" + "url": "http://www.securityfocus.com/bid/41160", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/41160" }, { - "name": "[oss-security] 20100630 Re: CVE request: XSS in python paste", - "refsource": "MLIST", - "url": "http://marc.info/?l=oss-security&m=127792576822169&w=2" + "url": "http://www.ubuntu.com/usn/USN-1026-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1026-1" } ] } diff --git a/2010/2xxx/CVE-2010-2478.json b/2010/2xxx/CVE-2010-2478.json index 8a3ca4a14cf..536dd457017 100644 --- a/2010/2xxx/CVE-2010-2478.json +++ b/2010/2xxx/CVE-2010-2478.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2010-2478 kernel: ethtool: kernel buffer overflow in ETHTOOL_GRXCLSRLALL" + "value": "Integer overflow in the ethtool_get_rxnfc function in net/core/ethtool.c in the Linux kernel before 2.6.33.7 on 32-bit platforms allows local users to cause a denial of service or possibly have unspecified other impact via an ETHTOOL_GRXCLSRLALL ethtool command with a large info.rule_cnt value that triggers a buffer overflow, a different vulnerability than CVE-2010-3084." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Restriction of Operations within the Bounds of a Memory Buffer", - "cweId": "CWE-119" + "value": "n/a" } ] } @@ -40,8 +39,8 @@ "version": { "version_data": [ { - "version_value": "n/a", - "version_affected": "=" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -99,41 +98,11 @@ "refsource": "MISC", "name": "http://www.securityfocus.com/bid/41223" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2010-2478", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2010-2478" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=608950", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=608950" } ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "LOW", - "accessVector": "LOCAL", - "authentication": "NONE", - "availabilityImpact": "COMPLETE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 7.2, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "COMPLETE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "COMPLETE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", - "version": "2.0" - } - ] } } \ No newline at end of file diff --git a/2010/2xxx/CVE-2010-2479.json b/2010/2xxx/CVE-2010-2479.json index 8ff62af5f51..79f358f717f 100644 --- a/2010/2xxx/CVE-2010-2479.json +++ b/2010/2xxx/CVE-2010-2479.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-2479", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,47 +27,71 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "39613", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/39613" + "url": "http://htmlpurifier.org/news/2010/0531-4.1.1-released", + "refsource": "MISC", + "name": "http://htmlpurifier.org/news/2010/0531-4.1.1-released" }, { - "name": "http://wiki.mahara.org/Release_Notes/1.1.9", - "refsource": "CONFIRM", - "url": "http://wiki.mahara.org/Release_Notes/1.1.9" + "url": "http://repo.or.cz/w/htmlpurifier.git/commitdiff/18e538317a877a0509ae71a860429c41770da230", + "refsource": "MISC", + "name": "http://repo.or.cz/w/htmlpurifier.git/commitdiff/18e538317a877a0509ae71a860429c41770da230" }, { - "name": "http://htmlpurifier.org/news/2010/0531-4.1.1-released", - "refsource": "CONFIRM", - "url": "http://htmlpurifier.org/news/2010/0531-4.1.1-released" + "url": "http://secunia.com/advisories/39613", + "refsource": "MISC", + "name": "http://secunia.com/advisories/39613" }, { - "name": "41259", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/41259" + "url": "http://secunia.com/advisories/40431", + "refsource": "MISC", + "name": "http://secunia.com/advisories/40431" }, { - "name": "http://wiki.mahara.org/Release_Notes/1.2.5", - "refsource": "CONFIRM", - "url": "http://wiki.mahara.org/Release_Notes/1.2.5" + "url": "http://wiki.mahara.org/Release_Notes/1.0.15", + "refsource": "MISC", + "name": "http://wiki.mahara.org/Release_Notes/1.0.15" }, { - "name": "http://repo.or.cz/w/htmlpurifier.git/commitdiff/18e538317a877a0509ae71a860429c41770da230", - "refsource": "CONFIRM", - "url": "http://repo.or.cz/w/htmlpurifier.git/commitdiff/18e538317a877a0509ae71a860429c41770da230" + "url": "http://wiki.mahara.org/Release_Notes/1.1.9", + "refsource": "MISC", + "name": "http://wiki.mahara.org/Release_Notes/1.1.9" }, { - "name": "http://wiki.mahara.org/Release_Notes/1.0.15", - "refsource": "CONFIRM", - "url": "http://wiki.mahara.org/Release_Notes/1.0.15" + "url": "http://wiki.mahara.org/Release_Notes/1.2.5", + "refsource": "MISC", + "name": "http://wiki.mahara.org/Release_Notes/1.2.5" }, { - "name": "40431", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/40431" + "url": "http://www.securityfocus.com/bid/41259", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/41259" } ] } diff --git a/2010/4xxx/CVE-2010-4346.json b/2010/4xxx/CVE-2010-4346.json index 0ed60be492b..6e2c61a8919 100644 --- a/2010/4xxx/CVE-2010-4346.json +++ b/2010/4xxx/CVE-2010-4346.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-4346", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,77 +27,101 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console", - "refsource": "BUGTRAQ", - "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=662189", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=662189" + "url": "http://secunia.com/advisories/46397", + "refsource": "MISC", + "name": "http://secunia.com/advisories/46397" }, { - "name": "46397", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/46397" + "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded", + "refsource": "MISC", + "name": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { - "name": "[oss-security] 20101209 Re: [taviso@cmpxchg8b.com: [PATCH] install_special_mapping skips security_file_mmap check.]", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/09/13" + "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", + "refsource": "MISC", + "name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=462e635e5b73ba9a4c03913b77138cd57ce4b050", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=462e635e5b73ba9a4c03913b77138cd57ce4b050" + "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc6", + "refsource": "MISC", + "name": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc6" }, { - "name": "[linux-kernel] 20101209 [PATCH] install_special_mapping skips security_file_mmap check.", - "refsource": "MLIST", - "url": "https://lkml.org/lkml/2010/12/9/222" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=462e635e5b73ba9a4c03913b77138cd57ce4b050", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=462e635e5b73ba9a4c03913b77138cd57ce4b050" }, { - "name": "[oss-security] 20101210 Re: Subject: CVE request: kernel: install_special_mapping skips security_file_mmap check", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/10/3" + "url": "http://openwall.com/lists/oss-security/2010/12/09/12", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/09/12" }, { - "name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", - "refsource": "CONFIRM", - "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" + "url": "http://openwall.com/lists/oss-security/2010/12/09/13", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/09/13" }, { - "name": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc6", - "refsource": "CONFIRM", - "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc6" + "url": "http://openwall.com/lists/oss-security/2010/12/10/2", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/10/2" }, { - "name": "MDVSA-2011:029", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029" + "url": "http://openwall.com/lists/oss-security/2010/12/10/3", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/10/3" }, { - "name": "45323", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/45323" + "url": "http://secunia.com/advisories/42570", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42570" }, { - "name": "[oss-security] 20101210 Subject: CVE request: kernel: install_special_mapping skips security_file_mmap check", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/10/2" + "url": "http://www.securityfocus.com/bid/45323", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/45323" }, { - "name": "[oss-security] 20101209 [taviso@cmpxchg8b.com: [PATCH] install_special_mapping skips security_file_mmap check.]", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/09/12" + "url": "https://lkml.org/lkml/2010/12/9/222", + "refsource": "MISC", + "name": "https://lkml.org/lkml/2010/12/9/222" }, { - "name": "42570", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42570" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=662189", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=662189" } ] } diff --git a/2010/4xxx/CVE-2010-4347.json b/2010/4xxx/CVE-2010-4347.json index 6c6790d0bcc..96a83dc583b 100644 --- a/2010/4xxx/CVE-2010-4347.json +++ b/2010/4xxx/CVE-2010-4347.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-4347", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,72 +27,96 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=663542", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663542" + "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" }, { - "name": "42778", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42778" + "url": "http://www.vupen.com/english/advisories/2011/0298", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0298" }, { - "name": "SUSE-SA:2011:001", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html" }, { - "name": "45408", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/45408" + "url": "http://secunia.com/advisories/42778", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42778" }, { - "name": "SUSE-SA:2011:007", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" + "url": "http://www.vupen.com/english/advisories/2011/0012", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0012" }, { - "name": "ADV-2011-0298", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0298" + "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2", + "refsource": "MISC", + "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2" }, { - "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2", - "refsource": "CONFIRM", - "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ed3aada1bf34c5a9e98af167f125f8a740fc726a", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ed3aada1bf34c5a9e98af167f125f8a740fc726a" }, { - "name": "[oss-security] 20101215 CVE Request: local privilege escalation via /sys/kernel/debug/acpi/custom_method", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/15/3" + "url": "http://openwall.com/lists/oss-security/2010/12/15/3", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/15/3" }, { - "name": "ADV-2011-0012", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0012" + "url": "http://openwall.com/lists/oss-security/2010/12/15/7", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/15/7" }, { - "name": "[oss-security] 20101215 Re: CVE Request: local privilege escalation via /sys/kernel/debug/acpi/custom_method", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/15/7" + "url": "http://www.exploit-db.com/exploits/15774/", + "refsource": "MISC", + "name": "http://www.exploit-db.com/exploits/15774/" }, { - "name": "15774", - "refsource": "EXPLOIT-DB", - "url": "http://www.exploit-db.com/exploits/15774/" + "url": "http://www.securityfocus.com/bid/45408", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/45408" }, { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ed3aada1bf34c5a9e98af167f125f8a740fc726a", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ed3aada1bf34c5a9e98af167f125f8a740fc726a" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64155", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64155" }, { - "name": "kernel-debugfs-privilege-esc(64155)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64155" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663542", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=663542" } ] } diff --git a/2010/4xxx/CVE-2010-4348.json b/2010/4xxx/CVE-2010-4348.json index 7b751a12042..5c5d158fa4b 100644 --- a/2010/4xxx/CVE-2010-4348.json +++ b/2010/4xxx/CVE-2010-4348.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-4348", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,72 +27,96 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "ADV-2011-0002", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0002" - }, - { - "name": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php", + "url": "http://secunia.com/advisories/51199", "refsource": "MISC", - "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php" + "name": "http://secunia.com/advisories/51199" }, { - "name": "[oss-security] 20101216 Re: CVE request: MantisBT <=1.2.3 (db_type) Cross-Site Scripting & Path Disclosure Vulnerability", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/16/1" + "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml", + "refsource": "MISC", + "name": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { - "name": "GLSA-201211-01", - "refsource": "GENTOO", - "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html" }, { - "name": "http://www.mantisbt.org/blog/?p=123", - "refsource": "CONFIRM", - "url": "http://www.mantisbt.org/blog/?p=123" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html" }, { - "name": "http://www.mantisbt.org/bugs/view.php?id=12607", - "refsource": "CONFIRM", - "url": "http://www.mantisbt.org/bugs/view.php?id=12607" + "url": "http://openwall.com/lists/oss-security/2010/12/15/4", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/15/4" }, { - "name": "51199", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51199" + "url": "http://openwall.com/lists/oss-security/2010/12/16/1", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/16/1" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=663230", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663230" + "url": "http://secunia.com/advisories/42772", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42772" }, { - "name": "FEDORA-2010-19078", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html" + "url": "http://www.mantisbt.org/blog/?p=123", + "refsource": "MISC", + "name": "http://www.mantisbt.org/blog/?p=123" }, { - "name": "[oss-security] 20101215 CVE request: MantisBT <=1.2.3 (db_type) Cross-Site Scripting & Path Disclosure Vulnerability", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/15/4" + "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112", + "refsource": "MISC", + "name": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112" }, { - "name": "42772", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42772" + "url": "http://www.mantisbt.org/bugs/view.php?id=12607", + "refsource": "MISC", + "name": "http://www.mantisbt.org/bugs/view.php?id=12607" }, { - "name": "FEDORA-2010-19070", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html" + "url": "http://www.vupen.com/english/advisories/2011/0002", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0002" }, { - "name": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112", - "refsource": "CONFIRM", - "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112" + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php", + "refsource": "MISC", + "name": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663230", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=663230" } ] } diff --git a/2010/4xxx/CVE-2010-4349.json b/2010/4xxx/CVE-2010-4349.json index a9ae311ee63..9c657a32a7d 100644 --- a/2010/4xxx/CVE-2010-4349.json +++ b/2010/4xxx/CVE-2010-4349.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-4349", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,77 +27,101 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "ADV-2011-0002", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0002" - }, - { - "name": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php", + "url": "http://secunia.com/advisories/51199", "refsource": "MISC", - "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php" + "name": "http://secunia.com/advisories/51199" }, { - "name": "[oss-security] 20101216 Re: CVE request: MantisBT <=1.2.3 (db_type) Cross-Site Scripting & Path Disclosure Vulnerability", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/16/1" + "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml", + "refsource": "MISC", + "name": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { - "name": "GLSA-201211-01", - "refsource": "GENTOO", - "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html" }, { - "name": "http://www.mantisbt.org/blog/?p=123", - "refsource": "CONFIRM", - "url": "http://www.mantisbt.org/blog/?p=123" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html" }, { - "name": "http://www.mantisbt.org/bugs/view.php?id=12607", - "refsource": "CONFIRM", - "url": "http://www.mantisbt.org/bugs/view.php?id=12607" + "url": "http://openwall.com/lists/oss-security/2010/12/15/4", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/15/4" }, { - "name": "mantisbt-dbtype-path-disclosure(64463)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64463" + "url": "http://openwall.com/lists/oss-security/2010/12/16/1", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/16/1" }, { - "name": "51199", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51199" + "url": "http://secunia.com/advisories/42772", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42772" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=663230", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663230" + "url": "http://www.mantisbt.org/blog/?p=123", + "refsource": "MISC", + "name": "http://www.mantisbt.org/blog/?p=123" }, { - "name": "FEDORA-2010-19078", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html" + "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112", + "refsource": "MISC", + "name": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112" }, { - "name": "[oss-security] 20101215 CVE request: MantisBT <=1.2.3 (db_type) Cross-Site Scripting & Path Disclosure Vulnerability", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/15/4" + "url": "http://www.mantisbt.org/bugs/view.php?id=12607", + "refsource": "MISC", + "name": "http://www.mantisbt.org/bugs/view.php?id=12607" }, { - "name": "42772", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42772" + "url": "http://www.vupen.com/english/advisories/2011/0002", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0002" }, { - "name": "FEDORA-2010-19070", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html" + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php", + "refsource": "MISC", + "name": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php" }, { - "name": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112", - "refsource": "CONFIRM", - "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64463", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64463" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663230", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=663230" } ] } diff --git a/2010/4xxx/CVE-2010-4350.json b/2010/4xxx/CVE-2010-4350.json index fd2cbf5f914..ab037576c74 100644 --- a/2010/4xxx/CVE-2010-4350.json +++ b/2010/4xxx/CVE-2010-4350.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-4350", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,72 +27,96 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "ADV-2011-0002", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0002" - }, - { - "name": "[oss-security] 20101215 CVE request: MantisBT <=1.2.3 (db_type) Local File Inclusion Vulnerability", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/15/5" - }, - { - "name": "GLSA-201211-01", - "refsource": "GENTOO", - "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" - }, - { - "name": "http://www.mantisbt.org/blog/?p=123", - "refsource": "CONFIRM", - "url": "http://www.mantisbt.org/blog/?p=123" - }, - { - "name": "[oss-security] 20101216 Re: CVE request: MantisBT <=1.2.3 (db_type) Local File Inclusion Vulnerability", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/16/2" - }, - { - "name": "http://www.mantisbt.org/bugs/view.php?id=12607", - "refsource": "CONFIRM", - "url": "http://www.mantisbt.org/bugs/view.php?id=12607" - }, - { - "name": "51199", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51199" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=663230", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663230" - }, - { - "name": "FEDORA-2010-19078", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html" - }, - { - "name": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4984.php", + "url": "http://secunia.com/advisories/51199", "refsource": "MISC", - "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4984.php" + "name": "http://secunia.com/advisories/51199" }, { - "name": "42772", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42772" + "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml", + "refsource": "MISC", + "name": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { - "name": "FEDORA-2010-19070", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html" }, { - "name": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112", - "refsource": "CONFIRM", - "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html" + }, + { + "url": "http://secunia.com/advisories/42772", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42772" + }, + { + "url": "http://www.mantisbt.org/blog/?p=123", + "refsource": "MISC", + "name": "http://www.mantisbt.org/blog/?p=123" + }, + { + "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112", + "refsource": "MISC", + "name": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112" + }, + { + "url": "http://www.mantisbt.org/bugs/view.php?id=12607", + "refsource": "MISC", + "name": "http://www.mantisbt.org/bugs/view.php?id=12607" + }, + { + "url": "http://www.vupen.com/english/advisories/2011/0002", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0002" + }, + { + "url": "http://openwall.com/lists/oss-security/2010/12/15/5", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/15/5" + }, + { + "url": "http://openwall.com/lists/oss-security/2010/12/16/2", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/16/2" + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4984.php", + "refsource": "MISC", + "name": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4984.php" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663230", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=663230" } ] } diff --git a/2010/4xxx/CVE-2010-4351.json b/2010/4xxx/CVE-2010-4351.json index bd21050d377..53e0eaad639 100644 --- a/2010/4xxx/CVE-2010-4351.json +++ b/2010/4xxx/CVE-2010-4351.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2010-4351 IcedTea jnlp security manager bypass" + "value": "The JNLP SecurityManager in IcedTea (IcedTea.so) 1.7 before 1.7.7, 1.8 before 1.8.4, and 1.9 before 1.9.4 for Java OpenJDK returns from the checkPermission method instead of throwing an exception in certain circumstances, which might allow context-dependent attackers to bypass the intended security policy by creating instances of ClassLoader." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Authentication Bypass by Primary Weakness", - "cweId": "CWE-305" + "value": "n/a" } ] } @@ -32,16 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 5", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "1:1.6.0.0-1.17.b17.el5", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -94,11 +93,6 @@ "refsource": "MISC", "name": "http://www.vupen.com/english/advisories/2011/0215" }, - { - "url": "https://access.redhat.com/errata/RHSA-2011:0176", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2011:0176" - }, { "url": "http://blog.fuseyism.com/index.php/2011/01/18/security-icedtea6-177-184-194-released/", "refsource": "MISC", @@ -160,44 +154,14 @@ "name": "http://www.zerodayinitiative.com/advisories/ZDI-11-014/" }, { - "url": "https://access.redhat.com/security/cve/CVE-2010-4351", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64893", "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2010-4351" + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64893" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663680", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=663680" - }, - { - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64893", - "refsource": "MISC", - "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64893" - } - ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "LOW", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 7.5, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", - "version": "2.0" } ] } diff --git a/2010/4xxx/CVE-2010-4352.json b/2010/4xxx/CVE-2010-4352.json index 22f5881d17e..b1e9599e088 100644 --- a/2010/4xxx/CVE-2010-4352.json +++ b/2010/4xxx/CVE-2010-4352.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-4352", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,117 +27,141 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "ADV-2011-0178", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0178" - }, - { - "name": "[oss-security] 20101216 CVE Request -- D-BUS -- Stack frame overflow by validating message with excessive number of nested variants", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/16/3" - }, - { - "name": "openSUSE-SU-2012:1418", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html" - }, - { - "name": "FEDORA-2010-19166", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052550.html" - }, - { - "name": "http://cgit.freedesktop.org/dbus/dbus/commit/?id=7d65a3a6ed8815e34a99c680ac3869fde49dbbd4", - "refsource": "CONFIRM", - "url": "http://cgit.freedesktop.org/dbus/dbus/commit/?id=7d65a3a6ed8815e34a99c680ac3869fde49dbbd4" - }, - { - "name": "http://www.remlab.net/op/dbus-variant-recursion.shtml", + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705", "refsource": "MISC", - "url": "http://www.remlab.net/op/dbus-variant-recursion.shtml" + "name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705" }, { - "name": "42911", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42911" + "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html" }, { - "name": "[oss-security] 20101221 Re: Re: CVE Request -- D-BUS -- Stack frame overflow by validating message with excessive number of nested variants", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/21/3" + "url": "http://www.vupen.com/english/advisories/2011/0464", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0464" }, { - "name": "42580", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42580" + "url": "http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html" }, { - "name": "42960", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42960" + "url": "http://cgit.freedesktop.org/dbus/dbus/commit/?id=7d65a3a6ed8815e34a99c680ac3869fde49dbbd4", + "refsource": "MISC", + "name": "http://cgit.freedesktop.org/dbus/dbus/commit/?id=7d65a3a6ed8815e34a99c680ac3869fde49dbbd4" }, { - "name": "DSA-2149", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2011/dsa-2149" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052550.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052550.html" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=663673", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663673" + "url": "http://openwall.com/lists/oss-security/2010/12/16/3", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/16/3" }, { - "name": "45377", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/45377" + "url": "http://openwall.com/lists/oss-security/2010/12/16/6", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/16/6" }, { - "name": "SUSE-SR:2011:004", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html" + "url": "http://openwall.com/lists/oss-security/2010/12/21/3", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/21/3" }, { - "name": "USN-1044-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1044-1" + "url": "http://secunia.com/advisories/42580", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42580" }, { - "name": "https://bugs.freedesktop.org/show_bug.cgi?id=32321", - "refsource": "CONFIRM", - "url": "https://bugs.freedesktop.org/show_bug.cgi?id=32321" + "url": "http://secunia.com/advisories/42760", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42760" }, { - "name": "ADV-2011-0464", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0464" + "url": "http://secunia.com/advisories/42911", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42911" }, { - "name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705", - "refsource": "CONFIRM", - "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705" + "url": "http://secunia.com/advisories/42960", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42960" }, { - "name": "ADV-2011-0161", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0161" + "url": "http://www.debian.org/security/2011/dsa-2149", + "refsource": "MISC", + "name": "http://www.debian.org/security/2011/dsa-2149" }, { - "name": "ADV-2010-3325", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/3325" + "url": "http://www.remlab.net/op/dbus-variant-recursion.shtml", + "refsource": "MISC", + "name": "http://www.remlab.net/op/dbus-variant-recursion.shtml" }, { - "name": "42760", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42760" + "url": "http://www.securityfocus.com/bid/45377", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/45377" }, { - "name": "[oss-security] 20101216 Re: CVE Request -- D-BUS -- Stack frame overflow by validating message with excessive number of nested variants", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/16/6" + "url": "http://www.ubuntu.com/usn/USN-1044-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1044-1" + }, + { + "url": "http://www.vupen.com/english/advisories/2010/3325", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/3325" + }, + { + "url": "http://www.vupen.com/english/advisories/2011/0161", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0161" + }, + { + "url": "http://www.vupen.com/english/advisories/2011/0178", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0178" + }, + { + "url": "https://bugs.freedesktop.org/show_bug.cgi?id=32321", + "refsource": "MISC", + "name": "https://bugs.freedesktop.org/show_bug.cgi?id=32321" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663673", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=663673" } ] } diff --git a/2010/4xxx/CVE-2010-4523.json b/2010/4xxx/CVE-2010-4523.json index 1fd1b62702a..73a74ec38af 100644 --- a/2010/4xxx/CVE-2010-4523.json +++ b/2010/4xxx/CVE-2010-4523.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-4523", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,102 +27,126 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://www.h-online.com/open/news/item/When-a-smart-card-can-root-your-computer-1154829.html", + "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html", "refsource": "MISC", - "url": "http://www.h-online.com/open/news/item/When-a-smart-card-can-root-your-computer-1154829.html" + "name": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" }, { - "name": "43068", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/43068" - }, - { - "name": "ADV-2011-0212", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0212" - }, - { - "name": "[oss-security] 20101222 Re: CVE request: opensc buffer overflow", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/22/3" - }, - { - "name": "https://www.opensc-project.org/opensc/changeset/4913", - "refsource": "CONFIRM", - "url": "https://www.opensc-project.org/opensc/changeset/4913" - }, - { - "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607427", - "refsource": "CONFIRM", - "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607427" - }, - { - "name": "MDVSA-2011:011", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:011" - }, - { - "name": "FEDORA-2010-19193", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052777.html" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=664831", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=664831" - }, - { - "name": "42807", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42807" - }, - { - "name": "http://labs.mwrinfosecurity.com/files/Advisories/mwri_opensc-get-serial-buffer-overflow_2010-12-13.pdf", + "url": "http://secunia.com/advisories/43068", "refsource": "MISC", - "url": "http://labs.mwrinfosecurity.com/files/Advisories/mwri_opensc-get-serial-buffer-overflow_2010-12-13.pdf" + "name": "http://secunia.com/advisories/43068" }, { - "name": "SUSE-SR:2011:002", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" + "url": "http://www.vupen.com/english/advisories/2011/0212", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0212" }, { - "name": "ADV-2011-0109", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0109" + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607427", + "refsource": "MISC", + "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607427" }, { - "name": "42658", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42658" + "url": "http://labs.mwrinfosecurity.com/files/Advisories/mwri_opensc-get-serial-buffer-overflow_2010-12-13.pdf", + "refsource": "MISC", + "name": "http://labs.mwrinfosecurity.com/files/Advisories/mwri_opensc-get-serial-buffer-overflow_2010-12-13.pdf" }, { - "name": "ADV-2011-0009", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0009" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052777.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052777.html" }, { - "name": "https://bugs.launchpad.net/ubuntu/+source/opensc/+bug/692483", - "refsource": "CONFIRM", - "url": "https://bugs.launchpad.net/ubuntu/+source/opensc/+bug/692483" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052796.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052796.html" }, { - "name": "FEDORA-2010-19192", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052796.html" + "url": "http://openwall.com/lists/oss-security/2010/12/21/2", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/21/2" }, { - "name": "[oss-security] 20101221 CVE request: opensc buffer overflow", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/21/2" + "url": "http://openwall.com/lists/oss-security/2010/12/22/3", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/22/3" }, { - "name": "45435", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/45435" + "url": "http://secunia.com/advisories/42658", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42658" + }, + { + "url": "http://secunia.com/advisories/42807", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42807" + }, + { + "url": "http://www.h-online.com/open/news/item/When-a-smart-card-can-root-your-computer-1154829.html", + "refsource": "MISC", + "name": "http://www.h-online.com/open/news/item/When-a-smart-card-can-root-your-computer-1154829.html" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:011", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:011" + }, + { + "url": "http://www.securityfocus.com/bid/45435", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/45435" + }, + { + "url": "http://www.vupen.com/english/advisories/2011/0009", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0009" + }, + { + "url": "http://www.vupen.com/english/advisories/2011/0109", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0109" + }, + { + "url": "https://bugs.launchpad.net/ubuntu/+source/opensc/+bug/692483", + "refsource": "MISC", + "name": "https://bugs.launchpad.net/ubuntu/+source/opensc/+bug/692483" + }, + { + "url": "https://www.opensc-project.org/opensc/changeset/4913", + "refsource": "MISC", + "name": "https://www.opensc-project.org/opensc/changeset/4913" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=664831", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=664831" } ] } diff --git a/2010/4xxx/CVE-2010-4524.json b/2010/4xxx/CVE-2010-4524.json index 96d2b156f3c..986ab96966c 100644 --- a/2010/4xxx/CVE-2010-4524.json +++ b/2010/4xxx/CVE-2010-4524.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-4524", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,72 +27,96 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=664718", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=664718" + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607693", + "refsource": "MISC", + "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607693" }, { - "name": "[oss-security] 20101221 Re: CVE Request -- MHonArc: Improper escaping of certain HTML sequences (XSS)", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/22/4" + "url": "http://lists.mandriva.com/security-announce/2011-01/msg00004.php", + "refsource": "MISC", + "name": "http://lists.mandriva.com/security-announce/2011-01/msg00004.php" }, { - "name": "[oss-security] 20101221 Re: CVE Request -- MHonArc: Improper escaping of certain HTML sequences (XSS)", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/22/5" + "url": "http://openwall.com/lists/oss-security/2010/12/21/4", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/21/4" }, { - "name": "ADV-2010-3344", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/3344" + "url": "http://openwall.com/lists/oss-security/2010/12/21/7", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/21/7" }, { - "name": "ADV-2011-0067", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0067" + "url": "http://openwall.com/lists/oss-security/2010/12/22/4", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/22/4" }, { - "name": "45528", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/45528" + "url": "http://openwall.com/lists/oss-security/2010/12/22/5", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/22/5" }, { - "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607693", - "refsource": "CONFIRM", - "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607693" + "url": "http://savannah.nongnu.org/bugs/?32013", + "refsource": "MISC", + "name": "http://savannah.nongnu.org/bugs/?32013" }, { - "name": "42694", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42694" + "url": "http://secunia.com/advisories/42694", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42694" }, { - "name": "http://savannah.nongnu.org/bugs/?32013", - "refsource": "CONFIRM", - "url": "http://savannah.nongnu.org/bugs/?32013" + "url": "http://www.mail-archive.com/mhonarc-dev%40mhonarc.org/msg01296.html", + "refsource": "MISC", + "name": "http://www.mail-archive.com/mhonarc-dev%40mhonarc.org/msg01296.html" }, { - "name": "[oss-security] 20101221 Re: CVE Request -- MHonArc: Improper escaping of certain HTML sequences (XSS)", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/21/7" + "url": "http://www.securityfocus.com/bid/45528", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/45528" }, { - "name": "MDVSA-2011:003", - "refsource": "MANDRIVA", - "url": "http://lists.mandriva.com/security-announce/2011-01/msg00004.php" + "url": "http://www.vupen.com/english/advisories/2010/3344", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/3344" }, { - "name": "[mhonarc-dev] 20101230 [bug #32013] CVE-2010-4524: Improper escaping of certain HTML sequences (XSS)", - "refsource": "MLIST", - "url": "http://www.mail-archive.com/mhonarc-dev@mhonarc.org/msg01296.html" + "url": "http://www.vupen.com/english/advisories/2011/0067", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0067" }, { - "name": "[oss-security] 20101221 CVE Request -- MHonArc: Improper escaping of certain HTML sequences (XSS)", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/21/4" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=664718", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=664718" } ] } diff --git a/2010/4xxx/CVE-2010-4525.json b/2010/4xxx/CVE-2010-4525.json index 6dae58bcddc..04518c558d5 100644 --- a/2010/4xxx/CVE-2010-4525.json +++ b/2010/4xxx/CVE-2010-4525.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-4525", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,62 +27,86 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "kernel-kvmvcpueventsinterrupt-info-disc(64519)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64519" - }, - { - "name": "[oss-security] 20110105 Re: CVE-2010-4525 kvm: x86: zero kvm_vcpu_events->interrupt.pad infoleak", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2011/01/05/9" - }, - { - "name": "RHSA-2011:0007", - "refsource": "REDHAT", - "url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html" - }, - { - "name": "70377", - "refsource": "OSVDB", - "url": "http://osvdb.org/70377" - }, - { - "name": "RHSA-2011:0028", - "refsource": "REDHAT", - "url": "http://www.redhat.com/support/errata/RHSA-2011-0028.html" - }, - { - "name": "45676", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/45676" - }, - { - "name": "[oss-security] 20110105 CVE-2010-4525 kvm: x86: zero kvm_vcpu_events->interrupt.pad infoleak", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2011/01/05/1" - }, - { - "name": "[oss-security] 20110106 Re: CVE-2010-4525 kvm: x86: zero kvm_vcpu_events->interrupt.pad infoleak", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2011/01/06/3" - }, - { - "name": "42890", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42890" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4525", + "url": "http://secunia.com/advisories/42890", "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4525" + "name": "http://secunia.com/advisories/42890" }, { - "name": "ADV-2011-0123", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0123" + "url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html", + "refsource": "MISC", + "name": "http://www.redhat.com/support/errata/RHSA-2011-0007.html" + }, + { + "url": "http://osvdb.org/70377", + "refsource": "MISC", + "name": "http://osvdb.org/70377" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2011/01/05/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2011/01/05/1" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2011/01/05/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2011/01/05/9" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2011/01/06/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2011/01/06/3" + }, + { + "url": "http://www.redhat.com/support/errata/RHSA-2011-0028.html", + "refsource": "MISC", + "name": "http://www.redhat.com/support/errata/RHSA-2011-0028.html" + }, + { + "url": "http://www.securityfocus.com/bid/45676", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/45676" + }, + { + "url": "http://www.vupen.com/english/advisories/2011/0123", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0123" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4525", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4525" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64519", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64519" } ] } diff --git a/2011/4xxx/CVE-2011-4290.json b/2011/4xxx/CVE-2011-4290.json index b86080760fd..d60328962bb 100644 --- a/2011/4xxx/CVE-2011-4290.json +++ b/2011/4xxx/CVE-2011-4290.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-4290", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,22 +27,46 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[oss-security] 20111113 Re: Fwd: DSA 2338-1 moodle security update", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2011/11/14/1" + "url": "http://openwall.com/lists/oss-security/2011/11/14/1", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2011/11/14/1" }, { - "name": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=5a3010310bff0b3946804a72ca2d6bc166a0028f", - "refsource": "CONFIRM", - "url": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=5a3010310bff0b3946804a72ca2d6bc166a0028f" + "url": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=5a3010310bff0b3946804a72ca2d6bc166a0028f", + "refsource": "MISC", + "name": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=5a3010310bff0b3946804a72ca2d6bc166a0028f" }, { - "name": "http://moodle.org/mod/forum/discuss.php?d=175592", - "refsource": "CONFIRM", - "url": "http://moodle.org/mod/forum/discuss.php?d=175592" + "url": "http://moodle.org/mod/forum/discuss.php?d=175592", + "refsource": "MISC", + "name": "http://moodle.org/mod/forum/discuss.php?d=175592" } ] } diff --git a/2011/4xxx/CVE-2011-4300.json b/2011/4xxx/CVE-2011-4300.json index 510170bd80c..22c44dd6cd4 100644 --- a/2011/4xxx/CVE-2011-4300.json +++ b/2011/4xxx/CVE-2011-4300.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-4300", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,22 +27,46 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=f6b07c4da54a9db24723beb147e8a19a3d487e00", - "refsource": "CONFIRM", - "url": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=f6b07c4da54a9db24723beb147e8a19a3d487e00" + "url": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=f6b07c4da54a9db24723beb147e8a19a3d487e00", + "refsource": "MISC", + "name": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=f6b07c4da54a9db24723beb147e8a19a3d487e00" }, { - "name": "http://moodle.org/mod/forum/discuss.php?d=188311", - "refsource": "CONFIRM", - "url": "http://moodle.org/mod/forum/discuss.php?d=188311" + "url": "http://moodle.org/mod/forum/discuss.php?d=188311", + "refsource": "MISC", + "name": "http://moodle.org/mod/forum/discuss.php?d=188311" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=747444", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747444" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747444", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=747444" } ] } diff --git a/2011/4xxx/CVE-2011-4301.json b/2011/4xxx/CVE-2011-4301.json index 98ac6fa540b..ae3240762ba 100644 --- a/2011/4xxx/CVE-2011-4301.json +++ b/2011/4xxx/CVE-2011-4301.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-4301", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,22 +27,46 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://moodle.org/mod/forum/discuss.php?d=188313", - "refsource": "CONFIRM", - "url": "http://moodle.org/mod/forum/discuss.php?d=188313" + "url": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=f1f70bd4dde6cd1ea4bdb8ab28fa3d36a53b89d8", + "refsource": "MISC", + "name": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=f1f70bd4dde6cd1ea4bdb8ab28fa3d36a53b89d8" }, { - "name": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=f1f70bd4dde6cd1ea4bdb8ab28fa3d36a53b89d8", - "refsource": "CONFIRM", - "url": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=f1f70bd4dde6cd1ea4bdb8ab28fa3d36a53b89d8" + "url": "http://moodle.org/mod/forum/discuss.php?d=188313", + "refsource": "MISC", + "name": "http://moodle.org/mod/forum/discuss.php?d=188313" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=747444", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747444" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747444", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=747444" } ] } diff --git a/2011/4xxx/CVE-2011-4308.json b/2011/4xxx/CVE-2011-4308.json index 1acb66f92f8..3d828f65a14 100644 --- a/2011/4xxx/CVE-2011-4308.json +++ b/2011/4xxx/CVE-2011-4308.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-4308", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://git.moodle.org/gw?p=moodle.git&a=search&s=MDL-28615", - "refsource": "CONFIRM", - "url": "http://git.moodle.org/gw?p=moodle.git&a=search&s=MDL-28615" + "url": "http://www.debian.org/security/2012/dsa-2421", + "refsource": "MISC", + "name": "http://www.debian.org/security/2012/dsa-2421" }, { - "name": "http://moodle.org/mod/forum/discuss.php?d=188322", - "refsource": "CONFIRM", - "url": "http://moodle.org/mod/forum/discuss.php?d=188322" + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&s=MDL-28615", + "refsource": "MISC", + "name": "http://git.moodle.org/gw?p=moodle.git&a=search&s=MDL-28615" }, { - "name": "DSA-2421", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2012/dsa-2421" + "url": "http://moodle.org/mod/forum/discuss.php?d=188322", + "refsource": "MISC", + "name": "http://moodle.org/mod/forum/discuss.php?d=188322" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=747444", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747444" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747444", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=747444" } ] } diff --git a/2011/4xxx/CVE-2011-4309.json b/2011/4xxx/CVE-2011-4309.json index 594657ccd15..4d1876e3f1d 100644 --- a/2011/4xxx/CVE-2011-4309.json +++ b/2011/4xxx/CVE-2011-4309.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-4309", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,22 +27,46 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://moodle.org/mod/forum/discuss.php?d=188323", - "refsource": "CONFIRM", - "url": "http://moodle.org/mod/forum/discuss.php?d=188323" + "url": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=5eb1cec34f013fdcb559b66bc401f2845ce0bbb7", + "refsource": "MISC", + "name": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=5eb1cec34f013fdcb559b66bc401f2845ce0bbb7" }, { - "name": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=5eb1cec34f013fdcb559b66bc401f2845ce0bbb7", - "refsource": "CONFIRM", - "url": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=5eb1cec34f013fdcb559b66bc401f2845ce0bbb7" + "url": "http://moodle.org/mod/forum/discuss.php?d=188323", + "refsource": "MISC", + "name": "http://moodle.org/mod/forum/discuss.php?d=188323" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=747444", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747444" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747444", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=747444" } ] } diff --git a/2011/4xxx/CVE-2011-4318.json b/2011/4xxx/CVE-2011-4318.json index 5476513be39..75e67497834 100644 --- a/2011/4xxx/CVE-2011-4318.json +++ b/2011/4xxx/CVE-2011-4318.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-4318", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,52 +27,76 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "46886", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/46886" - }, - { - "name": "RHSA-2013:0520", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0520.html" - }, - { - "name": "https://bugs.gentoo.org/show_bug.cgi?id=390887", + "url": "http://hg.dovecot.org/dovecot-2.0/rev/5e9eaf63a6b1", "refsource": "MISC", - "url": "https://bugs.gentoo.org/show_bug.cgi?id=390887" + "name": "http://hg.dovecot.org/dovecot-2.0/rev/5e9eaf63a6b1" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=754980", + "url": "http://rhn.redhat.com/errata/RHSA-2013-0520.html", "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=754980" + "name": "http://rhn.redhat.com/errata/RHSA-2013-0520.html" }, { - "name": "52311", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/52311" + "url": "http://secunia.com/advisories/46886", + "refsource": "MISC", + "name": "http://secunia.com/advisories/46886" }, { - "name": "http://hg.dovecot.org/dovecot-2.0/rev/5e9eaf63a6b1", - "refsource": "CONFIRM", - "url": "http://hg.dovecot.org/dovecot-2.0/rev/5e9eaf63a6b1" + "url": "http://secunia.com/advisories/52311", + "refsource": "MISC", + "name": "http://secunia.com/advisories/52311" }, { - "name": "[dovecot-news] 20111117 v2.0.16 released", - "refsource": "MLIST", - "url": "http://www.dovecot.org/list/dovecot-news/2011-November/000200.html" + "url": "http://www.dovecot.org/list/dovecot-news/2011-November/000200.html", + "refsource": "MISC", + "name": "http://www.dovecot.org/list/dovecot-news/2011-November/000200.html" }, { - "name": "[oss-security] 20111118 Re: CVE Request -- Dovecot -- Validate certificate's CN against requested remote server hostname when proxying", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2011/11/18/7" + "url": "http://www.openwall.com/lists/oss-security/2011/11/18/5", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2011/11/18/5" }, { - "name": "[oss-security] 20111118 Re: CVE Request -- Dovecot -- Validate certificate's CN against requested remote server hostname when proxying", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2011/11/18/5" + "url": "http://www.openwall.com/lists/oss-security/2011/11/18/7", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2011/11/18/7" + }, + { + "url": "https://bugs.gentoo.org/show_bug.cgi?id=390887", + "refsource": "MISC", + "name": "https://bugs.gentoo.org/show_bug.cgi?id=390887" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=754980", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=754980" } ] } diff --git a/2011/4xxx/CVE-2011-4320.json b/2011/4xxx/CVE-2011-4320.json index 2ffcf473606..b59607372a8 100644 --- a/2011/4xxx/CVE-2011-4320.json +++ b/2011/4xxx/CVE-2011-4320.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-4320", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,37 +27,61 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "46915", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/46915" + "url": "http://secunia.com/advisories/46915", + "refsource": "MISC", + "name": "http://secunia.com/advisories/46915" }, { - "name": "[oss-security] 20111119 CVE request: ejabberd before 2.1.9", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2011/11/19/1" + "url": "http://www.openwall.com/lists/oss-security/2011/11/19/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2011/11/19/1" }, { - "name": "77302", - "refsource": "OSVDB", - "url": "http://www.osvdb.org/77302" + "url": "http://www.openwall.com/lists/oss-security/2011/11/19/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2011/11/19/2" }, { - "name": "https://support.process-one.net/browse/EJAB-1498", - "refsource": "CONFIRM", - "url": "https://support.process-one.net/browse/EJAB-1498" + "url": "http://www.osvdb.org/77302", + "refsource": "MISC", + "name": "http://www.osvdb.org/77302" }, { - "name": "[oss-security] 20111119 Re: CVE request: ejabberd before 2.1.9", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2011/11/19/2" + "url": "http://www.process-one.net/en/ejabberd/release_notes/release_note_ejabberd_2.1.9", + "refsource": "MISC", + "name": "http://www.process-one.net/en/ejabberd/release_notes/release_note_ejabberd_2.1.9" }, { - "name": "http://www.process-one.net/en/ejabberd/release_notes/release_note_ejabberd_2.1.9", - "refsource": "CONFIRM", - "url": "http://www.process-one.net/en/ejabberd/release_notes/release_note_ejabberd_2.1.9" + "url": "https://support.process-one.net/browse/EJAB-1498", + "refsource": "MISC", + "name": "https://support.process-one.net/browse/EJAB-1498" } ] } diff --git a/2011/4xxx/CVE-2011-4328.json b/2011/4xxx/CVE-2011-4328.json index 33a7e6cf2ee..d294ea53072 100644 --- a/2011/4xxx/CVE-2011-4328.json +++ b/2011/4xxx/CVE-2011-4328.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-4328", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,67 +27,91 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[oss-security] 20111121 Re: CVE Request (minor) -- gnash -- Unsafe management of HTTP cookies", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2011/11/21/12" - }, - { - "name": "openSUSE-SU-2012:0330", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2012-03/msg00003.html" - }, - { - "name": "http://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55", - "refsource": "CONFIRM", - "url": "http://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55" - }, - { - "name": "[oss-security] 20111121 CVE Request (minor) -- gnash -- Unsafe management of HTTP cookies", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2011/11/21/7" - }, - { - "name": "48325", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/48325" - }, - { - "name": "50747", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/50747" - }, - { - "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649384", + "url": "http://secunia.com/advisories/48466", "refsource": "MISC", - "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649384" + "name": "http://secunia.com/advisories/48466" }, { - "name": "openSUSE-SU-2012:0369", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2012-03/msg00026.html" - }, - { - "name": "DSA-2435", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2012/dsa-2435" - }, - { - "name": "77243", - "refsource": "OSVDB", - "url": "http://www.osvdb.org/77243" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=755518", + "url": "http://www.debian.org/security/2012/dsa-2435", "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=755518" + "name": "http://www.debian.org/security/2012/dsa-2435" }, { - "name": "48466", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/48466" + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649384", + "refsource": "MISC", + "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649384" + }, + { + "url": "http://git.savannah.gnu.org/gitweb/?p=gnash.git%3Ba=commitdiff%3Bh=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55", + "refsource": "MISC", + "name": "http://git.savannah.gnu.org/gitweb/?p=gnash.git%3Ba=commitdiff%3Bh=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-03/msg00003.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2012-03/msg00003.html" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-03/msg00026.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2012-03/msg00026.html" + }, + { + "url": "http://secunia.com/advisories/48325", + "refsource": "MISC", + "name": "http://secunia.com/advisories/48325" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2011/11/21/12", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2011/11/21/12" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2011/11/21/7", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2011/11/21/7" + }, + { + "url": "http://www.osvdb.org/77243", + "refsource": "MISC", + "name": "http://www.osvdb.org/77243" + }, + { + "url": "http://www.securityfocus.com/bid/50747", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/50747" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=755518", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=755518" } ] } diff --git a/2011/4xxx/CVE-2011-4330.json b/2011/4xxx/CVE-2011-4330.json index 3e2592a20a4..f0ff123903f 100644 --- a/2011/4xxx/CVE-2011-4330.json +++ b/2011/4xxx/CVE-2011-4330.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-4330", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,37 +27,61 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[oss-security] 20111121 Re: kernel: hfs: add sanity check for file name length", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2011/11/21/14" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=bc5b8a9003132ae44559edd63a1623", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=bc5b8a9003132ae44559edd63a1623" }, { - "name": "50750", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/50750" + "url": "http://www.openwall.com/lists/oss-security/2011/11/21/14", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2011/11/21/14" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=755431", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=755431" + "url": "http://www.openwall.com/lists/oss-security/2011/11/21/5", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2011/11/21/5" }, { - "name": "[oss-security] 20111121 kernel: hfs: add sanity check for file name length", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2011/11/21/5" + "url": "http://www.securityfocus.com/bid/50750", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/50750" }, { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=bc5b8a9003132ae44559edd63a1623", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=bc5b8a9003132ae44559edd63a1623" + "url": "https://lkml.org/lkml/2011/11/9/303", + "refsource": "MISC", + "name": "https://lkml.org/lkml/2011/11/9/303" }, { - "name": "[linux-kernel] 20111109 [BUG][SECURITY] Kernel stack overflow in hfs_mac2asc()", - "refsource": "MLIST", - "url": "https://lkml.org/lkml/2011/11/9/303" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=755431", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=755431" } ] } diff --git a/2011/4xxx/CVE-2011-4339.json b/2011/4xxx/CVE-2011-4339.json index caac71b4a7a..d6889155914 100644 --- a/2011/4xxx/CVE-2011-4339.json +++ b/2011/4xxx/CVE-2011-4339.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-4339", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,82 +27,106 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", - "refsource": "CONFIRM", - "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "refsource": "MISC", + "name": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf" }, { - "name": "MDVSA-2011:196", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:196" + "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", + "refsource": "MISC", + "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { - "name": "47228", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/47228" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071575.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071575.html" }, { - "name": "47376", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/47376" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071580.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071580.html" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=742837", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=742837" + "url": "http://openwall.com/lists/oss-security/2011/12/13/1", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2011/12/13/1" }, { - "name": "impitool-pid-dos(71763)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71763" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0123.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0123.html" }, { - "name": "51036", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/51036" + "url": "http://secunia.com/advisories/47173", + "refsource": "MISC", + "name": "http://secunia.com/advisories/47173" }, { - "name": "DSA-2376", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2011/dsa-2376" + "url": "http://secunia.com/advisories/47228", + "refsource": "MISC", + "name": "http://secunia.com/advisories/47228" }, { - "name": "RHSA-2011:1814", - "refsource": "REDHAT", - "url": "http://www.redhat.com/support/errata/RHSA-2011-1814.html" + "url": "http://secunia.com/advisories/47376", + "refsource": "MISC", + "name": "http://secunia.com/advisories/47376" }, { - "name": "FEDORA-2011-17071", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071575.html" + "url": "http://www.debian.org/security/2011/dsa-2376", + "refsource": "MISC", + "name": "http://www.debian.org/security/2011/dsa-2376" }, { - "name": "[oss-security] 20111213 OpenIPMI: IPMI event daemon creates PID file with world writeable permissions", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2011/12/13/1" + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:196", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:196" }, { - "name": "47173", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/47173" + "url": "http://www.redhat.com/support/errata/RHSA-2011-1814.html", + "refsource": "MISC", + "name": "http://www.redhat.com/support/errata/RHSA-2011-1814.html" }, { - "name": "FEDORA-2011-17065", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071580.html" + "url": "http://www.securityfocus.com/bid/51036", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/51036" }, { - "name": "RHSA-2013:0123", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0123.html" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71763", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71763" }, { - "name": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", - "refsource": "CONFIRM", - "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=742837", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=742837" } ] } diff --git a/2012/3xxx/CVE-2012-3408.json b/2012/3xxx/CVE-2012-3408.json index e4e97b7ce58..61d39ea0fdb 100644 --- a/2012/3xxx/CVE-2012-3408.json +++ b/2012/3xxx/CVE-2012-3408.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3408", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,22 +27,46 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=839166", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=839166" + "url": "http://puppetlabs.com/security/cve/cve-2012-3408/", + "refsource": "MISC", + "name": "http://puppetlabs.com/security/cve/cve-2012-3408/" }, { - "name": "http://puppetlabs.com/security/cve/cve-2012-3408/", - "refsource": "CONFIRM", - "url": "http://puppetlabs.com/security/cve/cve-2012-3408/" + "url": "https://github.com/puppetlabs/puppet/commit/ab9150baa1b738467a33b01df1d90e076253fbbd", + "refsource": "MISC", + "name": "https://github.com/puppetlabs/puppet/commit/ab9150baa1b738467a33b01df1d90e076253fbbd" }, { - "name": "https://github.com/puppetlabs/puppet/commit/ab9150baa1b738467a33b01df1d90e076253fbbd", - "refsource": "CONFIRM", - "url": "https://github.com/puppetlabs/puppet/commit/ab9150baa1b738467a33b01df1d90e076253fbbd" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=839166", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=839166" } ] } diff --git a/2012/3xxx/CVE-2012-3410.json b/2012/3xxx/CVE-2012-3410.json index 52107d0fe3d..bf1cfbd1b2b 100644 --- a/2012/3xxx/CVE-2012-3410.json +++ b/2012/3xxx/CVE-2012-3410.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3410", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,62 +27,86 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[oss-security] 20120712 Re: CVE Request: Overflow fix in bash 4.2 patch 33", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/07/11/22" - }, - { - "name": "MDVSA-2012:128", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:128" - }, - { - "name": "bash-devfd-bo(77551)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77551" - }, - { - "name": "openSUSE-SU-2012:0898", - "refsource": "SUSE", - "url": "https://hermes.opensuse.org/messages/15227834" - }, - { - "name": "51086", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51086" - }, - { - "name": "[oss-security] 20120711 CVE Request: Overflow fix in bash 4.2 patch 33", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/07/11/11" - }, - { - "name": "54937", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/54937" - }, - { - "name": "GLSA-201210-05", - "refsource": "GENTOO", - "url": "http://security.gentoo.org/glsa/glsa-201210-05.xml" - }, - { - "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681278", + "url": "ftp://ftp.gnu.org/pub/gnu/bash/bash-4.2-patches/bash42-033", "refsource": "MISC", - "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681278" + "name": "ftp://ftp.gnu.org/pub/gnu/bash/bash-4.2-patches/bash42-033" }, { - "name": "ftp://ftp.gnu.org/pub/gnu/bash/bash-4.2-patches/bash42-033", - "refsource": "CONFIRM", - "url": "ftp://ftp.gnu.org/pub/gnu/bash/bash-4.2-patches/bash42-033" + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681278", + "refsource": "MISC", + "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681278" }, { - "name": "[oss-security] 20120712 Re: CVE Request: Overflow fix in bash 4.2 patch 33", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/07/12/4" + "url": "http://secunia.com/advisories/51086", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51086" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201210-05.xml", + "refsource": "MISC", + "name": "http://security.gentoo.org/glsa/glsa-201210-05.xml" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:128", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:128" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/11/11", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/07/11/11" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/11/22", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/07/11/22" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/12/4", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/07/12/4" + }, + { + "url": "http://www.securityfocus.com/bid/54937", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/54937" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77551", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77551" + }, + { + "url": "https://hermes.opensuse.org/messages/15227834", + "refsource": "MISC", + "name": "https://hermes.opensuse.org/messages/15227834" } ] } diff --git a/2012/3xxx/CVE-2012-3416.json b/2012/3xxx/CVE-2012-3416.json index ec2a8ee2bfa..6c2e0d382ab 100644 --- a/2012/3xxx/CVE-2012-3416.json +++ b/2012/3xxx/CVE-2012-3416.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2012-3416 condor: host based authentication does not implement forward-confirmed reverse dns" + "value": "Condor before 7.8.2 allows remote attackers to bypass host-based authentication and execute actions such as ALLOW_ADMINISTRATOR or ALLOW_WRITE by connecting from a system with a spoofed reverse DNS hostname." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Access Control", - "cweId": "CWE-284" + "value": "n/a" } ] } @@ -32,27 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "MRG for RHEL-5 v. 2", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:7.6.5-0.14.2.el5", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise MRG 2", - "version": { - "version_data": [ - { - "version_value": "0:7.6.5-0.14.2.el6_3", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -105,56 +93,11 @@ "refsource": "MISC", "name": "http://www.securitytracker.com/id?1027395" }, - { - "url": "https://access.redhat.com/errata/RHSA-2012:1168", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2012:1168" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2012:1169", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2012:1169" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2012-3416", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2012-3416" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841175", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=841175" - }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77748", "refsource": "MISC", "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77748" } ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "LOW", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 7.5, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", - "version": "2.0" - } - ] } } \ No newline at end of file diff --git a/2012/3xxx/CVE-2012-3417.json b/2012/3xxx/CVE-2012-3417.json index be7ff1632ed..4457e704bb5 100644 --- a/2012/3xxx/CVE-2012-3417.json +++ b/2012/3xxx/CVE-2012-3417.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3417", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,47 +27,71 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "openSUSE-SU-2012:1058", - "refsource": "SUSE", - "url": "https://hermes.opensuse.org/messages/15509723" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=566717", + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705", "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=566717" + "name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705" }, { - "name": "[oss-security] 20120719 CVE Request: quota: incorrect use of tcp_wrappers", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/07/19/2" + "url": "http://www.openwall.com/lists/oss-security/2012/07/19/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/07/19/2" }, { - "name": "RHSA-2013:0120", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0120.html" + "url": "http://www.openwall.com/lists/oss-security/2012/07/19/5", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/07/19/5" }, { - "name": "[oss-security] 20120719 Re: CVE Request: quota: incorrect use of tcp_wrappers", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/07/19/5" + "url": "http://linuxquota.git.sourceforge.net/git/gitweb.cgi?p=linuxquota/linuxquota%3Ba=commitdiff%3Bh=0abbfe92536fa5854eb65572de0cf131f80e2387", + "refsource": "MISC", + "name": "http://linuxquota.git.sourceforge.net/git/gitweb.cgi?p=linuxquota/linuxquota%3Ba=commitdiff%3Bh=0abbfe92536fa5854eb65572de0cf131f80e2387" }, { - "name": "http://linuxquota.git.sourceforge.net/git/gitweb.cgi?p=linuxquota/linuxquota;a=commitdiff;h=0abbfe92536fa5854eb65572de0cf131f80e2387", - "refsource": "CONFIRM", - "url": "http://linuxquota.git.sourceforge.net/git/gitweb.cgi?p=linuxquota/linuxquota;a=commitdiff;h=0abbfe92536fa5854eb65572de0cf131f80e2387" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0120.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0120.html" }, { - "name": "http://sourceforge.net/tracker/?func=detail&aid=2743481&group_id=18136&atid=118136", - "refsource": "CONFIRM", - "url": "http://sourceforge.net/tracker/?func=detail&aid=2743481&group_id=18136&atid=118136" + "url": "http://sourceforge.net/tracker/?func=detail&aid=2743481&group_id=18136&atid=118136", + "refsource": "MISC", + "name": "http://sourceforge.net/tracker/?func=detail&aid=2743481&group_id=18136&atid=118136" }, { - "name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705", - "refsource": "CONFIRM", - "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705" + "url": "https://hermes.opensuse.org/messages/15509723", + "refsource": "MISC", + "name": "https://hermes.opensuse.org/messages/15509723" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=566717", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=566717" } ] } diff --git a/2012/3xxx/CVE-2012-3426.json b/2012/3xxx/CVE-2012-3426.json index 8259f193eb1..4f31a799903 100644 --- a/2012/3xxx/CVE-2012-3426.json +++ b/2012/3xxx/CVE-2012-3426.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3426", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,77 +27,101 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://github.com/openstack/keystone/commit/d9600434da14976463a0bd03abd8e0309f0db454", - "refsource": "CONFIRM", - "url": "http://github.com/openstack/keystone/commit/d9600434da14976463a0bd03abd8e0309f0db454" + "url": "http://github.com/openstack/keystone/commit/29e74e73a6e51cffc0371b32354558391826a4aa", + "refsource": "MISC", + "name": "http://github.com/openstack/keystone/commit/29e74e73a6e51cffc0371b32354558391826a4aa" }, { - "name": "http://github.com/openstack/keystone/commit/29e74e73a6e51cffc0371b32354558391826a4aa", - "refsource": "CONFIRM", - "url": "http://github.com/openstack/keystone/commit/29e74e73a6e51cffc0371b32354558391826a4aa" + "url": "http://github.com/openstack/keystone/commit/375838cfceb88cacc312ff6564e64eb18ee6a355", + "refsource": "MISC", + "name": "http://github.com/openstack/keystone/commit/375838cfceb88cacc312ff6564e64eb18ee6a355" }, { - "name": "https://bugs.launchpad.net/keystone/+bug/998185", - "refsource": "CONFIRM", - "url": "https://bugs.launchpad.net/keystone/+bug/998185" + "url": "http://github.com/openstack/keystone/commit/628149b3dc6b58b91fd08e6ca8d91c728ccb8626", + "refsource": "MISC", + "name": "http://github.com/openstack/keystone/commit/628149b3dc6b58b91fd08e6ca8d91c728ccb8626" }, { - "name": "https://bugs.launchpad.net/keystone/+bug/997194", - "refsource": "CONFIRM", - "url": "https://bugs.launchpad.net/keystone/+bug/997194" + "url": "http://github.com/openstack/keystone/commit/a67b24878a6156eab17b9098fa649f0279256f5d", + "refsource": "MISC", + "name": "http://github.com/openstack/keystone/commit/a67b24878a6156eab17b9098fa649f0279256f5d" }, { - "name": "https://launchpad.net/keystone/essex/2012.1.1/+download/keystone-2012.1.1.tar.gz", - "refsource": "CONFIRM", - "url": "https://launchpad.net/keystone/essex/2012.1.1/+download/keystone-2012.1.1.tar.gz" + "url": "http://github.com/openstack/keystone/commit/d9600434da14976463a0bd03abd8e0309f0db454", + "refsource": "MISC", + "name": "http://github.com/openstack/keystone/commit/d9600434da14976463a0bd03abd8e0309f0db454" }, { - "name": "50494", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/50494" + "url": "http://github.com/openstack/keystone/commit/ea03d05ed5de0c015042876100d37a6a14bf56de", + "refsource": "MISC", + "name": "http://github.com/openstack/keystone/commit/ea03d05ed5de0c015042876100d37a6a14bf56de" }, { - "name": "http://github.com/openstack/keystone/commit/ea03d05ed5de0c015042876100d37a6a14bf56de", - "refsource": "CONFIRM", - "url": "http://github.com/openstack/keystone/commit/ea03d05ed5de0c015042876100d37a6a14bf56de" + "url": "http://secunia.com/advisories/50045", + "refsource": "MISC", + "name": "http://secunia.com/advisories/50045" }, { - "name": "https://bugs.launchpad.net/keystone/+bug/996595", - "refsource": "CONFIRM", - "url": "https://bugs.launchpad.net/keystone/+bug/996595" + "url": "http://secunia.com/advisories/50494", + "refsource": "MISC", + "name": "http://secunia.com/advisories/50494" }, { - "name": "[oss-security] 20120727 [OSSA 2012-010] Various Keystone token expiration issues (CVE-2012-3426)", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/07/27/4" + "url": "http://www.openwall.com/lists/oss-security/2012/07/27/4", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/07/27/4" }, { - "name": "http://github.com/openstack/keystone/commit/628149b3dc6b58b91fd08e6ca8d91c728ccb8626", - "refsource": "CONFIRM", - "url": "http://github.com/openstack/keystone/commit/628149b3dc6b58b91fd08e6ca8d91c728ccb8626" + "url": "http://www.ubuntu.com/usn/USN-1552-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1552-1" }, { - "name": "USN-1552-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1552-1" + "url": "https://bugs.launchpad.net/keystone/+bug/996595", + "refsource": "MISC", + "name": "https://bugs.launchpad.net/keystone/+bug/996595" }, { - "name": "http://github.com/openstack/keystone/commit/375838cfceb88cacc312ff6564e64eb18ee6a355", - "refsource": "CONFIRM", - "url": "http://github.com/openstack/keystone/commit/375838cfceb88cacc312ff6564e64eb18ee6a355" + "url": "https://bugs.launchpad.net/keystone/+bug/997194", + "refsource": "MISC", + "name": "https://bugs.launchpad.net/keystone/+bug/997194" }, { - "name": "http://github.com/openstack/keystone/commit/a67b24878a6156eab17b9098fa649f0279256f5d", - "refsource": "CONFIRM", - "url": "http://github.com/openstack/keystone/commit/a67b24878a6156eab17b9098fa649f0279256f5d" + "url": "https://bugs.launchpad.net/keystone/+bug/998185", + "refsource": "MISC", + "name": "https://bugs.launchpad.net/keystone/+bug/998185" }, { - "name": "50045", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/50045" + "url": "https://launchpad.net/keystone/essex/2012.1.1/+download/keystone-2012.1.1.tar.gz", + "refsource": "MISC", + "name": "https://launchpad.net/keystone/essex/2012.1.1/+download/keystone-2012.1.1.tar.gz" } ] } diff --git a/2012/3xxx/CVE-2012-3427.json b/2012/3xxx/CVE-2012-3427.json index d17259386bb..20f599ddcfb 100644 --- a/2012/3xxx/CVE-2012-3427.json +++ b/2012/3xxx/CVE-2012-3427.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3427", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,32 +27,56 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "RHSA-2012:1376", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2012-1376.html" + "url": "http://rhn.redhat.com/errata/RHSA-2012-1376.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2012-1376.html" }, { - "name": "55945", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/55945" + "url": "http://secunia.com/advisories/51016", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51016" }, { - "name": "51016", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51016" + "url": "http://www.osvdb.org/86409", + "refsource": "MISC", + "name": "http://www.osvdb.org/86409" }, { - "name": "jbosseap-info-disc(79398)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79398" + "url": "http://www.securityfocus.com/bid/55945", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/55945" }, { - "name": "86409", - "refsource": "OSVDB", - "url": "http://www.osvdb.org/86409" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79398", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79398" } ] } diff --git a/2012/3xxx/CVE-2012-3428.json b/2012/3xxx/CVE-2012-3428.json index 8b4ac1b47ae..faa94c25140 100644 --- a/2012/3xxx/CVE-2012-3428.json +++ b/2012/3xxx/CVE-2012-3428.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3428", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,47 +27,71 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://issues.jboss.org/browse/JBPAPP-9584", + "url": "http://rhn.redhat.com/errata/RHSA-2012-1591.html", "refsource": "MISC", - "url": "https://issues.jboss.org/browse/JBPAPP-9584" + "name": "http://rhn.redhat.com/errata/RHSA-2012-1591.html" }, { - "name": "RHSA-2012:1594", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2012-1594.html" + "url": "http://rhn.redhat.com/errata/RHSA-2012-1592.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2012-1592.html" }, { - "name": "https://issues.jboss.org/browse/JBJCA-864", - "refsource": "CONFIRM", - "url": "https://issues.jboss.org/browse/JBJCA-864" + "url": "http://rhn.redhat.com/errata/RHSA-2012-1594.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2012-1594.html" }, { - "name": "51607", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51607" + "url": "http://secunia.com/advisories/51607", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51607" }, { - "name": "https://issues.jboss.org/secure/ReleaseNote.jspa?projectId=12310691&version=12319522", - "refsource": "CONFIRM", - "url": "https://issues.jboss.org/secure/ReleaseNote.jspa?projectId=12310691&version=12319522" + "url": "https://issues.jboss.org/browse/JBJCA-864", + "refsource": "MISC", + "name": "https://issues.jboss.org/browse/JBJCA-864" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=843358", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843358" + "url": "https://issues.jboss.org/browse/JBPAPP-9584", + "refsource": "MISC", + "name": "https://issues.jboss.org/browse/JBPAPP-9584" }, { - "name": "RHSA-2012:1592", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2012-1592.html" + "url": "https://issues.jboss.org/secure/ReleaseNote.jspa?projectId=12310691&version=12319522", + "refsource": "MISC", + "name": "https://issues.jboss.org/secure/ReleaseNote.jspa?projectId=12310691&version=12319522" }, { - "name": "RHSA-2012:1591", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2012-1591.html" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843358", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=843358" } ] } diff --git a/2012/3xxx/CVE-2012-3430.json b/2012/3xxx/CVE-2012-3430.json index b665f93404a..c021d71d795 100644 --- a/2012/3xxx/CVE-2012-3430.json +++ b/2012/3xxx/CVE-2012-3430.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3430", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,97 +27,121 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "USN-1572-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1572-1" + "url": "http://secunia.com/advisories/50633", + "refsource": "MISC", + "name": "http://secunia.com/advisories/50633" }, { - "name": "USN-1579-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1579-1" + "url": "http://www.ubuntu.com/usn/USN-1567-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1567-1" }, { - "name": "USN-1578-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1578-1" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=06b6a1cf6e776426766298d055bb3991957d90a7", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=06b6a1cf6e776426766298d055bb3991957d90a7" }, { - "name": "50732", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/50732" + "url": "http://rhn.redhat.com/errata/RHSA-2012-1323.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2012-1323.html" }, { - "name": "50811", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/50811" + "url": "http://secunia.com/advisories/50732", + "refsource": "MISC", + "name": "http://secunia.com/advisories/50732" }, { - "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.0.44", - "refsource": "CONFIRM", - "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.0.44" + "url": "http://secunia.com/advisories/50811", + "refsource": "MISC", + "name": "http://secunia.com/advisories/50811" }, { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=06b6a1cf6e776426766298d055bb3991957d90a7", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=06b6a1cf6e776426766298d055bb3991957d90a7" + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.0.44", + "refsource": "MISC", + "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.0.44" }, { - "name": "USN-1567-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1567-1" + "url": "http://www.openwall.com/lists/oss-security/2012/07/26/5", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/07/26/5" }, { - "name": "RHSA-2012:1323", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2012-1323.html" + "url": "http://www.ubuntu.com/usn/USN-1568-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1568-1" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=820039", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820039" + "url": "http://www.ubuntu.com/usn/USN-1572-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1572-1" }, { - "name": "USN-1577-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1577-1" + "url": "http://www.ubuntu.com/usn/USN-1575-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1575-1" }, { - "name": "SUSE-SU-2012:1679", - "refsource": "SUSE", - "url": "https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html" + "url": "http://www.ubuntu.com/usn/USN-1577-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1577-1" }, { - "name": "USN-1568-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1568-1" + "url": "http://www.ubuntu.com/usn/USN-1578-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1578-1" }, { - "name": "USN-1575-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1575-1" + "url": "http://www.ubuntu.com/usn/USN-1579-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1579-1" }, { - "name": "https://github.com/torvalds/linux/commit/06b6a1cf6e776426766298d055bb3991957d90a7", - "refsource": "CONFIRM", - "url": "https://github.com/torvalds/linux/commit/06b6a1cf6e776426766298d055bb3991957d90a7" + "url": "http://www.ubuntu.com/usn/USN-1580-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1580-1" }, { - "name": "50633", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/50633" + "url": "https://github.com/torvalds/linux/commit/06b6a1cf6e776426766298d055bb3991957d90a7", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/06b6a1cf6e776426766298d055bb3991957d90a7" }, { - "name": "USN-1580-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1580-1" + "url": "https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html", + "refsource": "MISC", + "name": "https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html" }, { - "name": "[oss-security] 20120726 Re: CVE Request -- kernel: recv{from,msg}() on an rds socket can leak kernel memory", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/07/26/5" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820039", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=820039" } ] } diff --git a/2012/3xxx/CVE-2012-3435.json b/2012/3xxx/CVE-2012-3435.json index f17038710e3..f7bf92519d7 100644 --- a/2012/3xxx/CVE-2012-3435.json +++ b/2012/3xxx/CVE-2012-3435.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3435", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,62 +27,86 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "20087", - "refsource": "EXPLOIT-DB", - "url": "http://www.exploit-db.com/exploits/20087" + "url": "http://git.zabbixzone.com/zabbix2.0/.git/commitdiff/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54", + "refsource": "MISC", + "name": "http://git.zabbixzone.com/zabbix2.0/.git/commitdiff/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54" }, { - "name": "50475", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/50475" + "url": "http://osvdb.org/84127", + "refsource": "MISC", + "name": "http://osvdb.org/84127" }, { - "name": "http://git.zabbixzone.com/zabbix2.0/.git/commitdiff/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54", - "refsource": "CONFIRM", - "url": "http://git.zabbixzone.com/zabbix2.0/.git/commitdiff/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54" + "url": "http://secunia.com/advisories/49809", + "refsource": "MISC", + "name": "http://secunia.com/advisories/49809" }, { - "name": "DSA-2539", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2012/dsa-2539" + "url": "http://secunia.com/advisories/50475", + "refsource": "MISC", + "name": "http://secunia.com/advisories/50475" }, { - "name": "https://support.zabbix.com/browse/ZBX-5348", - "refsource": "CONFIRM", - "url": "https://support.zabbix.com/browse/ZBX-5348" + "url": "http://www.debian.org/security/2012/dsa-2539", + "refsource": "MISC", + "name": "http://www.debian.org/security/2012/dsa-2539" }, { - "name": "49809", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/49809" + "url": "http://www.exploit-db.com/exploits/20087", + "refsource": "MISC", + "name": "http://www.exploit-db.com/exploits/20087" }, { - "name": "[oss-security] 20120727 Zabbix SQL injection flaw (CVE request)", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/07/27/6" + "url": "http://www.openwall.com/lists/oss-security/2012/07/27/6", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/07/27/6" }, { - "name": "54661", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/54661" + "url": "http://www.openwall.com/lists/oss-security/2012/07/28/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/07/28/3" }, { - "name": "84127", - "refsource": "OSVDB", - "url": "http://osvdb.org/84127" + "url": "http://www.securityfocus.com/bid/54661", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/54661" }, { - "name": "[oss-security] 20120728 Re: Zabbix SQL injection flaw (CVE request)", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/07/28/3" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77195", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77195" }, { - "name": "zabbix-popupbitem-sql-injection(77195)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77195" + "url": "https://support.zabbix.com/browse/ZBX-5348", + "refsource": "MISC", + "name": "https://support.zabbix.com/browse/ZBX-5348" } ] } diff --git a/2012/3xxx/CVE-2012-3436.json b/2012/3xxx/CVE-2012-3436.json index 3c4ef097156..722a353f4a5 100644 --- a/2012/3xxx/CVE-2012-3436.json +++ b/2012/3xxx/CVE-2012-3436.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3436", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,62 +27,86 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "50042", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/50042" + "url": "http://bugs.openttd.org/task/5254", + "refsource": "MISC", + "name": "http://bugs.openttd.org/task/5254" }, { - "name": "http://security.openttd.org/en/CVE-2012-3436", - "refsource": "CONFIRM", - "url": "http://security.openttd.org/en/CVE-2012-3436" + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00043.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00043.html" }, { - "name": "[oss-security] 20120728 Re: CVE request for OpenTTD", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/07/28/7" + "url": "http://secunia.com/advisories/50042", + "refsource": "MISC", + "name": "http://secunia.com/advisories/50042" }, { - "name": "openSUSE-SU-2012:1063", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00043.html" + "url": "http://security.openttd.org/en/CVE-2012-3436", + "refsource": "MISC", + "name": "http://security.openttd.org/en/CVE-2012-3436" }, { - "name": "54720", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/54720" + "url": "http://vcs.openttd.org/svn/changeset/24439", + "refsource": "MISC", + "name": "http://vcs.openttd.org/svn/changeset/24439" }, { - "name": "[oss-security] 20120731 Re: CVE request for OpenTTD", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/07/31/5" + "url": "http://vcs.openttd.org/svn/changeset/24449", + "refsource": "MISC", + "name": "http://vcs.openttd.org/svn/changeset/24449" }, { - "name": "openttd-water-dos(77266)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77266" + "url": "http://www.openwall.com/lists/oss-security/2012/07/27/5", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/07/27/5" }, { - "name": "http://vcs.openttd.org/svn/changeset/24449", - "refsource": "CONFIRM", - "url": "http://vcs.openttd.org/svn/changeset/24449" + "url": "http://www.openwall.com/lists/oss-security/2012/07/28/7", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/07/28/7" }, { - "name": "http://bugs.openttd.org/task/5254", - "refsource": "CONFIRM", - "url": "http://bugs.openttd.org/task/5254" + "url": "http://www.openwall.com/lists/oss-security/2012/07/31/5", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/07/31/5" }, { - "name": "[oss-security] 20120727 CVE request for OpenTTD", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/07/27/5" + "url": "http://www.securityfocus.com/bid/54720", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/54720" }, { - "name": "http://vcs.openttd.org/svn/changeset/24439", - "refsource": "CONFIRM", - "url": "http://vcs.openttd.org/svn/changeset/24439" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77266", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77266" } ] } diff --git a/2013/0xxx/CVE-2013-0290.json b/2013/0xxx/CVE-2013-0290.json index c9679fcf909..2c5b87045bb 100644 --- a/2013/0xxx/CVE-2013-0290.json +++ b/2013/0xxx/CVE-2013-0290.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2013-0290 kernel: net: infinite loop in __skb_recv_datagram()" + "value": "The __skb_recv_datagram function in net/core/datagram.c in the Linux kernel before 3.8 does not properly handle the MSG_PEEK flag with zero-length data, which allows local users to cause a denial of service (infinite loop and system hang) via a crafted application." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Loop with Unreachable Exit Condition ('Infinite Loop')", - "cweId": "CWE-835" + "value": "n/a" } ] } @@ -32,16 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise MRG 2", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:3.6.11-rt30.25.el6rt", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -59,11 +58,6 @@ "refsource": "MISC", "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176" }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:0622", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:0622" - }, { "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=77c1090f94d1b0b5186fb13a1b71b47b1343f87f", "refsource": "MISC", @@ -90,44 +84,14 @@ "name": "http://www.openwall.com/lists/oss-security/2013/02/15/2" }, { - "url": "https://access.redhat.com/security/cve/CVE-2013-0290", + "url": "https://github.com/torvalds/linux/commit/77c1090f94d1b0b5186fb13a1b71b47b1343f87f", "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2013-0290" + "name": "https://github.com/torvalds/linux/commit/77c1090f94d1b0b5186fb13a1b71b47b1343f87f" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=911473", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=911473" - }, - { - "url": "https://github.com/torvalds/linux/commit/77c1090f94d1b0b5186fb13a1b71b47b1343f87f", - "refsource": "MISC", - "name": "https://github.com/torvalds/linux/commit/77c1090f94d1b0b5186fb13a1b71b47b1343f87f" - } - ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "LOW", - "accessVector": "LOCAL", - "authentication": "NONE", - "availabilityImpact": "COMPLETE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 4.9, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", - "version": "2.0" } ] } diff --git a/2013/0xxx/CVE-2013-0292.json b/2013/0xxx/CVE-2013-0292.json index 536d85e1e72..76ad33a24f3 100644 --- a/2013/0xxx/CVE-2013-0292.json +++ b/2013/0xxx/CVE-2013-0292.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-0292", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,87 +27,111 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", - "refsource": "CONFIRM", - "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" - }, - { - "name": "33614", - "refsource": "EXPLOIT-DB", - "url": "http://www.exploit-db.com/exploits/33614" - }, - { - "name": "MDVSA-2013:071", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:071" - }, - { - "name": "52225", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/52225" - }, - { - "name": "dbus-message-sender-priv-esc(82135)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82135" - }, - { - "name": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=911658", + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705", "refsource": "MISC", - "url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=911658" + "name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705" }, { - "name": "52375", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/52375" + "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", + "refsource": "MISC", + "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { - "name": "USN-1753-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1753-1" + "url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=911658", + "refsource": "MISC", + "name": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=911658" }, { - "name": "RHSA-2013:0568", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0568.html" + "url": "http://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca", + "refsource": "MISC", + "name": "http://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca" }, { - "name": "57985", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/57985" + "url": "http://osvdb.org/90302", + "refsource": "MISC", + "name": "http://osvdb.org/90302" }, { - "name": "52404", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/52404" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0568.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0568.html" }, { - "name": "[oss-security] 20130215 CVE-2013-0292: authentication bypass due to insufficient checks in dbus-glib < 0.100.1", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/02/15/10" + "url": "http://secunia.com/advisories/52225", + "refsource": "MISC", + "name": "http://secunia.com/advisories/52225" }, { - "name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705", - "refsource": "CONFIRM", - "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705" + "url": "http://secunia.com/advisories/52375", + "refsource": "MISC", + "name": "http://secunia.com/advisories/52375" }, { - "name": "90302", - "refsource": "OSVDB", - "url": "http://osvdb.org/90302" + "url": "http://secunia.com/advisories/52404", + "refsource": "MISC", + "name": "http://secunia.com/advisories/52404" }, { - "name": "http://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca", - "refsource": "CONFIRM", - "url": "http://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca" + "url": "http://www.exploit-db.com/exploits/33614", + "refsource": "MISC", + "name": "http://www.exploit-db.com/exploits/33614" }, { - "name": "https://bugs.freedesktop.org/show_bug.cgi?id=60916", - "refsource": "CONFIRM", - "url": "https://bugs.freedesktop.org/show_bug.cgi?id=60916" + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:071", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:071" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2013/02/15/10", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/02/15/10" + }, + { + "url": "http://www.securityfocus.com/bid/57985", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/57985" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1753-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1753-1" + }, + { + "url": "https://bugs.freedesktop.org/show_bug.cgi?id=60916", + "refsource": "MISC", + "name": "https://bugs.freedesktop.org/show_bug.cgi?id=60916" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82135", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82135" } ] } diff --git a/2013/0xxx/CVE-2013-0293.json b/2013/0xxx/CVE-2013-0293.json index 076bb75b8c7..0391e4c04f5 100644 --- a/2013/0xxx/CVE-2013-0293.json +++ b/2013/0xxx/CVE-2013-0293.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-0293", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "oVirt Node", - "product": { - "product_data": [ - { - "product_name": "oVirt Node", - "version": { - "version_data": [ - { - "version_value": "2.6.0" - } - ] - } - } - ] - } - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,12 +27,41 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "oVirt Node", + "product": { + "product_data": [ + { + "product_name": "oVirt Node", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "2.6.0" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://security-tracker.debian.org/tracker/CVE-2013-0293", + "url": "http://www.openwall.com/lists/oss-security/2013/02/28/13", "refsource": "MISC", - "name": "https://security-tracker.debian.org/tracker/CVE-2013-0293" + "name": "http://www.openwall.com/lists/oss-security/2013/02/28/13" + }, + { + "url": "http://www.securityfocus.com/bid/58227", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/58227" }, { "url": "https://access.redhat.com/security/cve/cve-2013-0293", @@ -63,19 +69,14 @@ "name": "https://access.redhat.com/security/cve/cve-2013-0293" }, { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82474", "refsource": "MISC", - "name": "http://www.openwall.com/lists/oss-security/2013/02/28/13", - "url": "http://www.openwall.com/lists/oss-security/2013/02/28/13" + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82474" }, { + "url": "https://security-tracker.debian.org/tracker/CVE-2013-0293", "refsource": "MISC", - "name": "http://www.securityfocus.com/bid/58227", - "url": "http://www.securityfocus.com/bid/58227" - }, - { - "refsource": "MISC", - "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82474", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82474" + "name": "https://security-tracker.debian.org/tracker/CVE-2013-0293" } ] } diff --git a/2013/0xxx/CVE-2013-0308.json b/2013/0xxx/CVE-2013-0308.json index 6cf6b72f227..ad4c1f2c581 100644 --- a/2013/0xxx/CVE-2013-0308.json +++ b/2013/0xxx/CVE-2013-0308.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-0308", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,92 +27,116 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "1028205", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id/1028205" - }, - { - "name": "RHSA-2013:0589", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0589.html" - }, - { - "name": "https://raw.github.com/git/git/master/Documentation/RelNotes/1.8.1.4.txt", - "refsource": "CONFIRM", - "url": "https://raw.github.com/git/git/master/Documentation/RelNotes/1.8.1.4.txt" - }, - { - "name": "http://support.apple.com/kb/HT5937", - "refsource": "CONFIRM", - "url": "http://support.apple.com/kb/HT5937" - }, - { - "name": "git-gitimapsend-spoofing(82329)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82329" - }, - { - "name": "APPLE-SA-2013-09-18-3", - "refsource": "APPLE", - "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00007.html" - }, - { - "name": "52361", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/52361" - }, - { - "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701586", + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "refsource": "MISC", - "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701586" + "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { - "name": "[ANNOUNCE] 20130220 Git v1.8.1.4", - "refsource": "MLIST", - "url": "http://marc.info/?l=git&m=136134619013145&w=2" - }, - { - "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", - "refsource": "CONFIRM", - "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" - }, - { - "name": "openSUSE-SU-2013:0380", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00005.html" - }, - { - "name": "58148", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/58148" - }, - { - "name": "52443", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/52443" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=909977", + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701586", "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=909977" + "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701586" }, { - "name": "https://bugzilla.novell.com/show_bug.cgi?id=804730", + "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00007.html", "refsource": "MISC", - "url": "https://bugzilla.novell.com/show_bug.cgi?id=804730" + "name": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00007.html" }, { - "name": "openSUSE-SU-2013:0382", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00007.html" + "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00005.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00005.html" }, { - "name": "52467", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/52467" + "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00007.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00007.html" + }, + { + "url": "http://marc.info/?l=git&m=136134619013145&w=2", + "refsource": "MISC", + "name": "http://marc.info/?l=git&m=136134619013145&w=2" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-0589.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0589.html" + }, + { + "url": "http://secunia.com/advisories/52361", + "refsource": "MISC", + "name": "http://secunia.com/advisories/52361" + }, + { + "url": "http://secunia.com/advisories/52443", + "refsource": "MISC", + "name": "http://secunia.com/advisories/52443" + }, + { + "url": "http://secunia.com/advisories/52467", + "refsource": "MISC", + "name": "http://secunia.com/advisories/52467" + }, + { + "url": "http://support.apple.com/kb/HT5937", + "refsource": "MISC", + "name": "http://support.apple.com/kb/HT5937" + }, + { + "url": "http://www.securityfocus.com/bid/58148", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/58148" + }, + { + "url": "http://www.securitytracker.com/id/1028205", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id/1028205" + }, + { + "url": "https://bugzilla.novell.com/show_bug.cgi?id=804730", + "refsource": "MISC", + "name": "https://bugzilla.novell.com/show_bug.cgi?id=804730" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82329", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82329" + }, + { + "url": "https://raw.github.com/git/git/master/Documentation/RelNotes/1.8.1.4.txt", + "refsource": "MISC", + "name": "https://raw.github.com/git/git/master/Documentation/RelNotes/1.8.1.4.txt" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=909977", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=909977" } ] } diff --git a/2013/0xxx/CVE-2013-0309.json b/2013/0xxx/CVE-2013-0309.json index c98fd844700..2ae3c02777f 100644 --- a/2013/0xxx/CVE-2013-0309.json +++ b/2013/0xxx/CVE-2013-0309.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-0309", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,37 +27,61 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "RHSA-2013:0496", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0496.html" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0496.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0496.html" }, { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=027ef6c87853b0a9df53175063028edb4950d476", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=027ef6c87853b0a9df53175063028edb4950d476" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=027ef6c87853b0a9df53175063028edb4950d476", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=027ef6c87853b0a9df53175063028edb4950d476" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=912898", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=912898" + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.6.2", + "refsource": "MISC", + "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.6.2" }, { - "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.6.2", - "refsource": "CONFIRM", - "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.6.2" + "url": "http://www.openwall.com/lists/oss-security/2013/02/20/4", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/02/20/4" }, { - "name": "https://github.com/torvalds/linux/commit/027ef6c87853b0a9df53175063028edb4950d476", - "refsource": "CONFIRM", - "url": "https://github.com/torvalds/linux/commit/027ef6c87853b0a9df53175063028edb4950d476" + "url": "https://github.com/torvalds/linux/commit/027ef6c87853b0a9df53175063028edb4950d476", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/027ef6c87853b0a9df53175063028edb4950d476" }, { - "name": "[oss-security] 20130219 Re: CVE request -- Linux kernel: mm: thp: pmd_present and PROT_NONE local DoS", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/02/20/4" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=912898", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=912898" } ] } diff --git a/2013/0xxx/CVE-2013-0310.json b/2013/0xxx/CVE-2013-0310.json index f7e1db69781..f96457c491f 100644 --- a/2013/0xxx/CVE-2013-0310.json +++ b/2013/0xxx/CVE-2013-0310.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2013-0310 kernel: net: CIPSO_V4_TAG_LOCAL tag NULL pointer dereference" + "value": "The cipso_v4_validate function in net/ipv4/cipso_ipv4.c in the Linux kernel before 3.4.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via an IPOPT_CIPSO IP_OPTIONS setsockopt system call." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "NULL Pointer Dereference", - "cweId": "CWE-476" + "value": "n/a" } ] } @@ -32,16 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 6", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:2.6.32-358.el6", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -59,11 +58,6 @@ "refsource": "MISC", "name": "http://rhn.redhat.com/errata/RHSA-2013-0496.html" }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:0496", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:0496" - }, { "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=89d7ae34cdda4195809a5a987f697a517a2a3177", "refsource": "MISC", @@ -80,44 +74,14 @@ "name": "http://www.openwall.com/lists/oss-security/2013/02/20/5" }, { - "url": "https://access.redhat.com/security/cve/CVE-2013-0310", + "url": "https://github.com/torvalds/linux/commit/89d7ae34cdda4195809a5a987f697a517a2a3177", "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2013-0310" + "name": "https://github.com/torvalds/linux/commit/89d7ae34cdda4195809a5a987f697a517a2a3177" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=912900", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=912900" - }, - { - "url": "https://github.com/torvalds/linux/commit/89d7ae34cdda4195809a5a987f697a517a2a3177", - "refsource": "MISC", - "name": "https://github.com/torvalds/linux/commit/89d7ae34cdda4195809a5a987f697a517a2a3177" - } - ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "MEDIUM", - "accessVector": "LOCAL", - "authentication": "SINGLE", - "availabilityImpact": "COMPLETE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 4.4, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:L/AC:M/Au:S/C:N/I:N/A:C", - "version": "2.0" } ] } diff --git a/2013/0xxx/CVE-2013-0311.json b/2013/0xxx/CVE-2013-0311.json index 946d2302d74..ec99adff842 100644 --- a/2013/0xxx/CVE-2013-0311.json +++ b/2013/0xxx/CVE-2013-0311.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-0311", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,62 +27,86 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "RHSA-2013:0496", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0496.html" + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176" }, { - "name": "openSUSE-SU-2013:1187", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0496.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0496.html" }, { - "name": "https://github.com/torvalds/linux/commit/bd97120fc3d1a11f3124c7c9ba1d91f51829eb85", - "refsource": "CONFIRM", - "url": "https://github.com/torvalds/linux/commit/bd97120fc3d1a11f3124c7c9ba1d91f51829eb85" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bd97120fc3d1a11f3124c7c9ba1d91f51829eb85", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bd97120fc3d1a11f3124c7c9ba1d91f51829eb85" }, { - "name": "RHSA-2013:0882", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0882.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html" }, { - "name": "MDVSA-2013:176", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0579.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0579.html" }, { - "name": "RHSA-2013:0928", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0928.html" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0882.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0882.html" }, { - "name": "[oss-security] 20130219 Re: CVE request -- Linux kernel: vhost: fix length for cross region descriptor", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/02/20/6" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0928.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0928.html" }, { - "name": "RHSA-2013:0579", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0579.html" + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/patch-3.7.bz2", + "refsource": "MISC", + "name": "http://www.kernel.org/pub/linux/kernel/v3.x/patch-3.7.bz2" }, { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bd97120fc3d1a11f3124c7c9ba1d91f51829eb85", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bd97120fc3d1a11f3124c7c9ba1d91f51829eb85" + "url": "http://www.openwall.com/lists/oss-security/2013/02/20/6", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/02/20/6" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=912905", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=912905" + "url": "https://github.com/torvalds/linux/commit/bd97120fc3d1a11f3124c7c9ba1d91f51829eb85", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/bd97120fc3d1a11f3124c7c9ba1d91f51829eb85" }, { - "name": "http://www.kernel.org/pub/linux/kernel/v3.x/patch-3.7.bz2", - "refsource": "CONFIRM", - "url": "http://www.kernel.org/pub/linux/kernel/v3.x/patch-3.7.bz2" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=912905", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=912905" } ] } diff --git a/2013/0xxx/CVE-2013-0313.json b/2013/0xxx/CVE-2013-0313.json index 57fd41094e6..93391462935 100644 --- a/2013/0xxx/CVE-2013-0313.json +++ b/2013/0xxx/CVE-2013-0313.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-0313", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,32 +27,56 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[oss-security] 20130220 Re: CVE request - Linux kernel: evm: NULL pointer de-reference flaw", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/02/20/16" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a67adb997419fb53540d4a4f79c6471c60bc69b6", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a67adb997419fb53540d4a4f79c6471c60bc69b6" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=913266", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913266" + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.5", + "refsource": "MISC", + "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.5" }, { - "name": "https://github.com/torvalds/linux/commit/a67adb997419fb53540d4a4f79c6471c60bc69b6", - "refsource": "CONFIRM", - "url": "https://github.com/torvalds/linux/commit/a67adb997419fb53540d4a4f79c6471c60bc69b6" + "url": "http://www.openwall.com/lists/oss-security/2013/02/20/16", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/02/20/16" }, { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a67adb997419fb53540d4a4f79c6471c60bc69b6", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a67adb997419fb53540d4a4f79c6471c60bc69b6" + "url": "https://github.com/torvalds/linux/commit/a67adb997419fb53540d4a4f79c6471c60bc69b6", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/a67adb997419fb53540d4a4f79c6471c60bc69b6" }, { - "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.5", - "refsource": "CONFIRM", - "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.5" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913266", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=913266" } ] } diff --git a/2013/0xxx/CVE-2013-0314.json b/2013/0xxx/CVE-2013-0314.json index 650ad0b109f..a95b08e1309 100644 --- a/2013/0xxx/CVE-2013-0314.json +++ b/2013/0xxx/CVE-2013-0314.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-0314", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=913327", + "url": "http://rhn.redhat.com/errata/RHSA-2013-0613.html", "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913327" + "name": "http://rhn.redhat.com/errata/RHSA-2013-0613.html" }, { - "name": "52552", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/52552" + "url": "http://secunia.com/advisories/52552", + "refsource": "MISC", + "name": "http://secunia.com/advisories/52552" }, { - "name": "91120", - "refsource": "OSVDB", - "url": "http://www.osvdb.org/91120" + "url": "http://www.osvdb.org/91120", + "refsource": "MISC", + "name": "http://www.osvdb.org/91120" }, { - "name": "RHSA-2013:0613", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0613.html" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913327", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=913327" } ] } diff --git a/2013/0xxx/CVE-2013-0327.json b/2013/0xxx/CVE-2013-0327.json index 5864ed58d00..e698a8a543c 100644 --- a/2013/0xxx/CVE-2013-0327.json +++ b/2013/0xxx/CVE-2013-0327.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2013-0327 jenkins: cross-site request forgery (CSRF) on Jenkins master" + "value": "Cross-site request forgery (CSRF) vulnerability in Jenkins master in Jenkins before 1.502 and LTS before 1.480.3 allows remote attackers to hijack the authentication of users via unknown vectors." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Cross-Site Request Forgery (CSRF)", - "cweId": "CWE-352" + "value": "n/a" } ] } @@ -32,28 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "RHEL 6 Version of OpenShift Enterprise", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:1.502-1.el6op", - "version_affected": "!" - }, - { - "version_value": "0:1.0.3-1.el6op", - "version_affected": "!" - }, - { - "version_value": "1:1.4.1-4.el6", - "version_affected": "!" - }, - { - "version_value": "1:1.3.0-4.el6op", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -81,51 +68,16 @@ "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2013/02/21/7" }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:0638", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:0638" - }, { "url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-02-16", "refsource": "MISC", "name": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-02-16" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2013-0327", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2013-0327" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=914875", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=914875" } ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "MEDIUM", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "NONE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 4.3, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", - "version": "2.0" - } - ] } } \ No newline at end of file diff --git a/2013/4xxx/CVE-2013-4221.json b/2013/4xxx/CVE-2013-4221.json index c800bf44460..8106cc2e9a9 100644 --- a/2013/4xxx/CVE-2013-4221.json +++ b/2013/4xxx/CVE-2013-4221.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4221", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,37 +27,61 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "RHSA-2013:1862", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-1862.html" - }, - { - "name": "http://restlet.org/learn/2.1/changes", - "refsource": "CONFIRM", - "url": "http://restlet.org/learn/2.1/changes" - }, - { - "name": "http://blog.diniscruz.com/2013/08/using-xmldecoder-to-execute-server-side.html", + "url": "http://rhn.redhat.com/errata/RHSA-2013-1862.html", "refsource": "MISC", - "url": "http://blog.diniscruz.com/2013/08/using-xmldecoder-to-execute-server-side.html" + "name": "http://rhn.redhat.com/errata/RHSA-2013-1862.html" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=995275", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=995275" + "url": "http://blog.diniscruz.com/2013/08/using-xmldecoder-to-execute-server-side.html", + "refsource": "MISC", + "name": "http://blog.diniscruz.com/2013/08/using-xmldecoder-to-execute-server-side.html" }, { - "name": "https://github.com/restlet/restlet-framework-java/issues/774", - "refsource": "CONFIRM", - "url": "https://github.com/restlet/restlet-framework-java/issues/774" + "url": "http://restlet.org/learn/2.1/changes", + "refsource": "MISC", + "name": "http://restlet.org/learn/2.1/changes" }, { - "name": "RHSA-2013:1410", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-1410.html" + "url": "http://rhn.redhat.com/errata/RHSA-2013-1410.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-1410.html" + }, + { + "url": "https://github.com/restlet/restlet-framework-java/issues/774", + "refsource": "MISC", + "name": "https://github.com/restlet/restlet-framework-java/issues/774" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=995275", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=995275" } ] } diff --git a/2013/4xxx/CVE-2013-4222.json b/2013/4xxx/CVE-2013-4222.json index e5e9a784de6..9719c4b5e76 100644 --- a/2013/4xxx/CVE-2013-4222.json +++ b/2013/4xxx/CVE-2013-4222.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2013-4222 OpenStack: Keystone disabling a tenant does not disable a user token" + "value": "OpenStack Identity (Keystone) Folsom, Grizzly 2013.1.3 and earlier, and Havana before havana-3 does not properly revoke user tokens when a tenant is disabled, which allows remote authenticated users to retain access via the token." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Insufficient Session Expiration", - "cweId": "CWE-613" + "value": "n/a" } ] } @@ -32,16 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "OpenStack 3 for RHEL 6", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:2013.1.4-1.el6ost", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -69,50 +68,10 @@ "refsource": "MISC", "name": "http://www.ubuntu.com/usn/USN-2002-1" }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:1524", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:1524" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2013-4222", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2013-4222" - }, { "url": "https://bugs.launchpad.net/ossn/+bug/1179955", "refsource": "MISC", "name": "https://bugs.launchpad.net/ossn/+bug/1179955" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=995598", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=995598" - } - ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "LOW", - "accessVector": "NETWORK", - "authentication": "SINGLE", - "availabilityImpact": "NONE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 4, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", - "version": "2.0" } ] } diff --git a/2013/4xxx/CVE-2013-4231.json b/2013/4xxx/CVE-2013-4231.json index 54dccad5d1f..97f1d587d38 100644 --- a/2013/4xxx/CVE-2013-4231.json +++ b/2013/4xxx/CVE-2013-4231.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4231", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size." + "value": "Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size." } ] }, @@ -50,52 +27,76 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://bugzilla.maptools.org/show_bug.cgi?id=2450", - "refsource": "CONFIRM", - "url": "http://bugzilla.maptools.org/show_bug.cgi?id=2450" + "url": "http://rhn.redhat.com/errata/RHSA-2014-0223.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2014-0223.html" }, { - "name": "RHSA-2014:0223", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2014-0223.html" + "url": "http://bugzilla.maptools.org/show_bug.cgi?id=2450", + "refsource": "MISC", + "name": "http://bugzilla.maptools.org/show_bug.cgi?id=2450" }, { - "name": "DSA-2744", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2013/dsa-2744" + "url": "http://secunia.com/advisories/54543", + "refsource": "MISC", + "name": "http://secunia.com/advisories/54543" }, { - "name": "54543", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/54543" + "url": "http://secunia.com/advisories/54628", + "refsource": "MISC", + "name": "http://secunia.com/advisories/54628" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=995965", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=995965" + "url": "http://www.asmail.be/msg0055359936.html", + "refsource": "MISC", + "name": "http://www.asmail.be/msg0055359936.html" }, { - "name": "[tiff] 20130801 Vulnerabilities in libtiff 4.0.3", - "refsource": "MLIST", - "url": "http://www.asmail.be/msg0055359936.html" + "url": "http://www.debian.org/security/2013/dsa-2744", + "refsource": "MISC", + "name": "http://www.debian.org/security/2013/dsa-2744" }, { - "name": "54628", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/54628" + "url": "http://www.openwall.com/lists/oss-security/2013/08/10/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/08/10/2" }, { - "name": "[oss-security] 20130809 Re: CVE Request -- Four (stack-based) buffer overflows and one use-after-free in libtiff v4.0.3 reported by Pedro Ribeiro", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/08/10/2" + "url": "http://www.securityfocus.com/bid/61695", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/61695" }, { - "name": "61695", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/61695" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=995965", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=995965" } ] } diff --git a/2013/4xxx/CVE-2013-4232.json b/2013/4xxx/CVE-2013-4232.json index bddc0fd3902..01f67735b33 100644 --- a/2013/4xxx/CVE-2013-4232.json +++ b/2013/4xxx/CVE-2013-4232.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2013-4232 libtiff (tiff2pdf): use-after-free in t2p_readwrite_pdf_image()" + "value": "Use-after-free vulnerability in the t2p_readwrite_pdf_image function in tools/tiff2pdf.c in libtiff 4.0.3 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted TIFF image." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Use After Free", - "cweId": "CWE-416" + "value": "n/a" } ] } @@ -32,27 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 5", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:3.8.2-19.el5_10", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 6", - "version": { - "version_data": [ - { - "version_value": "0:3.9.4-10.el6_5", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -70,16 +58,6 @@ "refsource": "MISC", "name": "http://rhn.redhat.com/errata/RHSA-2014-0223.html" }, - { - "url": "https://access.redhat.com/errata/RHSA-2014:0222", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2014:0222" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2014:0223", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2014:0223" - }, { "url": "http://secunia.com/advisories/54543", "refsource": "MISC", @@ -110,41 +88,11 @@ "refsource": "MISC", "name": "http://bugzilla.maptools.org/show_bug.cgi?id=2449" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2013-4232", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2013-4232" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=995975", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=995975" } ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "HIGH", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 5.1, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", - "version": "2.0" - } - ] } } \ No newline at end of file diff --git a/2013/4xxx/CVE-2013-4237.json b/2013/4xxx/CVE-2013-4237.json index abb1522d1cb..805c8138ca3 100644 --- a/2013/4xxx/CVE-2013-4237.json +++ b/2013/4xxx/CVE-2013-4237.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "An out-of-bounds write flaw was found in the way the glibc's readdir_r() function handled file system entries longer than the NAME_MAX character constant. A remote attacker could provide a specially crafted NTFS or CIFS file system that, when processed by an application using readdir_r(), would cause that application to crash or, potentially, allow the attacker to execute arbitrary code with the privileges of the user running the application." + "value": "sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted (1) NTFS or (2) CIFS image." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Out-of-bounds Write", - "cweId": "CWE-787" + "value": "n/a" } ] } @@ -32,16 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 6", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:2.12-1.149.el6", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -84,21 +83,6 @@ "refsource": "MISC", "name": "http://www.securityfocus.com/bid/61729" }, - { - "url": "https://access.redhat.com/errata/RHSA-2014:1391", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2014:1391" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2013-4237", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2013-4237" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=995839", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=995839" - }, { "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=14699", "refsource": "MISC", @@ -108,37 +92,11 @@ "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=91ce40854d0b7f865cf5024ef95a8026b76096f3", "refsource": "MISC", "name": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=91ce40854d0b7f865cf5024ef95a8026b76096f3" - } - ] - }, - "work_around": [ - { - "lang": "en", - "value": "Do not open untrusted filesystem image files on production systems." - } - ], - "impact": { - "cvss": [ + }, { - "accessComplexity": "MEDIUM", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 6.8, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", - "version": "2.0" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=995839", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=995839" } ] } diff --git a/2013/4xxx/CVE-2013-4238.json b/2013/4xxx/CVE-2013-4238.json index 982b4f0110d..fd056632c61 100644 --- a/2013/4xxx/CVE-2013-4238.json +++ b/2013/4xxx/CVE-2013-4238.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4238", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,82 +27,106 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "RHSA-2013:1582", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-1582.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" }, { - "name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", - "refsource": "CONFIRM", - "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { - "name": "openSUSE-SU-2013:1463", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00043.html" + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "refsource": "MISC", + "name": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { - "name": "openSUSE-SU-2013:1440", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00029.html" + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "refsource": "MISC", + "name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { - "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", - "refsource": "BUGTRAQ", - "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" + "url": "http://bugs.python.org/issue18709", + "refsource": "MISC", + "name": "http://bugs.python.org/issue18709" }, { - "name": "DSA-2880", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2014/dsa-2880" + "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00026.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00026.html" }, { - "name": "USN-1982-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1982-1" + "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00027.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00027.html" }, { - "name": "openSUSE-SU-2013:1437", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00026.html" + "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00028.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00028.html" }, { - "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", - "refsource": "FULLDISC", - "url": "http://seclists.org/fulldisclosure/2014/Dec/23" + "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00029.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00029.html" }, { - "name": "openSUSE-SU-2013:1462", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00042.html" + "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00042.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00042.html" }, { - "name": "openSUSE-SU-2013:1438", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00027.html" + "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00043.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00043.html" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=996381", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996381" + "url": "http://rhn.redhat.com/errata/RHSA-2013-1582.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-1582.html" }, { - "name": "http://bugs.python.org/issue18709", - "refsource": "CONFIRM", - "url": "http://bugs.python.org/issue18709" + "url": "http://www.debian.org/security/2014/dsa-2880", + "refsource": "MISC", + "name": "http://www.debian.org/security/2014/dsa-2880" }, { - "name": "openSUSE-SU-2013:1439", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00028.html" + "url": "http://www.ubuntu.com/usn/USN-1982-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1982-1" }, { - "refsource": "SUSE", - "name": "openSUSE-SU-2020:0086", - "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996381", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=996381" } ] } diff --git a/2013/4xxx/CVE-2013-4239.json b/2013/4xxx/CVE-2013-4239.json index f091ffef58f..41c56e03398 100644 --- a/2013/4xxx/CVE-2013-4239.json +++ b/2013/4xxx/CVE-2013-4239.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4239", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[oss-security] 20130812 Re: CVE Request -- libvirt: memory corruption in xenDaemonListDefinedDomains function", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/08/12/12" + "url": "http://libvirt.org/news.html", + "refsource": "MISC", + "name": "http://libvirt.org/news.html" }, { - "name": "http://libvirt.org/news.html", - "refsource": "CONFIRM", - "url": "http://libvirt.org/news.html" + "url": "http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=0e671a16", + "refsource": "MISC", + "name": "http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=0e671a16" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=996241", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996241" + "url": "http://www.openwall.com/lists/oss-security/2013/08/12/12", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/08/12/12" }, { - "name": "http://libvirt.org/git/?p=libvirt.git;a=commitdiff;h=0e671a16", - "refsource": "CONFIRM", - "url": "http://libvirt.org/git/?p=libvirt.git;a=commitdiff;h=0e671a16" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996241", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=996241" } ] } diff --git a/2013/4xxx/CVE-2013-4243.json b/2013/4xxx/CVE-2013-4243.json index 378bafc016c..948293aba94 100644 --- a/2013/4xxx/CVE-2013-4243.json +++ b/2013/4xxx/CVE-2013-4243.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2013-4243 libtiff (gif2tiff): possible heap-based buffer overflow in readgifimage()" + "value": "Heap-based buffer overflow in the readgifimage function in the gif2tiff tool in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted height and width values in a GIF image." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Heap-based Buffer Overflow", - "cweId": "CWE-122" + "value": "n/a" } ] } @@ -32,27 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 5", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:3.8.2-19.el5_10", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 6", - "version": { - "version_data": [ - { - "version_value": "0:3.9.4-10.el6_5", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -70,16 +58,6 @@ "refsource": "MISC", "name": "http://rhn.redhat.com/errata/RHSA-2014-0223.html" }, - { - "url": "https://access.redhat.com/errata/RHSA-2014:0222", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2014:0222" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2014:0223", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2014:0223" - }, { "url": "https://security.gentoo.org/glsa/201701-16", "refsource": "MISC", @@ -110,41 +88,11 @@ "refsource": "MISC", "name": "http://www.securityfocus.com/bid/62082" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2013-4243", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2013-4243" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996052", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=996052" } ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "HIGH", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 5.1, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", - "version": "2.0" - } - ] } } \ No newline at end of file diff --git a/2013/4xxx/CVE-2013-4244.json b/2013/4xxx/CVE-2013-4244.json index 361df004f32..6c50c890a67 100644 --- a/2013/4xxx/CVE-2013-4244.json +++ b/2013/4xxx/CVE-2013-4244.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2013-4244 libtiff (gif2tiff): OOB Write in LZW decompressor" + "value": "The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Out-of-bounds Write", - "cweId": "CWE-787" + "value": "n/a" } ] } @@ -32,27 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 5", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:3.8.2-19.el5_10", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 6", - "version": { - "version_data": [ - { - "version_value": "0:3.9.4-10.el6_5", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -70,60 +58,20 @@ "refsource": "MISC", "name": "http://rhn.redhat.com/errata/RHSA-2014-0223.html" }, - { - "url": "https://access.redhat.com/errata/RHSA-2014:0222", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2014:0222" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2014:0223", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2014:0223" - }, { "url": "http://bugzilla.maptools.org/show_bug.cgi?id=2452", "refsource": "MISC", "name": "http://bugzilla.maptools.org/show_bug.cgi?id=2452" }, { - "url": "https://access.redhat.com/security/cve/CVE-2013-4244", + "url": "https://github.com/vadz/libtiff/commit/ce6841d9e41d621ba23cf18b190ee6a23b2cc833", "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2013-4244" + "name": "https://github.com/vadz/libtiff/commit/ce6841d9e41d621ba23cf18b190ee6a23b2cc833" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996468", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=996468" - }, - { - "url": "https://github.com/vadz/libtiff/commit/ce6841d9e41d621ba23cf18b190ee6a23b2cc833", - "refsource": "MISC", - "name": "https://github.com/vadz/libtiff/commit/ce6841d9e41d621ba23cf18b190ee6a23b2cc833" - } - ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "HIGH", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 5.1, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", - "version": "2.0" } ] } diff --git a/2016/6xxx/CVE-2016-6330.json b/2016/6xxx/CVE-2016-6330.json index a2cd7296444..26d134bf8c4 100644 --- a/2016/6xxx/CVE-2016-6330.json +++ b/2016/6xxx/CVE-2016-6330.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-6330", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "The server in Red Hat JBoss Operations Network (JON), when SSL authentication is not configured for JON server / agent communication, allows remote attackers to execute arbitrary code via a crafted HTTP request, related to message deserialization. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-3737." + "value": "The server in Red Hat JBoss Operations Network (JON), when SSL authentication is not configured for JON server / agent communication, allows remote attackers to execute arbitrary code via a crafted HTTP request, related to message deserialization. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-3737." } ] }, @@ -50,22 +27,46 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://www.tenable.com/security/research/tra-2016-22", + "url": "http://www.securityfocus.com/bid/92568", "refsource": "MISC", - "url": "https://www.tenable.com/security/research/tra-2016-22" + "name": "http://www.securityfocus.com/bid/92568" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1368864", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1368864" + "url": "https://www.tenable.com/security/research/tra-2016-22", + "refsource": "MISC", + "name": "https://www.tenable.com/security/research/tra-2016-22" }, { - "name": "92568", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/92568" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1368864", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1368864" } ] } diff --git a/2016/6xxx/CVE-2016-6340.json b/2016/6xxx/CVE-2016-6340.json index bd6331d00a3..0daab2d7782 100644 --- a/2016/6xxx/CVE-2016-6340.json +++ b/2016/6xxx/CVE-2016-6340.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-6340", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,17 +27,41 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1370315", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370315" + "url": "http://www.securityfocus.com/bid/92655", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/92655" }, { - "name": "92655", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/92655" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370315", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1370315" } ] } diff --git a/2016/6xxx/CVE-2016-6341.json b/2016/6xxx/CVE-2016-6341.json index 8a5c1eb325f..68b36076feb 100644 --- a/2016/6xxx/CVE-2016-6341.json +++ b/2016/6xxx/CVE-2016-6341.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-6341", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "92665", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/92665" + "url": "http://www.securityfocus.com/bid/92665", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/92665" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1363816", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1363816" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1363816", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1363816" }, { - "name": "https://www.ovirt.org/release/4.0.3/", - "refsource": "CONFIRM", - "url": "https://www.ovirt.org/release/4.0.3/" + "url": "https://www.ovirt.org/release/4.0.3/", + "refsource": "MISC", + "name": "https://www.ovirt.org/release/4.0.3/" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1369793", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369793" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369793", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1369793" } ] } diff --git a/2016/6xxx/CVE-2016-6342.json b/2016/6xxx/CVE-2016-6342.json index d976f6bd5e5..77eaa65c7aa 100644 --- a/2016/6xxx/CVE-2016-6342.json +++ b/2016/6xxx/CVE-2016-6342.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-6342", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,17 +27,41 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "FEDORA-2016-348a7b6285", - "refsource": "FEDORA", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N4ZQOPXSMJAJIXH5MRPQS2ZISYJPSLQK/" + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4ZQOPXSMJAJIXH5MRPQS2ZISYJPSLQK/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4ZQOPXSMJAJIXH5MRPQS2ZISYJPSLQK/" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1371328", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1371328" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1371328", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1371328" } ] } diff --git a/2016/6xxx/CVE-2016-6490.json b/2016/6xxx/CVE-2016-6490.json index bc4a3813333..74ebbae333e 100644 --- a/2016/6xxx/CVE-2016-6490.json +++ b/2016/6xxx/CVE-2016-6490.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-6490", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,32 +27,56 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[oss-security] 20160728 CVE Request Qemu: virtio: infinite loop in virtqueue_pop", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/07/28/4" + "url": "https://security.gentoo.org/glsa/201609-01", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/201609-01" }, { - "name": "[oss-security] 20160728 Re: CVE Request Qemu: virtio: infinite loop in virtqueue_pop", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/07/28/9" + "url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=1e7aed70144b4673fc26e73062064b6724795e5f", + "refsource": "MISC", + "name": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=1e7aed70144b4673fc26e73062064b6724795e5f" }, { - "name": "GLSA-201609-01", - "refsource": "GENTOO", - "url": "https://security.gentoo.org/glsa/201609-01" + "url": "http://www.openwall.com/lists/oss-security/2016/07/28/4", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/07/28/4" }, { - "name": "http://git.qemu.org/?p=qemu.git;a=commit;h=1e7aed70144b4673fc26e73062064b6724795e5f", - "refsource": "CONFIRM", - "url": "http://git.qemu.org/?p=qemu.git;a=commit;h=1e7aed70144b4673fc26e73062064b6724795e5f" + "url": "http://www.openwall.com/lists/oss-security/2016/07/28/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/07/28/9" }, { - "name": "[qemu-devel] 20160726 [PATCH] virtio: check vring descriptor buffer length", - "refsource": "MLIST", - "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-07/msg06246.html" + "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-07/msg06246.html", + "refsource": "MISC", + "name": "https://lists.gnu.org/archive/html/qemu-devel/2016-07/msg06246.html" } ] } diff --git a/2016/9xxx/CVE-2016-9101.json b/2016/9xxx/CVE-2016-9101.json index 0af5f9b3966..e7655444d07 100644 --- a/2016/9xxx/CVE-2016-9101.json +++ b/2016/9xxx/CVE-2016-9101.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-9101", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "openSUSE-SU-2016:3237", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" + "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html" }, { - "name": "GLSA-201701-49", - "refsource": "GENTOO", - "url": "https://security.gentoo.org/glsa/201701-49" + "url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" }, { - "name": "[oss-security] 20161030 Re: CVE request Qemu: net: eepro100 memory leakage at device unplug", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/10/30/5" + "url": "https://security.gentoo.org/glsa/201701-49", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/201701-49" }, { - "name": "[oss-security] 20161028 CVE request Qemu: net: eepro100 memory leakage at device unplug", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/10/27/14" + "url": "http://www.openwall.com/lists/oss-security/2016/10/27/14", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/10/27/14" }, { - "name": "[qemu-devel] 20161013 [PATCH] eepro100: Fix memory leak and simplify code for VMStateDescription", - "refsource": "MLIST", - "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg03024.html" + "url": "http://www.openwall.com/lists/oss-security/2016/10/30/5", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/10/30/5" }, { - "name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update", - "refsource": "MLIST", - "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html" + "url": "http://www.securityfocus.com/bid/93957", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/93957" }, { - "name": "93957", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/93957" + "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg03024.html", + "refsource": "MISC", + "name": "https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg03024.html" } ] } diff --git a/2016/9xxx/CVE-2016-9102.json b/2016/9xxx/CVE-2016-9102.json index cb7525d3d4a..01d738f271b 100644 --- a/2016/9xxx/CVE-2016-9102.json +++ b/2016/9xxx/CVE-2016-9102.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-9102", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "GLSA-201611-11", - "refsource": "GENTOO", - "url": "https://security.gentoo.org/glsa/201611-11" + "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html" }, { - "name": "93962", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/93962" + "url": "https://security.gentoo.org/glsa/201611-11", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/201611-11" }, { - "name": "[qemu-devel] 20161010 Re: [PATCH] 9pfs: fix memory leak in v9fs_xattrcreate", - "refsource": "MLIST", - "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg01861.html" + "url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ff55e94d23ae94c8628b0115320157c763eb3e06", + "refsource": "MISC", + "name": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ff55e94d23ae94c8628b0115320157c763eb3e06" }, { - "name": "[oss-security] 20161028 CVE request Qemu: 9pfs: memory leakage when creating extended attribute", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/10/27/15" + "url": "http://www.openwall.com/lists/oss-security/2016/10/27/15", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/10/27/15" }, { - "name": "http://git.qemu.org/?p=qemu.git;a=commit;h=ff55e94d23ae94c8628b0115320157c763eb3e06", - "refsource": "CONFIRM", - "url": "http://git.qemu.org/?p=qemu.git;a=commit;h=ff55e94d23ae94c8628b0115320157c763eb3e06" + "url": "http://www.openwall.com/lists/oss-security/2016/10/30/6", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/10/30/6" }, { - "name": "[oss-security] 20161030 Re: CVE request Qemu: 9pfs: memory leakage when creating extended attribute", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/10/30/6" + "url": "http://www.securityfocus.com/bid/93962", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/93962" }, { - "name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update", - "refsource": "MLIST", - "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html" + "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg01861.html", + "refsource": "MISC", + "name": "https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg01861.html" } ] } diff --git a/2016/9xxx/CVE-2016-9106.json b/2016/9xxx/CVE-2016-9106.json index f1b6f19f535..874b4559845 100644 --- a/2016/9xxx/CVE-2016-9106.json +++ b/2016/9xxx/CVE-2016-9106.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-9106", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[oss-security] 20161030 Re: CVE request Qemu: 9pfs: memory leakage in v9fs_write", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/10/30/10" + "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html" }, { - "name": "93964", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/93964" + "url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" }, { - "name": "[oss-security] 20161028 CVE request Qemu: 9pfs: memory leakage in v9fs_write", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/10/28/4" + "url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=fdfcc9aeea1492f4b819a24c94dfb678145b1bf9", + "refsource": "MISC", + "name": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=fdfcc9aeea1492f4b819a24c94dfb678145b1bf9" }, { - "name": "openSUSE-SU-2016:3237", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" + "url": "http://www.openwall.com/lists/oss-security/2016/10/28/4", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/10/28/4" }, { - "name": "http://git.qemu.org/?p=qemu.git;a=commit;h=fdfcc9aeea1492f4b819a24c94dfb678145b1bf9", - "refsource": "CONFIRM", - "url": "http://git.qemu.org/?p=qemu.git;a=commit;h=fdfcc9aeea1492f4b819a24c94dfb678145b1bf9" + "url": "http://www.openwall.com/lists/oss-security/2016/10/30/10", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/10/30/10" }, { - "name": "[qemu-devel] 20161012 Re: [PATCH v2] 9pfs: fix memory leak in v9fs_write", - "refsource": "MLIST", - "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg02623.html" + "url": "http://www.securityfocus.com/bid/93964", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/93964" }, { - "name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update", - "refsource": "MLIST", - "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html" + "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg02623.html", + "refsource": "MISC", + "name": "https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg02623.html" } ] } diff --git a/2016/9xxx/CVE-2016-9911.json b/2016/9xxx/CVE-2016-9911.json index 4a4e8ff5e49..549d73bc8db 100644 --- a/2016/9xxx/CVE-2016-9911.json +++ b/2016/9xxx/CVE-2016-9911.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2016-9911 Qemu: usb: ehci: memory leakage in ehci_init_transfer" + "value": "Quick Emulator (Qemu) built with the USB EHCI Emulation support is vulnerable to a memory leakage issue. It could occur while processing packet data in 'ehci_init_transfer'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Clearing of Heap Memory Before Release ('Heap Inspection')", - "cweId": "CWE-244" + "value": "n/a" } ] } @@ -32,82 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "10:2.9.0-10.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7", - "version": { - "version_data": [ - { - "version_value": "10:2.9.0-10.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat OpenStack Platform 10.0 (Newton)", - "version": { - "version_data": [ - { - "version_value": "10:2.9.0-10.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat OpenStack Platform 11.0 (Ocata)", - "version": { - "version_data": [ - { - "version_value": "10:2.9.0-10.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat OpenStack Platform 8.0 (Liberty)", - "version": { - "version_data": [ - { - "version_value": "10:2.9.0-10.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat OpenStack Platform 9.0 (Mitaka)", - "version": { - "version_data": [ - { - "version_value": "10:2.9.0-10.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7", - "version": { - "version_data": [ - { - "version_value": "10:2.9.0-14.el7", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -149,55 +82,6 @@ "url": "http://www.securityfocus.com/bid/94762", "refsource": "MISC", "name": "http://www.securityfocus.com/bid/94762" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2016-9911", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2016-9911" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402272", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1402272" - } - ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "MEDIUM", - "accessVector": "ADJACENT_NETWORK", - "authentication": "SINGLE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 2.3, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:A/AC:M/Au:S/C:N/I:N/A:P", - "version": "2.0" - }, - { - "attackComplexity": "HIGH", - "attackVector": "ADJACENT_NETWORK", - "availabilityImpact": "LOW", - "baseScore": 3, - "baseSeverity": "LOW", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "privilegesRequired": "LOW", - "scope": "CHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L", - "version": "3.0" } ] }