"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-02-13 04:05:13 +00:00
parent 43fb1b7a80
commit 8eb530d8d6
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
70 changed files with 3826 additions and 4477 deletions

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-2221 scsi-target-utils: stack buffer overflow vulnerability"
"value": "Multiple buffer overflows in the iSNS implementation in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) before 1.0.6, (2) iSCSI Enterprise Target (aka iscsitarget or IET) 1.4.20.1 and earlier, and (3) Generic SCSI Target Subsystem for Linux (aka SCST or iscsi-scst) 1.0.1.1 and earlier allow remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via (a) a long iSCSI Name string in an SCN message or (b) an invalid PDU."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Stack-based Buffer Overflow",
"cweId": "CWE-121"
"value": "n/a"
}
]
}
@ -32,16 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:0.0-6.20091205snap.el5_5.3",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -149,46 +148,11 @@
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/1760"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0518",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0518"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-2221",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-2221"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=593877",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=593877"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.8,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2222",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Directory Server",
"version": {
"version_data": [
{
"version_value": "8"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,17 +27,41 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Directory Server",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "8"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2222",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2222"
},
{
"url": "https://access.redhat.com/security/cve/cve-2010-2222",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2010-2222"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2222",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2222"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2223",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,32 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2010:0476",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2010-0476.html"
"url": "https://rhn.redhat.com/errata/RHSA-2010-0476.html",
"refsource": "MISC",
"name": "https://rhn.redhat.com/errata/RHSA-2010-0476.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=604752",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=604752"
"url": "http://securitytracker.com/id?1024137",
"refsource": "MISC",
"name": "http://securitytracker.com/id?1024137"
},
{
"name": "41044",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/41044"
"url": "http://www.securityfocus.com/bid/41044",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/41044"
},
{
"name": "RHSA-2010:0473",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2010-0473.html"
"url": "https://rhn.redhat.com/errata/RHSA-2010-0473.html",
"refsource": "MISC",
"name": "https://rhn.redhat.com/errata/RHSA-2010-0473.html"
},
{
"name": "1024137",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1024137"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=604752",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=604752"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2224",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,22 +27,46 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2010:0478",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2010-0478.html"
"url": "http://www.securityfocus.com/bid/41045",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/41045"
},
{
"name": "41045",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/41045"
"url": "https://rhn.redhat.com/errata/RHSA-2010-0478.html",
"refsource": "MISC",
"name": "https://rhn.redhat.com/errata/RHSA-2010-0478.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=606774",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=606774"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=606774",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=606774"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2225",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,77 +27,96 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "40860",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40860"
},
{
"name": "http://twitter.com/i0n1c/statuses/16373156076",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html",
"refsource": "MISC",
"url": "http://twitter.com/i0n1c/statuses/16373156076"
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"
},
{
"name": "HPSBOV02763",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
},
{
"name": "php-splobjectstorage-code-execution(59610)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59610"
},
{
"name": "DSA-2089",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2089"
},
{
"name": "APPLE-SA-2010-08-24-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html"
},
{
"name": "40948",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/40948"
},
{
"name": "SSRT100826",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=605641",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=605641"
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html"
},
{
"name": "http://support.apple.com/kb/HT4312",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4312"
},
{
"name": "http://twitter.com/i0n1c/statuses/16447867829",
"url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2",
"refsource": "MISC",
"url": "http://twitter.com/i0n1c/statuses/16447867829"
"name": "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
},
{
"name": "SUSE-SR:2010:017",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"
},
{
"name": "SUSE-SR:2010:018",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html"
},
{
"name": "http://pastebin.com/mXGidCsd",
"url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html",
"refsource": "MISC",
"url": "http://pastebin.com/mXGidCsd"
"name": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html"
},
{
"url": "http://support.apple.com/kb/HT4312",
"refsource": "MISC",
"name": "http://support.apple.com/kb/HT4312"
},
{
"url": "http://pastebin.com/mXGidCsd",
"refsource": "MISC",
"name": "http://pastebin.com/mXGidCsd"
},
{
"url": "http://secunia.com/advisories/40860",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40860"
},
{
"url": "http://twitter.com/i0n1c/statuses/16373156076",
"refsource": "MISC",
"name": "http://twitter.com/i0n1c/statuses/16373156076"
},
{
"url": "http://twitter.com/i0n1c/statuses/16447867829",
"refsource": "MISC",
"name": "http://twitter.com/i0n1c/statuses/16447867829"
},
{
"url": "http://www.debian.org/security/2010/dsa-2089",
"refsource": "MISC",
"name": "http://www.debian.org/security/2010/dsa-2089"
},
{
"url": "http://www.securityfocus.com/bid/40948",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/40948"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59610",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59610"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=605641",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=605641"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2226",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,97 +27,121 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2010:0610",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0610.html"
"url": "http://secunia.com/advisories/43315",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43315"
},
{
"name": "[xfs] 20100616 Re: [Security] XFS swapext ioctl minor security issues",
"refsource": "MLIST",
"url": "http://archives.free.net.ph/message/20100616.135735.40f53a32.en.html"
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1817176a86352f65210139d4c794ad2d19fc6b63",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1817176a86352f65210139d4c794ad2d19fc6b63"
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
"refsource": "MISC",
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"name": "USN-1000-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1000-1"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:198",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:198"
},
{
"name": "[oss-security] 20100618 Re: CVE request - kernel: xfs swapext ioctl issue",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127687486331790&w=2"
"url": "http://archives.free.net.ph/message/20100616.130710.301704aa.en.html",
"refsource": "MISC",
"name": "http://archives.free.net.ph/message/20100616.130710.301704aa.en.html"
},
{
"name": "MDVSA-2010:198",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:198"
"url": "http://archives.free.net.ph/message/20100616.135735.40f53a32.en.html",
"refsource": "MISC",
"name": "http://archives.free.net.ph/message/20100616.135735.40f53a32.en.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=605158",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=605158"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1817176a86352f65210139d4c794ad2d19fc6b63",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1817176a86352f65210139d4c794ad2d19fc6b63"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html"
},
{
"name": "SUSE-SA:2011:007",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
},
{
"name": "SUSE-SA:2010:060",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html"
"url": "http://marc.info/?l=oss-security&m=127677135609357&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=127677135609357&w=2"
},
{
"name": "ADV-2011-0298",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0298"
"url": "http://marc.info/?l=oss-security&m=127687486331790&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=127687486331790&w=2"
},
{
"name": "[oss-security] 20100617 CVE request - kernel: xfs swapext ioctl issue",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127677135609357&w=2"
"url": "http://www.debian.org/security/2010/dsa-2094",
"refsource": "MISC",
"name": "http://www.debian.org/security/2010/dsa-2094"
},
{
"name": "43315",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43315"
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35"
},
{
"name": "[xfs] 20100616 Re: [Security] XFS swapext ioctl minor security issues",
"refsource": "MLIST",
"url": "http://archives.free.net.ph/message/20100616.130710.301704aa.en.html"
"url": "http://www.redhat.com/support/errata/RHSA-2010-0610.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0610.html"
},
{
"name": "DSA-2094",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2094"
"url": "http://www.securityfocus.com/bid/40920",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/40920"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
"url": "http://www.ubuntu.com/usn/USN-1000-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1000-1"
},
{
"name": "40920",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/40920"
"url": "http://www.vupen.com/english/advisories/2011/0298",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0298"
},
{
"name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=605158",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=605158"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2228",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,77 +27,101 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes",
"refsource": "CONFIRM",
"url": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
},
{
"name": "FEDORA-2010-10286",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html"
"url": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes",
"refsource": "MISC",
"name": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes"
},
{
"name": "ADV-2010-1571",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1571"
"url": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes",
"refsource": "MISC",
"name": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes"
},
{
"name": "[oss-security] 20100621 Re: CVE request: moodle 1.9.9/1.8.13 multiple vulnerabilities",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/06/21/2"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html"
},
{
"name": "40352",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40352"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html"
},
{
"name": "ADV-2010-1530",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1530"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html"
},
{
"name": "FEDORA-2010-10321",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html"
"url": "http://moodle.org/mod/forum/discuss.php?d=152366",
"refsource": "MISC",
"name": "http://moodle.org/mod/forum/discuss.php?d=152366"
},
{
"name": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes",
"refsource": "CONFIRM",
"url": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes"
"url": "http://secunia.com/advisories/40248",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40248"
},
{
"name": "40248",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40248"
"url": "http://secunia.com/advisories/40352",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40352"
},
{
"name": "FEDORA-2010-10291",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html"
"url": "http://tracker.moodle.org/browse/MDL-22040",
"refsource": "MISC",
"name": "http://tracker.moodle.org/browse/MDL-22040"
},
{
"name": "http://moodle.org/mod/forum/discuss.php?d=152366",
"refsource": "CONFIRM",
"url": "http://moodle.org/mod/forum/discuss.php?d=152366"
"url": "http://www.openwall.com/lists/oss-security/2010/06/21/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/06/21/2"
},
{
"name": "http://tracker.moodle.org/browse/MDL-22040",
"refsource": "CONFIRM",
"url": "http://tracker.moodle.org/browse/MDL-22040"
"url": "http://www.vupen.com/english/advisories/2010/1530",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/1530"
},
{
"name": "SUSE-SR:2010:014",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
"url": "http://www.vupen.com/english/advisories/2010/1571",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/1571"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=605809",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=605809"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=605809",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=605809"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2229",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,87 +27,111 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://cvs.moodle.org/moodle/blog/lib.php?r1=1.62.2.9&r2=1.62.2.10",
"refsource": "CONFIRM",
"url": "http://cvs.moodle.org/moodle/blog/lib.php?r1=1.62.2.9&r2=1.62.2.10"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
},
{
"name": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes",
"refsource": "CONFIRM",
"url": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes"
"url": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes",
"refsource": "MISC",
"name": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes"
},
{
"name": "FEDORA-2010-10286",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html"
"url": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes",
"refsource": "MISC",
"name": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes"
},
{
"name": "ADV-2010-1571",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1571"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html"
},
{
"name": "[oss-security] 20100621 Re: CVE request: moodle 1.9.9/1.8.13 multiple vulnerabilities",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/06/21/2"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html"
},
{
"name": "40352",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40352"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html"
},
{
"name": "ADV-2010-1530",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1530"
"url": "http://secunia.com/advisories/40248",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40248"
},
{
"name": "FEDORA-2010-10321",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html"
"url": "http://secunia.com/advisories/40352",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40352"
},
{
"name": "http://moodle.org/mod/forum/discuss.php?d=152367",
"refsource": "CONFIRM",
"url": "http://moodle.org/mod/forum/discuss.php?d=152367"
"url": "http://www.openwall.com/lists/oss-security/2010/06/21/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/06/21/2"
},
{
"name": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes",
"refsource": "CONFIRM",
"url": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes"
"url": "http://www.vupen.com/english/advisories/2010/1530",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/1530"
},
{
"name": "40248",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40248"
"url": "http://www.vupen.com/english/advisories/2010/1571",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/1571"
},
{
"name": "FEDORA-2010-10291",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html"
"url": "http://cvs.moodle.org/moodle/blog/lib.php?r1=1.62.2.9&r2=1.62.2.10",
"refsource": "MISC",
"name": "http://cvs.moodle.org/moodle/blog/lib.php?r1=1.62.2.9&r2=1.62.2.10"
},
{
"name": "SUSE-SR:2010:014",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
"url": "http://cvs.moodle.org/moodle/blog/lib.php?r1=1.80.2.20&r2=1.80.2.21",
"refsource": "MISC",
"name": "http://cvs.moodle.org/moodle/blog/lib.php?r1=1.80.2.20&r2=1.80.2.21"
},
{
"name": "http://tracker.moodle.org/browse/MDL-22631",
"refsource": "CONFIRM",
"url": "http://tracker.moodle.org/browse/MDL-22631"
"url": "http://moodle.org/mod/forum/discuss.php?d=152367",
"refsource": "MISC",
"name": "http://moodle.org/mod/forum/discuss.php?d=152367"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=605809",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=605809"
"url": "http://tracker.moodle.org/browse/MDL-22631",
"refsource": "MISC",
"name": "http://tracker.moodle.org/browse/MDL-22631"
},
{
"name": "http://cvs.moodle.org/moodle/blog/lib.php?r1=1.80.2.20&r2=1.80.2.21",
"refsource": "CONFIRM",
"url": "http://cvs.moodle.org/moodle/blog/lib.php?r1=1.80.2.20&r2=1.80.2.21"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=605809",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=605809"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2230",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,87 +27,111 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://tracker.moodle.org/browse/MDL-22042",
"refsource": "CONFIRM",
"url": "http://tracker.moodle.org/browse/MDL-22042"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
},
{
"name": "http://cvs.moodle.org/moodle/lib/weblib.php?r1=1.970.2.171&r2=1.970.2.172",
"refsource": "CONFIRM",
"url": "http://cvs.moodle.org/moodle/lib/weblib.php?r1=1.970.2.171&r2=1.970.2.172"
"url": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes",
"refsource": "MISC",
"name": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes"
},
{
"name": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes",
"refsource": "CONFIRM",
"url": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes"
"url": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes",
"refsource": "MISC",
"name": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes"
},
{
"name": "FEDORA-2010-10286",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html"
},
{
"name": "ADV-2010-1571",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1571"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html"
},
{
"name": "[oss-security] 20100621 Re: CVE request: moodle 1.9.9/1.8.13 multiple vulnerabilities",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/06/21/2"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html"
},
{
"name": "40352",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40352"
"url": "http://secunia.com/advisories/40248",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40248"
},
{
"name": "ADV-2010-1530",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1530"
"url": "http://secunia.com/advisories/40352",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40352"
},
{
"name": "http://moodle.org/mod/forum/discuss.php?d=152368",
"refsource": "CONFIRM",
"url": "http://moodle.org/mod/forum/discuss.php?d=152368"
"url": "http://www.openwall.com/lists/oss-security/2010/06/21/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/06/21/2"
},
{
"name": "FEDORA-2010-10321",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html"
"url": "http://www.vupen.com/english/advisories/2010/1530",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/1530"
},
{
"name": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes",
"refsource": "CONFIRM",
"url": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes"
"url": "http://www.vupen.com/english/advisories/2010/1571",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/1571"
},
{
"name": "40248",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40248"
"url": "http://cvs.moodle.org/moodle/lib/weblib.php?r1=1.812.2.114&r2=1.812.2.115",
"refsource": "MISC",
"name": "http://cvs.moodle.org/moodle/lib/weblib.php?r1=1.812.2.114&r2=1.812.2.115"
},
{
"name": "FEDORA-2010-10291",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html"
"url": "http://cvs.moodle.org/moodle/lib/weblib.php?r1=1.970.2.171&r2=1.970.2.172",
"refsource": "MISC",
"name": "http://cvs.moodle.org/moodle/lib/weblib.php?r1=1.970.2.171&r2=1.970.2.172"
},
{
"name": "http://cvs.moodle.org/moodle/lib/weblib.php?r1=1.812.2.114&r2=1.812.2.115",
"refsource": "CONFIRM",
"url": "http://cvs.moodle.org/moodle/lib/weblib.php?r1=1.812.2.114&r2=1.812.2.115"
"url": "http://moodle.org/mod/forum/discuss.php?d=152368",
"refsource": "MISC",
"name": "http://moodle.org/mod/forum/discuss.php?d=152368"
},
{
"name": "SUSE-SR:2010:014",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
"url": "http://tracker.moodle.org/browse/MDL-22042",
"refsource": "MISC",
"name": "http://tracker.moodle.org/browse/MDL-22042"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=605809",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=605809"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=605809",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=605809"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2231",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,82 +27,106 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes",
"refsource": "CONFIRM",
"url": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
},
{
"name": "FEDORA-2010-10286",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html"
"url": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes",
"refsource": "MISC",
"name": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes"
},
{
"name": "ADV-2010-1571",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1571"
"url": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes",
"refsource": "MISC",
"name": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes"
},
{
"name": "[oss-security] 20100621 Re: CVE request: moodle 1.9.9/1.8.13 multiple vulnerabilities",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/06/21/2"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html"
},
{
"name": "40352",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40352"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html"
},
{
"name": "ADV-2010-1530",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1530"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html"
},
{
"name": "FEDORA-2010-10321",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html"
"url": "http://secunia.com/advisories/40248",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40248"
},
{
"name": "http://moodle.org/mod/forum/discuss.php?d=152369",
"refsource": "CONFIRM",
"url": "http://moodle.org/mod/forum/discuss.php?d=152369"
"url": "http://secunia.com/advisories/40352",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40352"
},
{
"name": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes",
"refsource": "CONFIRM",
"url": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes"
"url": "http://www.openwall.com/lists/oss-security/2010/06/21/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/06/21/2"
},
{
"name": "40248",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40248"
"url": "http://www.vupen.com/english/advisories/2010/1530",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/1530"
},
{
"name": "FEDORA-2010-10291",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html"
"url": "http://www.vupen.com/english/advisories/2010/1571",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/1571"
},
{
"name": "http://tracker.moodle.org/browse/MDL-21688",
"refsource": "CONFIRM",
"url": "http://tracker.moodle.org/browse/MDL-21688"
"url": "http://cvs.moodle.org/moodle/mod/quiz/report/overview/report.php?r1=1.98.2.50&r2=1.98.2.51",
"refsource": "MISC",
"name": "http://cvs.moodle.org/moodle/mod/quiz/report/overview/report.php?r1=1.98.2.50&r2=1.98.2.51"
},
{
"name": "SUSE-SR:2010:014",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
"url": "http://moodle.org/mod/forum/discuss.php?d=152369",
"refsource": "MISC",
"name": "http://moodle.org/mod/forum/discuss.php?d=152369"
},
{
"name": "http://cvs.moodle.org/moodle/mod/quiz/report/overview/report.php?r1=1.98.2.50&r2=1.98.2.51",
"refsource": "CONFIRM",
"url": "http://cvs.moodle.org/moodle/mod/quiz/report/overview/report.php?r1=1.98.2.50&r2=1.98.2.51"
"url": "http://tracker.moodle.org/browse/MDL-21688",
"refsource": "MISC",
"name": "http://tracker.moodle.org/browse/MDL-21688"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=605809",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=605809"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=605809",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=605809"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-4253 OpenOffice.org: heap based buffer overflow in PPT import"
"value": "Heap-based buffer overflow in Impress in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file in an ODF or Microsoft Office document, as demonstrated by a PowerPoint (aka PPT) document."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Heap-based Buffer Overflow",
"cweId": "CWE-122"
"value": "n/a"
}
]
}
@ -32,27 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "1:3.1.1-19.5.el5_5.6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "1:3.2.1-19.6.el6_0.5",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -145,16 +133,6 @@
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0232"
},
{
"url": "https://access.redhat.com/errata/RHSA-2011:0182",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0182"
},
{
"url": "https://access.redhat.com/errata/RHSA-2011:0183",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0183"
},
{
"url": "http://osvdb.org/70717",
"refsource": "MISC",
@ -165,41 +143,11 @@
"refsource": "MISC",
"name": "http://www.openoffice.org/security/cves/CVE-2010-4253.html"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-4253",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-4253"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=658259",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=658259"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.8,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4254",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,72 +27,96 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "SUSE-SR:2011:001",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"
},
{
"name": "42373",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42373"
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html"
},
{
"name": "http://www.mono-project.com/Vulnerabilities#Moonlight_Generic_Constraints_Bypass_Vulnerability",
"refsource": "CONFIRM",
"url": "http://www.mono-project.com/Vulnerabilities#Moonlight_Generic_Constraints_Bypass_Vulnerability"
"url": "http://secunia.com/advisories/42877",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42877"
},
{
"name": "15974",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/15974"
"url": "http://www.vupen.com/english/advisories/2011/0076",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0076"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=655847",
"refsource": "CONFIRM",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=655847"
"url": "http://secunia.com/advisories/42373",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42373"
},
{
"name": "42877",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42877"
"url": "http://www.exploit-db.com/exploits/15974",
"refsource": "MISC",
"name": "http://www.exploit-db.com/exploits/15974"
},
{
"name": "https://github.com/mono/mono/commit/4905ef1130feb26c3150b28b97e4a96752e0d399",
"refsource": "CONFIRM",
"url": "https://github.com/mono/mono/commit/4905ef1130feb26c3150b28b97e4a96752e0d399"
"url": "http://www.mono-project.com/Vulnerabilities#Moonlight_Generic_Constraints_Bypass_Vulnerability",
"refsource": "MISC",
"name": "http://www.mono-project.com/Vulnerabilities#Moonlight_Generic_Constraints_Bypass_Vulnerability"
},
{
"name": "https://github.com/mono/mono/commit/cf1ec146f7c6acdc6697032b3aaafc68ffacdcac",
"refsource": "CONFIRM",
"url": "https://github.com/mono/mono/commit/cf1ec146f7c6acdc6697032b3aaafc68ffacdcac"
"url": "http://www.securityfocus.com/bid/45051",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45051"
},
{
"name": "45051",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45051"
"url": "https://bugzilla.novell.com/show_bug.cgi?id=654136",
"refsource": "MISC",
"name": "https://bugzilla.novell.com/show_bug.cgi?id=654136"
},
{
"name": "ADV-2011-0076",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0076"
"url": "https://bugzilla.novell.com/show_bug.cgi?id=655847",
"refsource": "MISC",
"name": "https://bugzilla.novell.com/show_bug.cgi?id=655847"
},
{
"name": "SUSE-SR:2010:024",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"
"url": "https://github.com/mono/mono/commit/4905ef1130feb26c3150b28b97e4a96752e0d399",
"refsource": "MISC",
"name": "https://github.com/mono/mono/commit/4905ef1130feb26c3150b28b97e4a96752e0d399"
},
{
"name": "https://github.com/mono/mono/commit/65292a69c837b8a5f7a392d34db63de592153358",
"refsource": "CONFIRM",
"url": "https://github.com/mono/mono/commit/65292a69c837b8a5f7a392d34db63de592153358"
"url": "https://github.com/mono/mono/commit/65292a69c837b8a5f7a392d34db63de592153358",
"refsource": "MISC",
"name": "https://github.com/mono/mono/commit/65292a69c837b8a5f7a392d34db63de592153358"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=654136",
"refsource": "CONFIRM",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=654136"
"url": "https://github.com/mono/mono/commit/cf1ec146f7c6acdc6697032b3aaafc68ffacdcac",
"refsource": "MISC",
"name": "https://github.com/mono/mono/commit/cf1ec146f7c6acdc6697032b3aaafc68ffacdcac"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4255",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,52 +27,76 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
"url": "http://secunia.com/advisories/46397",
"refsource": "MISC",
"name": "http://secunia.com/advisories/46397"
},
{
"name": "RHSA-2011:0017",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0017.html"
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"name": "46397",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46397"
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "MISC",
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=658155",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=658155"
"url": "http://secunia.com/advisories/42884",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42884"
},
{
"name": "[oss-security] 20101130 CVE request: xen: x86-64: don't crash Xen upon direct pv guest access",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/11/30/5"
"url": "http://www.redhat.com/support/errata/RHSA-2011-0017.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0017.html"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
"url": "http://lists.xensource.com/archives/html/xen-devel/2010-11/msg01650.html",
"refsource": "MISC",
"name": "http://lists.xensource.com/archives/html/xen-devel/2010-11/msg01650.html"
},
{
"name": "42884",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42884"
"url": "http://openwall.com/lists/oss-security/2010/11/30/5",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/11/30/5"
},
{
"name": "[xen-devel] 20101129 [PATCH] x86-64: don't crash Xen upon direct pv guest access",
"refsource": "MLIST",
"url": "http://lists.xensource.com/archives/html/xen-devel/2010-11/msg01650.html"
"url": "http://openwall.com/lists/oss-security/2010/11/30/8",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/11/30/8"
},
{
"name": "[oss-security] 20101130 Re: CVE request: xen: x86-64: don't crash Xen upon direct pv guest access",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/11/30/8"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=658155",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=658155"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4256",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c66fb347946ebdd5b10908866ecc9fa05ee2cf3d",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c66fb347946ebdd5b10908866ecc9fa05ee2cf3d"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c66fb347946ebdd5b10908866ecc9fa05ee2cf3d",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c66fb347946ebdd5b10908866ecc9fa05ee2cf3d"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37"
"url": "http://openwall.com/lists/oss-security/2010/11/30/6",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/11/30/6"
},
{
"name": "[oss-security] 20101130 Re: CVE request: kernel: pipe_fcntl local DoS",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/11/30/9"
"url": "http://openwall.com/lists/oss-security/2010/11/30/9",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/11/30/9"
},
{
"name": "[oss-security] 20101130 CVE request: kernel: pipe_fcntl local DoS",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/11/30/6"
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4257",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,107 +27,131 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "42844",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42844"
},
{
"name": "http://wordpress.org/news/2010/11/wordpress-3-0-2/",
"refsource": "CONFIRM",
"url": "http://wordpress.org/news/2010/11/wordpress-3-0-2/"
},
{
"name": "DSA-2138",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2138"
},
{
"name": "FEDORA-2010-19329",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052932.html"
},
{
"name": "42753",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42753"
},
{
"name": "http://blog.sjinks.pro/wordpress/858-information-disclosure-via-sql-injection-attack/",
"url": "http://blog.sjinks.pro/wordpress/858-information-disclosure-via-sql-injection-attack/",
"refsource": "MISC",
"url": "http://blog.sjinks.pro/wordpress/858-information-disclosure-via-sql-injection-attack/"
"name": "http://blog.sjinks.pro/wordpress/858-information-disclosure-via-sql-injection-attack/"
},
{
"name": "FEDORA-2010-19290",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052892.html"
},
{
"name": "42871",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42871"
},
{
"name": "ADV-2010-3337",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3337"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605603",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605603"
},
{
"name": "http://core.trac.wordpress.org/changeset/16625",
"refsource": "CONFIRM",
"url": "http://core.trac.wordpress.org/changeset/16625"
},
{
"name": "http://www.xakep.ru/magazine/xa/124/052/1.asp",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605603",
"refsource": "MISC",
"url": "http://www.xakep.ru/magazine/xa/124/052/1.asp"
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605603"
},
{
"name": "45131",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45131"
"url": "http://codex.wordpress.org/Version_3.0.2",
"refsource": "MISC",
"name": "http://codex.wordpress.org/Version_3.0.2"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=659265",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=659265"
"url": "http://core.trac.wordpress.org/changeset/16625",
"refsource": "MISC",
"name": "http://core.trac.wordpress.org/changeset/16625"
},
{
"name": "FEDORA-2010-19296",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052879.html"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052879.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052879.html"
},
{
"name": "FEDORA-2010-19330",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052917.html"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052892.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052892.html"
},
{
"name": "42431",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42431"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052917.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052917.html"
},
{
"name": "http://codex.wordpress.org/Version_3.0.2",
"refsource": "CONFIRM",
"url": "http://codex.wordpress.org/Version_3.0.2"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052932.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052932.html"
},
{
"name": "ADV-2011-0042",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0042"
"url": "http://secunia.com/advisories/42431",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42431"
},
{
"name": "ADV-2011-0057",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0057"
"url": "http://secunia.com/advisories/42753",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42753"
},
{
"url": "http://secunia.com/advisories/42844",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42844"
},
{
"url": "http://secunia.com/advisories/42871",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42871"
},
{
"url": "http://wordpress.org/news/2010/11/wordpress-3-0-2/",
"refsource": "MISC",
"name": "http://wordpress.org/news/2010/11/wordpress-3-0-2/"
},
{
"url": "http://www.debian.org/security/2010/dsa-2138",
"refsource": "MISC",
"name": "http://www.debian.org/security/2010/dsa-2138"
},
{
"url": "http://www.securityfocus.com/bid/45131",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45131"
},
{
"url": "http://www.vupen.com/english/advisories/2010/3337",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/3337"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0042",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0042"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0057",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0057"
},
{
"url": "http://www.xakep.ru/magazine/xa/124/052/1.asp",
"refsource": "MISC",
"name": "http://www.xakep.ru/magazine/xa/124/052/1.asp"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=659265",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=659265"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4258",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,197 +27,221 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20101202 CVE request: kernel: failure to revert address limit override in OOPS error path",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/02/2"
},
{
"name": "43056",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43056"
},
{
"name": "SUSE-SA:2011:004",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html"
},
{
"name": "42778",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42778"
},
{
"name": "[oss-security] 20101202 kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/02/3"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=33dd94ae1ccbfb7bf0fb6c692bc3d1c4269e6177",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=33dd94ae1ccbfb7bf0fb6c692bc3d1c4269e6177"
},
{
"name": "42801",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42801"
},
{
"name": "SUSE-SA:2011:002",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html"
},
{
"name": "http://blog.nelhage.com/2010/12/cve-2010-4258-from-dos-to-privesc/",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html",
"refsource": "MISC",
"url": "http://blog.nelhage.com/2010/12/cve-2010-4258-from-dos-to-privesc/"
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
},
{
"name": "[oss-security] 20101209 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/09/4"
"url": "http://www.vupen.com/english/advisories/2011/0298",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0298"
},
{
"name": "FEDORA-2010-18983",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"
},
{
"name": "SUSE-SA:2011:001",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html"
},
{
"name": "42932",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42932"
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html"
},
{
"name": "20101207 Linux kernel exploit",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0086.html"
"url": "http://secunia.com/advisories/42778",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42778"
},
{
"name": "ADV-2011-0124",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0124"
"url": "http://secunia.com/advisories/42801",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42801"
},
{
"name": "[linux-kernel] 20101201 [PATCH v2] do_exit(): Make sure we run with get_fs() == USER_DS.",
"refsource": "MLIST",
"url": "http://marc.info/?l=linux-kernel&m=129117048916957&w=2"
"url": "http://secunia.com/advisories/42932",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42932"
},
{
"name": "SUSE-SA:2011:007",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"
},
{
"name": "ADV-2010-3321",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3321"
"url": "http://www.vupen.com/english/advisories/2011/0012",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0012"
},
{
"name": "[oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/08/9"
"url": "http://www.vupen.com/english/advisories/2011/0124",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0124"
},
{
"name": "ADV-2011-0298",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0298"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2"
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"
},
{
"name": "[oss-security] 20101209 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/09/14"
"url": "http://secunia.com/advisories/42745",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42745"
},
{
"name": "SUSE-SA:2011:005",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00007.html"
"url": "http://secunia.com/advisories/43291",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43291"
},
{
"name": "http://code.google.com/p/chromium-os/issues/detail?id=10234",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium-os/issues/detail?id=10234"
"url": "http://www.vupen.com/english/advisories/2010/3321",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/3321"
},
{
"name": "ADV-2011-0375",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0375"
"url": "http://www.vupen.com/english/advisories/2011/0375",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0375"
},
{
"name": "[linux-kernel] 20101201 Re: [PATCH v2] do_exit(): Make sure we run with get_fs() == USER_DS.",
"refsource": "MLIST",
"url": "https://lkml.org/lkml/2010/12/1/543"
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00007.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00007.html"
},
{
"name": "http://googlechromereleases.blogspot.com/2011/01/chrome-os-beta-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2011/01/chrome-os-beta-channel-update.html"
"url": "http://secunia.com/advisories/43056",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43056"
},
{
"name": "ADV-2011-0012",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0012"
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2"
},
{
"name": "SUSE-SA:2011:008",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"
"url": "http://www.vupen.com/english/advisories/2011/0213",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0213"
},
{
"name": "[oss-security] 20101202 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/02/4"
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0086.html",
"refsource": "MISC",
"name": "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0086.html"
},
{
"name": "MDVSA-2011:029",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"
"url": "http://blog.nelhage.com/2010/12/cve-2010-4258-from-dos-to-privesc/",
"refsource": "MISC",
"name": "http://blog.nelhage.com/2010/12/cve-2010-4258-from-dos-to-privesc/"
},
{
"name": "42745",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42745"
"url": "http://code.google.com/p/chromium-os/issues/detail?id=10234",
"refsource": "MISC",
"name": "http://code.google.com/p/chromium-os/issues/detail?id=10234"
},
{
"name": "[oss-security] 20101202 Re: CVE request: kernel: failure to revert address limit override in OOPS error path",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/02/7"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=33dd94ae1ccbfb7bf0fb6c692bc3d1c4269e6177",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=33dd94ae1ccbfb7bf0fb6c692bc3d1c4269e6177"
},
{
"name": "[oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/08/5"
"url": "http://googlechromereleases.blogspot.com/2011/01/chrome-os-beta-channel-update.html",
"refsource": "MISC",
"name": "http://googlechromereleases.blogspot.com/2011/01/chrome-os-beta-channel-update.html"
},
{
"name": "43291",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43291"
"url": "http://marc.info/?l=linux-kernel&m=129117048916957&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=linux-kernel&m=129117048916957&w=2"
},
{
"name": "ADV-2011-0213",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0213"
"url": "http://openwall.com/lists/oss-security/2010/12/02/2",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/02/2"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=659567",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=659567"
"url": "http://openwall.com/lists/oss-security/2010/12/02/3",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/02/3"
},
{
"name": "[oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/08/4"
"url": "http://openwall.com/lists/oss-security/2010/12/02/4",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/02/4"
},
{
"url": "http://openwall.com/lists/oss-security/2010/12/02/7",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/02/7"
},
{
"url": "http://openwall.com/lists/oss-security/2010/12/08/4",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/08/4"
},
{
"url": "http://openwall.com/lists/oss-security/2010/12/08/5",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/08/5"
},
{
"url": "http://openwall.com/lists/oss-security/2010/12/08/9",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/08/9"
},
{
"url": "http://openwall.com/lists/oss-security/2010/12/09/14",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/09/14"
},
{
"url": "http://openwall.com/lists/oss-security/2010/12/09/4",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/09/4"
},
{
"url": "https://lkml.org/lkml/2010/12/1/543",
"refsource": "MISC",
"name": "https://lkml.org/lkml/2010/12/1/543"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=659567",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=659567"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4259",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,62 +27,86 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "45162",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45162"
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605537",
"refsource": "MISC",
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605537"
},
{
"name": "[oss-security] 20101202 Re: CVE Request -- FontForge: Stack-based buffer overflow by processing specially-crafted CHARSET_REGISTRY font file header",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/02/8"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052201.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052201.html"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605537",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605537"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052219.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052219.html"
},
{
"name": "DSA-2253",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2253"
"url": "http://openwall.com/lists/oss-security/2010/12/02/5",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/02/5"
},
{
"name": "FEDORA-2010-18577",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052219.html"
"url": "http://openwall.com/lists/oss-security/2010/12/02/8",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/02/8"
},
{
"name": "42577",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42577"
"url": "http://secunia.com/advisories/42577",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42577"
},
{
"name": "FEDORA-2010-18573",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052201.html"
"url": "http://www.debian.org/security/2011/dsa-2253",
"refsource": "MISC",
"name": "http://www.debian.org/security/2011/dsa-2253"
},
{
"name": "[oss-security] 20101202 CVE Request -- FontForge: Stack-based buffer overflow by processing specially-crafted CHARSET_REGISTRY font file header",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/02/5"
"url": "http://www.exploit-db.com/exploits/15732",
"refsource": "MISC",
"name": "http://www.exploit-db.com/exploits/15732"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=659359",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=659359"
"url": "http://www.securityfocus.com/bid/45162",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45162"
},
{
"name": "15732",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/15732"
"url": "http://www.vupen.com/english/advisories/2010/3200",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/3200"
},
{
"name": "ADV-2010-3200",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3200"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=659359",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=659359"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4260",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,127 +27,151 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "42555",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42555"
},
{
"name": "ADV-2010-3137",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3137"
},
{
"name": "FEDORA-2010-18564",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052401.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=659861",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=659861"
},
{
"name": "USN-1031-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1031-1"
},
{
"name": "ADV-2010-3185",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3185"
},
{
"name": "1024818",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024818"
},
{
"name": "[oss-security] 20101203 clamav 0.96.5 released",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/03/1"
},
{
"name": "APPLE-SA-2011-03-21-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
},
{
"name": "42523",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42523"
},
{
"name": "FEDORA-2010-18568",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051905.html"
},
{
"name": "42426",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42426"
},
{
"name": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2358",
"refsource": "CONFIRM",
"url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2358"
},
{
"name": "42720",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42720"
},
{
"name": "[oss-security] 20101203 Re: clamav 0.96.5 released",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/03/6"
},
{
"name": "MDVSA-2010:249",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:249"
},
{
"name": "http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob_plain;f=ChangeLog;hb=master",
"refsource": "CONFIRM",
"url": "http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob_plain;f=ChangeLog;hb=master"
},
{
"name": "45152",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45152"
},
{
"name": "SUSE-SR:2010:024",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"
},
{
"name": "http://xorl.wordpress.com/2010/12/06/cve-2010-4260-clamav-multiple-pdf-vulnerabilities/",
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html",
"refsource": "MISC",
"url": "http://xorl.wordpress.com/2010/12/06/cve-2010-4260-clamav-multiple-pdf-vulnerabilities/"
"name": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
},
{
"name": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2396",
"refsource": "CONFIRM",
"url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2396"
"url": "http://support.apple.com/kb/HT4581",
"refsource": "MISC",
"name": "http://support.apple.com/kb/HT4581"
},
{
"name": "ADV-2010-3135",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3135"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"
},
{
"name": "[oss-security] 20101203 Re: clamav 0.96.5 released",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/03/3"
"url": "http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob_plain%3Bf=ChangeLog%3Bhb=master",
"refsource": "MISC",
"name": "http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob_plain%3Bf=ChangeLog%3Bhb=master"
},
{
"name": "http://support.apple.com/kb/HT4581",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4581"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051905.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051905.html"
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052401.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052401.html"
},
{
"url": "http://openwall.com/lists/oss-security/2010/12/03/1",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/03/1"
},
{
"url": "http://openwall.com/lists/oss-security/2010/12/03/3",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/03/3"
},
{
"url": "http://openwall.com/lists/oss-security/2010/12/03/6",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/03/6"
},
{
"url": "http://secunia.com/advisories/42426",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42426"
},
{
"url": "http://secunia.com/advisories/42523",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42523"
},
{
"url": "http://secunia.com/advisories/42555",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42555"
},
{
"url": "http://secunia.com/advisories/42720",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42720"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:249",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:249"
},
{
"url": "http://www.securityfocus.com/bid/45152",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45152"
},
{
"url": "http://www.securitytracker.com/id?1024818",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1024818"
},
{
"url": "http://www.ubuntu.com/usn/USN-1031-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1031-1"
},
{
"url": "http://www.vupen.com/english/advisories/2010/3135",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/3135"
},
{
"url": "http://www.vupen.com/english/advisories/2010/3137",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/3137"
},
{
"url": "http://www.vupen.com/english/advisories/2010/3185",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/3185"
},
{
"url": "http://xorl.wordpress.com/2010/12/06/cve-2010-4260-clamav-multiple-pdf-vulnerabilities/",
"refsource": "MISC",
"name": "http://xorl.wordpress.com/2010/12/06/cve-2010-4260-clamav-multiple-pdf-vulnerabilities/"
},
{
"url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2358",
"refsource": "MISC",
"name": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2358"
},
{
"url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2396",
"refsource": "MISC",
"name": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2396"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=659861",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=659861"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4261",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Off-by-one error in the icon_cb function in pe_icons.c in libclamav in ClamAV before 0.96.5 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors. NOTE: some of these details are obtained from third party information."
"value": "Off-by-one error in the icon_cb function in pe_icons.c in libclamav in ClamAV before 0.96.5 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors. NOTE: some of these details are obtained from third party information."
}
]
},
@ -50,122 +27,146 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "42555",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42555"
},
{
"name": "ADV-2010-3137",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3137"
},
{
"name": "FEDORA-2010-18564",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052401.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=659861",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=659861"
},
{
"name": "USN-1031-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1031-1"
},
{
"name": "ADV-2010-3185",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3185"
},
{
"name": "1024818",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024818"
},
{
"name": "[oss-security] 20101203 clamav 0.96.5 released",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/03/1"
},
{
"name": "APPLE-SA-2011-03-21-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
},
{
"name": "http://xorl.wordpress.com/2010/12/05/cve-2010-4261-clamav-icon_cb-off-by-one/",
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html",
"refsource": "MISC",
"url": "http://xorl.wordpress.com/2010/12/05/cve-2010-4261-clamav-icon_cb-off-by-one/"
"name": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
},
{
"name": "42523",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42523"
"url": "http://support.apple.com/kb/HT4581",
"refsource": "MISC",
"name": "http://support.apple.com/kb/HT4581"
},
{
"name": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2344",
"refsource": "CONFIRM",
"url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2344"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"
},
{
"name": "FEDORA-2010-18568",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051905.html"
"url": "http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob_plain%3Bf=ChangeLog%3Bhb=master",
"refsource": "MISC",
"name": "http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob_plain%3Bf=ChangeLog%3Bhb=master"
},
{
"name": "42426",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42426"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051905.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051905.html"
},
{
"name": "42720",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42720"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052401.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052401.html"
},
{
"name": "[oss-security] 20101203 Re: clamav 0.96.5 released",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/03/6"
"url": "http://openwall.com/lists/oss-security/2010/12/03/1",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/03/1"
},
{
"name": "MDVSA-2010:249",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:249"
"url": "http://openwall.com/lists/oss-security/2010/12/03/3",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/03/3"
},
{
"name": "http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob_plain;f=ChangeLog;hb=master",
"refsource": "CONFIRM",
"url": "http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob_plain;f=ChangeLog;hb=master"
"url": "http://openwall.com/lists/oss-security/2010/12/03/6",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/03/6"
},
{
"name": "45152",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45152"
"url": "http://secunia.com/advisories/42426",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42426"
},
{
"name": "SUSE-SR:2010:024",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"
"url": "http://secunia.com/advisories/42523",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42523"
},
{
"name": "ADV-2010-3135",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3135"
"url": "http://secunia.com/advisories/42555",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42555"
},
{
"name": "[oss-security] 20101203 Re: clamav 0.96.5 released",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/03/3"
"url": "http://secunia.com/advisories/42720",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42720"
},
{
"name": "http://support.apple.com/kb/HT4581",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4581"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:249",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:249"
},
{
"url": "http://www.securityfocus.com/bid/45152",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45152"
},
{
"url": "http://www.securitytracker.com/id?1024818",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1024818"
},
{
"url": "http://www.ubuntu.com/usn/USN-1031-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1031-1"
},
{
"url": "http://www.vupen.com/english/advisories/2010/3135",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/3135"
},
{
"url": "http://www.vupen.com/english/advisories/2010/3137",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/3137"
},
{
"url": "http://www.vupen.com/english/advisories/2010/3185",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/3185"
},
{
"url": "http://xorl.wordpress.com/2010/12/05/cve-2010-4261-clamav-icon_cb-off-by-one/",
"refsource": "MISC",
"name": "http://xorl.wordpress.com/2010/12/05/cve-2010-4261-clamav-icon_cb-off-by-one/"
},
{
"url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2344",
"refsource": "MISC",
"name": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2344"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=659861",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=659861"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4262",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,57 +27,81 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20101206 Re: CVE Request -- Xfig: Stack-based buffer overflow by processing FIG image with crafted color definition",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/12/06/8"
},
{
"name": "ADV-2010-3232",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3232"
},
{
"name": "42579",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42579"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=659676",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=659676"
},
{
"name": "MDVSA-2011:010",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:010"
},
{
"name": "45177",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45177"
},
{
"name": "ADV-2011-0108",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0108"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=657981",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052247.html",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=657981"
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052247.html"
},
{
"name": "FEDORA-2010-18589",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052247.html"
"url": "http://secunia.com/advisories/42579",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42579"
},
{
"name": "[oss-security] 20101203 CVE Request -- Xfig: Stack-based buffer overflow by processing FIG image with crafted color definition",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/12/03/2"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:010",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:010"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/12/03/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/12/03/2"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/12/06/8",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/12/06/8"
},
{
"url": "http://www.securityfocus.com/bid/45177",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45177"
},
{
"url": "http://www.vupen.com/english/advisories/2010/3232",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/3232"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0108",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0108"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=657981",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=657981"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=659676",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=659676"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-3639",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368."
"value": "The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368."
}
]
},
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=752080",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=752080"
"url": "http://rhn.redhat.com/errata/RHSA-2012-0128.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-0128.html"
},
{
"name": "RHSA-2012:0128",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0128.html"
"url": "http://svn.apache.org/viewvc?view=revision&revision=1188745",
"refsource": "MISC",
"name": "http://svn.apache.org/viewvc?view=revision&revision=1188745"
},
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=1188745",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1188745"
"url": "http://www.debian.org/security/2012/dsa-2405",
"refsource": "MISC",
"name": "http://www.debian.org/security/2012/dsa-2405"
},
{
"name": "DSA-2405",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2405"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=752080",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=752080"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4078",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,37 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://trac.roundcube.net/ticket/1488086",
"refsource": "CONFIRM",
"url": "http://trac.roundcube.net/ticket/1488086"
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041",
"refsource": "MISC",
"name": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
},
{
"name": "HPSBMU02786",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
"url": "http://openwall.com/lists/oss-security/2011/10/26/6",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/10/26/6"
},
{
"name": "webmail-uri-dos(71025)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71025"
"url": "http://trac.roundcube.net/ticket/1488086",
"refsource": "MISC",
"name": "http://trac.roundcube.net/ticket/1488086"
},
{
"name": "50402",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/50402"
"url": "http://www.securityfocus.com/bid/50402",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/50402"
},
{
"name": "[oss-security] 20111026 Re: CVE Request -- Round Cube Webmail -- DoS (unavailability to access user's INBOX) after receiving an email message with the URL in the Subject",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/10/26/6"
},
{
"name": "SSRT100877",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71025",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71025"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4079",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,57 +27,81 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "GLSA-201406-36",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201406-36.xml"
},
{
"name": "[oss-security] 20111026 CVE Request: openldap2 UTF8StringNormalize() can cause a (one-byte) buffer overflow",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/10/26/5"
},
{
"name": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=7059;selectid=7059",
"url": "http://security.gentoo.org/glsa/glsa-201406-36.xml",
"refsource": "MISC",
"url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=7059;selectid=7059"
"name": "http://security.gentoo.org/glsa/glsa-201406-36.xml"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=749324",
"url": "http://secunia.com/advisories/46599",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=749324"
"name": "http://secunia.com/advisories/46599"
},
{
"name": "USN-1266-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1266-1"
},
{
"name": "46599",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46599"
},
{
"name": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commitdiff;h=507238713b71208ec4f262f312cb495a302df9e9",
"url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commitdiff%3Bh=507238713b71208ec4f262f312cb495a302df9e9",
"refsource": "MISC",
"url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commitdiff;h=507238713b71208ec4f262f312cb495a302df9e9"
"name": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commitdiff%3Bh=507238713b71208ec4f262f312cb495a302df9e9"
},
{
"name": "50384",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/50384"
"url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=7059%3Bselectid=7059",
"refsource": "MISC",
"name": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=7059%3Bselectid=7059"
},
{
"name": "openldap-utf8stringnormalize-dos(70991)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70991"
"url": "http://www.openwall.com/lists/oss-security/2011/10/26/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/10/26/5"
},
{
"name": "[oss-security] 20111026 Re: CVE Request: openldap2 UTF8StringNormalize() can cause a (one-byte) buffer overflow",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/10/26/9"
"url": "http://www.openwall.com/lists/oss-security/2011/10/26/9",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/10/26/9"
},
{
"url": "http://www.securityfocus.com/bid/50384",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/50384"
},
{
"url": "http://www.ubuntu.com/usn/USN-1266-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1266-1"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70991",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70991"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=749324",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=749324"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4080",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://github.com/torvalds/linux/commit/bfdc0b497faa82a0ba2f9dddcf109231dd519fcc",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/bfdc0b497faa82a0ba2f9dddcf109231dd519fcc"
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39",
"refsource": "MISC",
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"
},
{
"name": "[oss-security] 20111026 Re: CVE Request -- kernel: sysctl: restrict write access to dmesg_restrict",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/10/26/10"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bfdc0b497faa82a0ba2f9dddcf109231dd519fcc",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bfdc0b497faa82a0ba2f9dddcf109231dd519fcc"
},
{
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39",
"refsource": "CONFIRM",
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"
"url": "http://www.openwall.com/lists/oss-security/2011/10/26/10",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/10/26/10"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bfdc0b497faa82a0ba2f9dddcf109231dd519fcc",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bfdc0b497faa82a0ba2f9dddcf109231dd519fcc"
"url": "https://github.com/torvalds/linux/commit/bfdc0b497faa82a0ba2f9dddcf109231dd519fcc",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/bfdc0b497faa82a0ba2f9dddcf109231dd519fcc"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2011-4081 kernel: crypto: ghash: null pointer deref if no key is set"
"value": "crypto/ghash-generic.c in the Linux kernel before 3.1 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact by triggering a failed or missing ghash_setkey function call, followed by a (1) ghash_update function call or (2) ghash_final function call, as demonstrated by a write operation on an AF_ALG socket."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "NULL Pointer Dereference",
"cweId": "CWE-476"
"value": "n/a"
}
]
}
@ -32,27 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 6",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:2.6.32-220.7.1.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise MRG 2",
"version": {
"version_data": [
{
"version_value": "0:2.6.33.9-rt31.79.el6rt",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -70,16 +58,6 @@
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:0010",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:0010"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:0350",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:0350"
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7ed47b7d142ec99ad6880bbbec51e9f12b3af74c",
"refsource": "MISC",
@ -91,44 +69,14 @@
"name": "http://www.openwall.com/lists/oss-security/2011/10/27/2"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2011-4081",
"url": "https://github.com/torvalds/linux/commit/7ed47b7d142ec99ad6880bbbec51e9f12b3af74c",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2011-4081"
"name": "https://github.com/torvalds/linux/commit/7ed47b7d142ec99ad6880bbbec51e9f12b3af74c"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=749475",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=749475"
},
{
"url": "https://github.com/torvalds/linux/commit/7ed47b7d142ec99ad6880bbbec51e9f12b3af74c",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/7ed47b7d142ec99ad6880bbbec51e9f12b3af74c"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.9,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4088",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -39,6 +39,7 @@
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "2.0.8"
}
]
@ -53,14 +54,14 @@
"references": {
"reference_data": [
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071027.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071027.html",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071027.html"
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071027.html"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71871",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71871",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71871"
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71871"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4089",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,32 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "20111025 Re: Symlink vulnerabilities",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2011/Oct/804"
"url": "http://seclists.org/fulldisclosure/2011/Oct/804",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2011/Oct/804"
},
{
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=632862",
"refsource": "CONFIRM",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=632862"
"url": "http://www.exploit-db.com/exploits/18147",
"refsource": "MISC",
"name": "http://www.exploit-db.com/exploits/18147"
},
{
"name": "USN-1308-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1308-1"
"url": "http://www.openwall.com/lists/oss-security/2011/10/28/16",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/10/28/16"
},
{
"name": "18147",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/18147"
"url": "http://www.ubuntu.com/usn/USN-1308-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1308-1"
},
{
"name": "[oss-security] 20111028 Re: Request for CVE Identifier: bzexe insecure\ttemporary file",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/10/28/16"
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=632862",
"refsource": "MISC",
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=632862"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4091",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,42 +27,66 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://git.0x539.de/?p=net6.git;a=commitdiff;h=84afca022f063f89bfcd4bb32b1ee911f555abf1;hp=ac61d7fb42a1f977fb527e024bede319c4a9e169",
"refsource": "CONFIRM",
"url": "http://git.0x539.de/?p=net6.git;a=commitdiff;h=84afca022f063f89bfcd4bb32b1ee911f555abf1;hp=ac61d7fb42a1f977fb527e024bede319c4a9e169"
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
"refsource": "MISC",
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
"url": "http://git.0x539.de/?p=net6.git%3Ba=commitdiff%3Bh=84afca022f063f89bfcd4bb32b1ee911f555abf1%3Bhp=ac61d7fb42a1f977fb527e024bede319c4a9e169",
"refsource": "MISC",
"name": "http://git.0x539.de/?p=net6.git%3Ba=commitdiff%3Bh=84afca022f063f89bfcd4bb32b1ee911f555abf1%3Bhp=ac61d7fb42a1f977fb527e024bede319c4a9e169"
},
{
"name": "openSUSE-SU-2012:0008",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2012-01/msg00044.html"
"url": "http://lists.opensuse.org/opensuse-updates/2012-01/msg00044.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2012-01/msg00044.html"
},
{
"name": "openSUSE-SU-2012:0040",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2012-01/msg00054.html"
"url": "http://lists.opensuse.org/opensuse-updates/2012-01/msg00054.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2012-01/msg00054.html"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=727708",
"refsource": "CONFIRM",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=727708"
"url": "http://www.openwall.com/lists/oss-security/2011/10/31/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/10/31/1"
},
{
"name": "[oss-security] 20111031 Re: CVE request: 3 flaws in libobby and libnet6",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/10/31/1"
"url": "https://bugzilla.novell.com/show_bug.cgi?id=727708",
"refsource": "MISC",
"name": "https://bugzilla.novell.com/show_bug.cgi?id=727708"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=750632",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750632"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750632",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=750632"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4099",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,22 +27,46 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=722694",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=722694"
"url": "http://rhn.redhat.com/errata/RHSA-2011-1694.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2011-1694.html"
},
{
"name": "https://sites.google.com/site/fullycapable/release-notes-for-libcap/releasenotesfor222",
"refsource": "CONFIRM",
"url": "https://sites.google.com/site/fullycapable/release-notes-for-libcap/releasenotesfor222"
"url": "https://sites.google.com/site/fullycapable/release-notes-for-libcap/releasenotesfor222",
"refsource": "MISC",
"name": "https://sites.google.com/site/fullycapable/release-notes-for-libcap/releasenotesfor222"
},
{
"name": "RHSA-2011:1694",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2011-1694.html"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=722694",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=722694"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4100",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,57 +27,81 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=750643",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750643"
"url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=39140",
"refsource": "MISC",
"name": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=39140"
},
{
"name": "50479",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/50479"
"url": "http://openwall.com/lists/oss-security/2011/11/01/9",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/11/01/9"
},
{
"name": "http://www.wireshark.org/security/wnpa-sec-2011-17.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2011-17.html"
"url": "http://osvdb.org/76768",
"refsource": "MISC",
"name": "http://osvdb.org/76768"
},
{
"name": "46644",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46644"
"url": "http://secunia.com/advisories/46644",
"refsource": "MISC",
"name": "http://secunia.com/advisories/46644"
},
{
"name": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=39140",
"refsource": "CONFIRM",
"url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=39140"
"url": "http://www.securityfocus.com/bid/50479",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/50479"
},
{
"name": "76768",
"refsource": "OSVDB",
"url": "http://osvdb.org/76768"
"url": "http://www.wireshark.org/security/wnpa-sec-2011-17.html",
"refsource": "MISC",
"name": "http://www.wireshark.org/security/wnpa-sec-2011-17.html"
},
{
"name": "oval:org.mitre.oval:def:14833",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14833"
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6351",
"refsource": "MISC",
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6351"
},
{
"name": "[oss-security] 20111101 Re: CVE request for wireshark flaws",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/11/01/9"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71090",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71090"
},
{
"name": "wireshark-csn1-dissector-dos(71090)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71090"
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14833",
"refsource": "MISC",
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14833"
},
{
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6351",
"refsource": "CONFIRM",
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6351"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750643",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=750643"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3365",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,57 +27,81 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "1027286",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027286"
"url": "http://www.php.net/ChangeLog-5.php",
"refsource": "MISC",
"name": "http://www.php.net/ChangeLog-5.php"
},
{
"name": "openSUSE-SU-2012:0976",
"refsource": "SUSE",
"url": "https://hermes.opensuse.org/messages/15376003"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00021.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00021.html"
},
{
"name": "51178",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51178"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00022.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00022.html"
},
{
"name": "54612",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/54612"
"url": "http://osvdb.org/84100",
"refsource": "MISC",
"name": "http://osvdb.org/84100"
},
{
"name": "49969",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49969"
"url": "http://secunia.com/advisories/49969",
"refsource": "MISC",
"name": "http://secunia.com/advisories/49969"
},
{
"name": "http://www.php.net/ChangeLog-5.php",
"refsource": "CONFIRM",
"url": "http://www.php.net/ChangeLog-5.php"
"url": "http://secunia.com/advisories/51178",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51178"
},
{
"name": "84100",
"refsource": "OSVDB",
"url": "http://osvdb.org/84100"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:108",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:108"
},
{
"name": "SUSE-SU-2012:1034",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00022.html"
"url": "http://www.securityfocus.com/bid/54612",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/54612"
},
{
"name": "MDVSA-2012:108",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:108"
"url": "http://www.securitytracker.com/id?1027286",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1027286"
},
{
"name": "SUSE-SU-2012:1033",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00021.html"
"url": "https://hermes.opensuse.org/messages/15376003",
"refsource": "MISC",
"name": "https://hermes.opensuse.org/messages/15376003"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3366",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,42 +27,66 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://github.com/Bcfg2/bcfg2/commit/a524967e8d5c4c22e49cd619aed20c87a316c0be",
"refsource": "CONFIRM",
"url": "https://github.com/Bcfg2/bcfg2/commit/a524967e8d5c4c22e49cd619aed20c87a316c0be"
"url": "http://permalink.gmane.org/gmane.comp.sysutils.bcfg2.devel/4539",
"refsource": "MISC",
"name": "http://permalink.gmane.org/gmane.comp.sysutils.bcfg2.devel/4539"
},
{
"name": "DSA-2503",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2503"
"url": "http://secunia.com/advisories/49629",
"refsource": "MISC",
"name": "http://secunia.com/advisories/49629"
},
{
"name": "49690",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49690"
"url": "http://secunia.com/advisories/49690",
"refsource": "MISC",
"name": "http://secunia.com/advisories/49690"
},
{
"name": "[bcfg-dev] 20120612 Major security flaw in Trigger plugin",
"refsource": "MLIST",
"url": "http://permalink.gmane.org/gmane.comp.sysutils.bcfg2.devel/4539"
"url": "http://www.debian.org/security/2012/dsa-2503",
"refsource": "MISC",
"name": "http://www.debian.org/security/2012/dsa-2503"
},
{
"name": "54217",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/54217"
"url": "http://www.securityfocus.com/bid/54217",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/54217"
},
{
"name": "49629",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49629"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76616",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76616"
},
{
"name": "bcfg2-trigger-command-execution(76616)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76616"
"url": "https://github.com/Bcfg2/bcfg2/commit/a524967e8d5c4c22e49cd619aed20c87a316c0be",
"refsource": "MISC",
"name": "https://github.com/Bcfg2/bcfg2/commit/a524967e8d5c4c22e49cd619aed20c87a316c0be"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3367",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,47 +27,71 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=836268",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=836268"
"url": "http://rhn.redhat.com/errata/RHSA-2012-1103.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-1103.html"
},
{
"name": "1027284",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027284"
"url": "http://secunia.com/advisories/50013",
"refsource": "MISC",
"name": "http://secunia.com/advisories/50013"
},
{
"name": "84098",
"refsource": "OSVDB",
"url": "http://osvdb.org/84098"
"url": "http://www.securityfocus.com/bid/54608",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/54608"
},
{
"name": "50013",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50013"
"url": "http://www.securitytracker.com/id?1027284",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1027284"
},
{
"name": "https://fedorahosted.org/pki/changeset/2430",
"refsource": "CONFIRM",
"url": "https://fedorahosted.org/pki/changeset/2430"
"url": "http://osvdb.org/84098",
"refsource": "MISC",
"name": "http://osvdb.org/84098"
},
{
"name": "rhcs-certificate-manager-sec-bypass(77102)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77102"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77102",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77102"
},
{
"name": "54608",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/54608"
"url": "https://fedorahosted.org/pki/changeset/2430",
"refsource": "MISC",
"name": "https://fedorahosted.org/pki/changeset/2430"
},
{
"name": "RHSA-2012:1103",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1103.html"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=836268",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=836268"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3368",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,32 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=812551",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=812551"
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=625302",
"refsource": "MISC",
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=625302"
},
{
"name": "http://sourceforge.net/tracker/download.php?group_id=36489&atid=417357&file_id=441195&aid=3517812",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/tracker/download.php?group_id=36489&atid=417357&file_id=441195&aid=3517812"
"url": "http://sourceforge.net/tracker/?func=detail&aid=3517812&group_id=36489&atid=417357",
"refsource": "MISC",
"name": "http://sourceforge.net/tracker/?func=detail&aid=3517812&group_id=36489&atid=417357"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=625302",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=625302"
"url": "http://sourceforge.net/tracker/download.php?group_id=36489&atid=417357&file_id=441195&aid=3517812",
"refsource": "MISC",
"name": "http://sourceforge.net/tracker/download.php?group_id=36489&atid=417357&file_id=441195&aid=3517812"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=835849",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=835849"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=812551",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=812551"
},
{
"name": "http://sourceforge.net/tracker/?func=detail&aid=3517812&group_id=36489&atid=417357",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/tracker/?func=detail&aid=3517812&group_id=36489&atid=417357"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=835849",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=835849"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3370",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,92 +27,116 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=836456",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0191.html",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=836456"
"name": "http://rhn.redhat.com/errata/RHSA-2013-0191.html"
},
{
"name": "jboss-eap-getcredential-info-disc(81513)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81513"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0192.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0192.html"
},
{
"name": "RHSA-2013:0192",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0192.html"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0193.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0193.html"
},
{
"name": "RHSA-2013:0198",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0198.html"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0194.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0194.html"
},
{
"name": "RHSA-2013:0195",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0195.html"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0195.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0195.html"
},
{
"name": "RHSA-2013:0221",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0221.html"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0196.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0196.html"
},
{
"name": "89581",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/89581"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0197.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0197.html"
},
{
"name": "RHSA-2013:0196",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0196.html"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0198.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0198.html"
},
{
"name": "57550",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/57550"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0221.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0221.html"
},
{
"name": "RHSA-2013:0193",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0193.html"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0533.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0533.html"
},
{
"name": "51984",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51984"
"url": "http://secunia.com/advisories/51984",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51984"
},
{
"name": "1028042",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1028042"
"url": "http://secunia.com/advisories/52054",
"refsource": "MISC",
"name": "http://secunia.com/advisories/52054"
},
{
"name": "52054",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52054"
"url": "http://securitytracker.com/id?1028042",
"refsource": "MISC",
"name": "http://securitytracker.com/id?1028042"
},
{
"name": "RHSA-2013:0191",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0191.html"
"url": "http://www.osvdb.org/89581",
"refsource": "MISC",
"name": "http://www.osvdb.org/89581"
},
{
"name": "RHSA-2013:0533",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0533.html"
"url": "http://www.securityfocus.com/bid/57550",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/57550"
},
{
"name": "RHSA-2013:0197",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0197.html"
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=836456",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=836456"
},
{
"name": "RHSA-2013:0194",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0194.html"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81513",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81513"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3375",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The epoll_ctl system call in fs/eventpoll.c in the Linux kernel before 3.2.24 does not properly handle ELOOP errors in EPOLL_CTL_ADD operations, which allows local users to cause a denial of service (file-descriptor consumption and system crash) via a crafted application that attempts to create a circular epoll dependency. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1083."
"value": "The epoll_ctl system call in fs/eventpoll.c in the Linux kernel before 3.2.24 does not properly handle ELOOP errors in EPOLL_CTL_ADD operations, which allows local users to cause a denial of service (file-descriptor consumption and system crash) via a crafted application that attempts to create a circular epoll dependency. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1083."
}
]
},
@ -50,52 +27,76 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://downloads.avaya.com/css/P8/documents/100165733",
"refsource": "CONFIRM",
"url": "https://downloads.avaya.com/css/P8/documents/100165733"
"url": "http://ubuntu.com/usn/usn-1529-1",
"refsource": "MISC",
"name": "http://ubuntu.com/usn/usn-1529-1"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.24",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.24"
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.24",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.24"
},
{
"name": "1027237",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027237"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=13d518074a952d33d47c428419693f63389547e9",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=13d518074a952d33d47c428419693f63389547e9"
},
{
"name": "https://github.com/torvalds/linux/commit/13d518074a952d33d47c428419693f63389547e9",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/13d518074a952d33d47c428419693f63389547e9"
"url": "http://secunia.com/advisories/51164",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51164"
},
{
"name": "51164",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51164"
"url": "http://www.openwall.com/lists/oss-security/2012/07/04/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/07/04/2"
},
{
"name": "[oss-security] 20120704 Re: CVE Request -- kernel: epoll: can leak file descriptors when returning -ELOOP",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/07/04/2"
"url": "http://www.securitytracker.com/id?1027237",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1027237"
},
{
"name": "USN-1529-1",
"refsource": "UBUNTU",
"url": "http://ubuntu.com/usn/usn-1529-1"
"url": "https://downloads.avaya.com/css/P8/documents/100165733",
"refsource": "MISC",
"name": "https://downloads.avaya.com/css/P8/documents/100165733"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=13d518074a952d33d47c428419693f63389547e9",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=13d518074a952d33d47c428419693f63389547e9"
"url": "https://github.com/torvalds/linux/commit/13d518074a952d33d47c428419693f63389547e9",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/13d518074a952d33d47c428419693f63389547e9"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=837502",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=837502"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=837502",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=837502"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3378",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=678026",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=678026",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=678026"
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=678026"
},
{
"name": "[oss-security] 20120705 Three CVE requests: at-spi2-atk, as31, naxsi",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/07/05/1"
"url": "http://www.openwall.com/lists/oss-security/2012/07/05/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/07/05/1"
},
{
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=678348",
"refsource": "CONFIRM",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=678348"
"url": "http://www.openwall.com/lists/oss-security/2012/07/06/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/07/06/3"
},
{
"name": "[oss-security] 20120706 Re: Three CVE requests: at-spi2-atk, as31, naxsi",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/07/06/3"
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=678348",
"refsource": "MISC",
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=678348"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "It was found that the distcheck rule in Automake-generated Makefiles made a directory world-writable when preparing source archives. If a malicious, local user could access this directory, they could execute arbitrary code with the privileges of the user running \"make distcheck\"."
"value": "The \"make distcheck\" rule in GNU Automake before 1.11.6 and 1.12.x before 1.12.2 grants world-writable permissions to the extraction directory, which introduces a race condition that allows local users to execute arbitrary code via unspecified vectors."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Incorrect Permission Assignment for Critical Resource",
"cweId": "CWE-732"
"value": "n/a"
}
]
}
@ -32,27 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:1.9.6-3.el5",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:1.11.1-4.el6",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -100,26 +88,6 @@
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:103"
},
{
"url": "https://access.redhat.com/errata/RHSA-2013:0526",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:0526"
},
{
"url": "https://access.redhat.com/errata/RHSA-2014:1243",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2014:1243"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2012-3386",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2012-3386"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=838286",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=838286"
},
{
"url": "https://lists.gnu.org/archive/html/automake/2012-07/msg00021.html",
"refsource": "MISC",
@ -136,30 +104,5 @@
"name": "https://lists.gnu.org/archive/html/automake/2012-07/msg00023.html"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 3.7,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3387",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,32 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-33948",
"refsource": "CONFIRM",
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-33948"
"url": "http://openwall.com/lists/oss-security/2012/07/17/1",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2012/07/17/1"
},
{
"name": "49890",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49890"
"url": "http://secunia.com/advisories/49890",
"refsource": "MISC",
"name": "http://secunia.com/advisories/49890"
},
{
"name": "[oss-security] 20120717 Moodle security notifications public",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2012/07/17/1"
"url": "http://www.securityfocus.com/bid/54481",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/54481"
},
{
"name": "54481",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/54481"
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-33948",
"refsource": "MISC",
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-33948"
},
{
"name": "moodle-shortcut-sec-bypass(76954)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76954"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76954",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76954"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3388",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,32 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "moodle-cached-users-sec-bypass(76955)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76955"
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-33916",
"refsource": "MISC",
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-33916"
},
{
"name": "49890",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49890"
"url": "http://openwall.com/lists/oss-security/2012/07/17/1",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2012/07/17/1"
},
{
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-33916",
"refsource": "CONFIRM",
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-33916"
"url": "http://secunia.com/advisories/49890",
"refsource": "MISC",
"name": "http://secunia.com/advisories/49890"
},
{
"name": "[oss-security] 20120717 Moodle security notifications public",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2012/07/17/1"
"url": "http://www.securityfocus.com/bid/54481",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/54481"
},
{
"name": "54481",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/54481"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76955",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76955"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0239",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,82 +27,106 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "90078",
"refsource": "OSVDB",
"url": "http://osvdb.org/90078"
},
{
"name": "51988",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51988"
},
{
"name": "20130208 New security advisories for Apache CXF",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2013/Feb/39"
},
{
"name": "apachecxf-username-tokens-sec-bypass(81981)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81981"
},
{
"name": "http://cxf.apache.org/cve-2013-0239.html",
"refsource": "CONFIRM",
"url": "http://cxf.apache.org/cve-2013-0239.html"
},
{
"name": "57876",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/57876"
},
{
"name": "RHSA-2013:0749",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0749.html"
},
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=1438424",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1438424"
},
{
"name": "http://packetstormsecurity.com/files/120214/Apache-CXF-WS-Security-UsernameToken-Bypass.html",
"url": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/120214/Apache-CXF-WS-Security-UsernameToken-Bypass.html"
"name": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[cxf-commits] 20200116 svn commit: r1055336 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-12423.txt.asc security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html",
"url": "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E"
"url": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[cxf-commits] 20200319 svn commit: r1058035 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html",
"url": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E"
"url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[cxf-commits] 20200401 svn commit: r1058573 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2020-1954.txt.asc security-advisories.html",
"url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E"
"url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[cxf-commits] 20201112 svn commit: r1067927 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2020-13954.txt.asc security-advisories.html",
"url": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E"
"url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html",
"url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E"
"url": "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html",
"url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0749.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0749.html"
},
{
"url": "http://seclists.org/fulldisclosure/2013/Feb/39",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2013/Feb/39"
},
{
"url": "http://secunia.com/advisories/51988",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51988"
},
{
"url": "http://cxf.apache.org/cve-2013-0239.html",
"refsource": "MISC",
"name": "http://cxf.apache.org/cve-2013-0239.html"
},
{
"url": "http://osvdb.org/90078",
"refsource": "MISC",
"name": "http://osvdb.org/90078"
},
{
"url": "http://packetstormsecurity.com/files/120214/Apache-CXF-WS-Security-UsernameToken-Bypass.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/120214/Apache-CXF-WS-Security-UsernameToken-Bypass.html"
},
{
"url": "http://svn.apache.org/viewvc?view=revision&revision=1438424",
"refsource": "MISC",
"name": "http://svn.apache.org/viewvc?view=revision&revision=1438424"
},
{
"url": "http://www.securityfocus.com/bid/57876",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/57876"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81981",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81981"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0240",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,57 +27,81 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://git.gnome.org/browse/gnome-online-accounts/commit/?id=edde7c63326242a60a075341d3fea0be0bc4d80e",
"refsource": "CONFIRM",
"url": "https://git.gnome.org/browse/gnome-online-accounts/commit/?id=edde7c63326242a60a075341d3fea0be0bc4d80e"
},
{
"name": "51976",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51976"
},
{
"name": "https://git.gnome.org/browse/gnome-online-accounts/commit/?id=bc10fdb68f75f8be84eb698ada08743b9c7c248f",
"refsource": "CONFIRM",
"url": "https://git.gnome.org/browse/gnome-online-accounts/commit/?id=bc10fdb68f75f8be84eb698ada08743b9c7c248f"
},
{
"name": "[gnome-announce-list] 20130304 GNOME Online Accounts 3.6.3 released",
"refsource": "MLIST",
"url": "https://mail.gnome.org/archives/gnome-announce-list/2013-March/msg00007.html"
},
{
"name": "USN-1779-1",
"refsource": "UBUNTU",
"url": "http://ubuntu.com/usn/usn-1779-1"
},
{
"name": "https://git.gnome.org/browse/gnome-online-accounts/commit/?h=gnome-3-6&id=ecad8142e9ac519b9fc74b96dcb5531052bbffe1",
"refsource": "CONFIRM",
"url": "https://git.gnome.org/browse/gnome-online-accounts/commit/?h=gnome-3-6&id=ecad8142e9ac519b9fc74b96dcb5531052bbffe1"
},
{
"name": "52791",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52791"
},
{
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=693214",
"refsource": "CONFIRM",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=693214"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=894352",
"url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00046.html",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=894352"
"name": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00046.html"
},
{
"name": "openSUSE-SU-2013:0301",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00046.html"
"url": "http://secunia.com/advisories/51976",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51976"
},
{
"url": "http://secunia.com/advisories/52791",
"refsource": "MISC",
"name": "http://secunia.com/advisories/52791"
},
{
"url": "http://ubuntu.com/usn/usn-1779-1",
"refsource": "MISC",
"name": "http://ubuntu.com/usn/usn-1779-1"
},
{
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=693214",
"refsource": "MISC",
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=693214"
},
{
"url": "https://mail.gnome.org/archives/gnome-announce-list/2013-March/msg00007.html",
"refsource": "MISC",
"name": "https://mail.gnome.org/archives/gnome-announce-list/2013-March/msg00007.html"
},
{
"url": "https://git.gnome.org/browse/gnome-online-accounts/commit/?h=gnome-3-6&id=ecad8142e9ac519b9fc74b96dcb5531052bbffe1",
"refsource": "MISC",
"name": "https://git.gnome.org/browse/gnome-online-accounts/commit/?h=gnome-3-6&id=ecad8142e9ac519b9fc74b96dcb5531052bbffe1"
},
{
"url": "https://git.gnome.org/browse/gnome-online-accounts/commit/?id=bc10fdb68f75f8be84eb698ada08743b9c7c248f",
"refsource": "MISC",
"name": "https://git.gnome.org/browse/gnome-online-accounts/commit/?id=bc10fdb68f75f8be84eb698ada08743b9c7c248f"
},
{
"url": "https://git.gnome.org/browse/gnome-online-accounts/commit/?id=edde7c63326242a60a075341d3fea0be0bc4d80e",
"refsource": "MISC",
"name": "https://git.gnome.org/browse/gnome-online-accounts/commit/?id=edde7c63326242a60a075341d3fea0be0bc4d80e"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=894352",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=894352"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0241",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The QXL display driver in QXL Virtual GPU 0.1.0 allows local users to cause a denial of service (guest crash or hang) via a SPICE connection that prevents other threads from obtaining the qemu_mutex mutex. NOTE: some of these details are obtained from third party information."
"value": "The QXL display driver in QXL Virtual GPU 0.1.0 allows local users to cause a denial of service (guest crash or hang) via a SPICE connection that prevents other threads from obtaining the qemu_mutex mutex. NOTE: some of these details are obtained from third party information."
}
]
},
@ -50,52 +27,76 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=906032",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906032"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0218.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0218.html"
},
{
"name": "MDVSA-2013:138",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:138"
"url": "http://secunia.com/advisories/52021",
"refsource": "MISC",
"name": "http://secunia.com/advisories/52021"
},
{
"name": "[oss-security] 20130130 CVE request -- qxl: synchronous io guest DoS",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/01/30/3"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:138",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:138"
},
{
"name": "qxl-virtual-spice-dos(81704)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81704"
"url": "http://www.openwall.com/lists/oss-security/2013/01/30/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/01/30/3"
},
{
"name": "52021",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52021"
"url": "http://www.openwall.com/lists/oss-security/2013/01/30/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/01/30/4"
},
{
"name": "[oss-security] 20130130 Re: CVE request -- qxl: synchronous io guest DoS",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/01/30/4"
"url": "http://www.ubuntu.com/usn/USN-1714-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1714-1"
},
{
"name": "USN-1714-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1714-1"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81704",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81704"
},
{
"name": "RHSA-2013:0218",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0218.html"
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0036",
"refsource": "MISC",
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0036"
},
{
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0036",
"refsource": "CONFIRM",
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0036"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906032",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=906032"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0242",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,82 +27,106 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html"
},
{
"name": "glibc-extendbuffers-dos(81707)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81707"
},
{
"name": "RHSA-2013:1605",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1605.html"
},
{
"name": "55113",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55113"
},
{
"name": "USN-1991-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1991-1"
},
{
"name": "57638",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/57638"
},
{
"name": "89747",
"refsource": "OSVDB",
"url": "http://osvdb.org/89747"
},
{
"name": "51951",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51951"
},
{
"name": "1028063",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1028063"
},
{
"name": "[oss-security] 20130130 Re: CVE Request -- glibc: DoS due to a buffer overrun in regexp matcher by processing multibyte characters",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/01/30/5"
},
{
"name": "GLSA-201503-04",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201503-04"
},
{
"name": "[libc-alpha] 20130129 [PATCH] Fix buffer overrun in regexp matcher",
"refsource": "MLIST",
"url": "http://sourceware.org/ml/libc-alpha/2013-01/msg00967.html"
},
{
"name": "RHSA-2013:0769",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0769.html"
},
{
"name": "MDVSA-2013:163",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:163"
},
{
"name": "http://sourceware.org/bugzilla/show_bug.cgi?id=15078",
"url": "https://security.gentoo.org/glsa/201503-04",
"refsource": "MISC",
"url": "http://sourceware.org/bugzilla/show_bug.cgi?id=15078"
"name": "https://security.gentoo.org/glsa/201503-04"
},
{
"url": "http://secunia.com/advisories/55113",
"refsource": "MISC",
"name": "http://secunia.com/advisories/55113"
},
{
"url": "http://www.ubuntu.com/usn/USN-1991-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1991-1"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2013-0769.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0769.html"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2013-1605.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1605.html"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:163",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:163"
},
{
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html",
"refsource": "MISC",
"name": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html"
},
{
"url": "http://osvdb.org/89747",
"refsource": "MISC",
"name": "http://osvdb.org/89747"
},
{
"url": "http://secunia.com/advisories/51951",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51951"
},
{
"url": "http://sourceware.org/bugzilla/show_bug.cgi?id=15078",
"refsource": "MISC",
"name": "http://sourceware.org/bugzilla/show_bug.cgi?id=15078"
},
{
"url": "http://sourceware.org/ml/libc-alpha/2013-01/msg00967.html",
"refsource": "MISC",
"name": "http://sourceware.org/ml/libc-alpha/2013-01/msg00967.html"
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/01/30/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/01/30/5"
},
{
"url": "http://www.securityfocus.com/bid/57638",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/57638"
},
{
"url": "http://www.securitytracker.com/id/1028063",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id/1028063"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81707",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81707"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0247",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,37 +27,61 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=906171",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098906.html",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906171"
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098906.html"
},
{
"name": "https://bugs.launchpad.net/keystone/+bug/1098307",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/keystone/+bug/1098307"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0253.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0253.html"
},
{
"name": "FEDORA-2013-2168",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098906.html"
"url": "http://www.securityfocus.com/bid/57747",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/57747"
},
{
"name": "RHSA-2013:0253",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0253.html"
"url": "http://www.ubuntu.com/usn/USN-1715-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1715-1"
},
{
"name": "USN-1715-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1715-1"
"url": "https://bugs.launchpad.net/keystone/+bug/1098307",
"refsource": "MISC",
"name": "https://bugs.launchpad.net/keystone/+bug/1098307"
},
{
"name": "57747",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/57747"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906171",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=906171"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0249",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,72 +27,96 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"name": "http://packetstormsecurity.com/files/120170/Slackware-Security-Advisory-curl-Updates.html",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/120170/Slackware-Security-Advisory-curl-Updates.html"
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"name": "57842",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/57842"
},
{
"name": "APPLE-SA-2013-10-22-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html"
},
{
"name": "24487",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/24487"
},
{
"name": "USN-1721-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1721-1"
},
{
"name": "FEDORA-2013-2098",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099140.html"
},
{
"name": "1028093",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1028093"
},
{
"name": "89988",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/89988"
},
{
"name": "http://packetstormsecurity.com/files/120147/cURL-Buffer-Overflow.html",
"url": "http://blog.volema.com/curl-rce.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/120147/cURL-Buffer-Overflow.html"
"name": "http://blog.volema.com/curl-rce.html"
},
{
"name": "http://blog.volema.com/curl-rce.html",
"url": "http://curl.haxx.se/docs/adv_20130206.html",
"refsource": "MISC",
"url": "http://blog.volema.com/curl-rce.html"
"name": "http://curl.haxx.se/docs/adv_20130206.html"
},
{
"name": "http://curl.haxx.se/docs/adv_20130206.html",
"refsource": "CONFIRM",
"url": "http://curl.haxx.se/docs/adv_20130206.html"
},
{
"name": "http://nakedsecurity.sophos.com/2013/02/10/anatomy-of-a-vulnerability-curl-web-download-toolkit-holed-by-authentication-bug/",
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html",
"refsource": "MISC",
"url": "http://nakedsecurity.sophos.com/2013/02/10/anatomy-of-a-vulnerability-curl-web-download-toolkit-holed-by-authentication-bug/"
"name": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html"
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099140.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099140.html"
},
{
"url": "http://nakedsecurity.sophos.com/2013/02/10/anatomy-of-a-vulnerability-curl-web-download-toolkit-holed-by-authentication-bug/",
"refsource": "MISC",
"name": "http://nakedsecurity.sophos.com/2013/02/10/anatomy-of-a-vulnerability-curl-web-download-toolkit-holed-by-authentication-bug/"
},
{
"url": "http://packetstormsecurity.com/files/120147/cURL-Buffer-Overflow.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/120147/cURL-Buffer-Overflow.html"
},
{
"url": "http://packetstormsecurity.com/files/120170/Slackware-Security-Advisory-curl-Updates.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/120170/Slackware-Security-Advisory-curl-Updates.html"
},
{
"url": "http://www.exploit-db.com/exploits/24487",
"refsource": "MISC",
"name": "http://www.exploit-db.com/exploits/24487"
},
{
"url": "http://www.osvdb.org/89988",
"refsource": "MISC",
"name": "http://www.osvdb.org/89988"
},
{
"url": "http://www.securityfocus.com/bid/57842",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/57842"
},
{
"url": "http://www.securitytracker.com/id/1028093",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id/1028093"
},
{
"url": "http://www.ubuntu.com/usn/USN-1721-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1721-1"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0252",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,62 +27,86 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "FEDORA-2013-2448",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099122.html"
},
{
"name": "57675",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/57675"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699649",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699649",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699649"
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699649"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=907481",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699650",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907481"
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699650"
},
{
"name": "https://svn.boost.org/trac/boost/ticket/7743",
"refsource": "CONFIRM",
"url": "https://svn.boost.org/trac/boost/ticket/7743"
},
{
"name": "[oss-security] 20130203 Re: CVE id request: boost",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/02/04/2"
},
{
"name": "FEDORA-2013-2420",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099103.html"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699650",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099103.html",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699650"
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099103.html"
},
{
"name": "http://www.boost.org/users/news/boost_locale_security_notice.html",
"refsource": "CONFIRM",
"url": "http://www.boost.org/users/news/boost_locale_security_notice.html"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099122.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099122.html"
},
{
"name": "USN-1727-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1727-1"
"url": "http://www.boost.org/users/news/boost_locale_security_notice.html",
"refsource": "MISC",
"name": "http://www.boost.org/users/news/boost_locale_security_notice.html"
},
{
"name": "MDVSA-2013:065",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:065"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:065",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:065"
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/02/04/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/02/04/2"
},
{
"url": "http://www.securityfocus.com/bid/57675",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/57675"
},
{
"url": "http://www.ubuntu.com/usn/USN-1727-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1727-1"
},
{
"url": "https://svn.boost.org/trac/boost/ticket/7743",
"refsource": "MISC",
"name": "https://svn.boost.org/trac/boost/ticket/7743"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907481",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=907481"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0261",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,17 +27,41 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2013:0595",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0595.html"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0595.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0595.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=908101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=908101",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=908101"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=908101"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0262",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,57 +27,81 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://groups.google.com/forum/#!msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ",
"refsource": "CONFIRM",
"url": "https://groups.google.com/forum/#!msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ"
},
{
"name": "https://gist.github.com/rentzsch/4736940",
"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html",
"refsource": "MISC",
"url": "https://gist.github.com/rentzsch/4736940"
"name": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html"
},
{
"name": "52033",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52033"
},
{
"name": "http://rack.github.com/",
"refsource": "CONFIRM",
"url": "http://rack.github.com/"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=909071",
"url": "http://rack.github.com/",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=909071"
"name": "http://rack.github.com/"
},
{
"name": "https://groups.google.com/forum/#!msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ",
"refsource": "CONFIRM",
"url": "https://groups.google.com/forum/#!msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ"
},
{
"name": "https://github.com/rack/rack/commit/6f237e4c9fab649d3750482514f0fde76c56ab30",
"refsource": "CONFIRM",
"url": "https://github.com/rack/rack/commit/6f237e4c9fab649d3750482514f0fde76c56ab30"
},
{
"name": "openSUSE-SU-2013:0462",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html"
},
{
"name": "https://github.com/rack/rack/blob/master/lib/rack/file.rb#L56",
"url": "http://secunia.com/advisories/52033",
"refsource": "MISC",
"url": "https://github.com/rack/rack/blob/master/lib/rack/file.rb#L56"
"name": "http://secunia.com/advisories/52033"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=909072",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=909072"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=909071",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=909071"
},
{
"url": "https://gist.github.com/rentzsch/4736940",
"refsource": "MISC",
"name": "https://gist.github.com/rentzsch/4736940"
},
{
"url": "https://github.com/rack/rack/blob/master/lib/rack/file.rb#L56",
"refsource": "MISC",
"name": "https://github.com/rack/rack/blob/master/lib/rack/file.rb#L56"
},
{
"url": "https://github.com/rack/rack/commit/6f237e4c9fab649d3750482514f0fde76c56ab30",
"refsource": "MISC",
"name": "https://github.com/rack/rack/commit/6f237e4c9fab649d3750482514f0fde76c56ab30"
},
{
"url": "https://groups.google.com/forum/#%21msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ",
"refsource": "MISC",
"name": "https://groups.google.com/forum/#%21msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ"
},
{
"url": "https://groups.google.com/forum/#%21msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ",
"refsource": "MISC",
"name": "https://groups.google.com/forum/#%21msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=909072",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=909072"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0263",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,102 +27,126 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "52774",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52774"
},
{
"name": "https://groups.google.com/forum/#!msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ",
"refsource": "CONFIRM",
"url": "https://groups.google.com/forum/#!msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ"
},
{
"name": "https://groups.google.com/forum/#!msg/rack-devel/RnQxm6i13C4/xfakH81yWvgJ",
"refsource": "CONFIRM",
"url": "https://groups.google.com/forum/#!msg/rack-devel/RnQxm6i13C4/xfakH81yWvgJ"
},
{
"name": "https://github.com/rack/rack/commit/9a81b961457805f6d1a5c275d053068440421e11",
"refsource": "CONFIRM",
"url": "https://github.com/rack/rack/commit/9a81b961457805f6d1a5c275d053068440421e11"
},
{
"name": "52033",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52033"
},
{
"name": "https://github.com/rack/rack/commit/0cd7e9aa397f8ebb3b8481d67dbac8b4863a7f07",
"refsource": "CONFIRM",
"url": "https://github.com/rack/rack/commit/0cd7e9aa397f8ebb3b8481d67dbac8b4863a7f07"
},
{
"name": "http://rack.github.com/",
"refsource": "CONFIRM",
"url": "http://rack.github.com/"
},
{
"name": "52134",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52134"
},
{
"name": "https://groups.google.com/d/msg/rack-devel/xKrHVWeNvDM/4ZGA576CnK4J",
"refsource": "CONFIRM",
"url": "https://groups.google.com/d/msg/rack-devel/xKrHVWeNvDM/4ZGA576CnK4J"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=909071",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0686.html",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=909071"
"name": "http://rhn.redhat.com/errata/RHSA-2013-0686.html"
},
{
"name": "https://groups.google.com/forum/#!msg/rack-devel/hz-liLb9fKE/8jvVWU6xYiYJ",
"refsource": "CONFIRM",
"url": "https://groups.google.com/forum/#!msg/rack-devel/hz-liLb9fKE/8jvVWU6xYiYJ"
},
{
"name": "https://groups.google.com/forum/#!msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ",
"refsource": "CONFIRM",
"url": "https://groups.google.com/forum/#!msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ"
},
{
"name": "RHSA-2013:0686",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0686.html"
},
{
"name": "openSUSE-SU-2013:0462",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html"
},
{
"name": "https://puppet.com/security/cve/cve-2013-0263",
"refsource": "CONFIRM",
"url": "https://puppet.com/security/cve/cve-2013-0263"
},
{
"name": "https://gist.github.com/codahale/f9f3781f7b54985bee94",
"url": "http://secunia.com/advisories/52774",
"refsource": "MISC",
"url": "https://gist.github.com/codahale/f9f3781f7b54985bee94"
"name": "http://secunia.com/advisories/52774"
},
{
"name": "https://twitter.com/coda/statuses/299732877745197056",
"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html",
"refsource": "MISC",
"url": "https://twitter.com/coda/statuses/299732877745197056"
"name": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html"
},
{
"name": "89939",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/89939"
"url": "http://www.debian.org/security/2013/dsa-2783",
"refsource": "MISC",
"name": "http://www.debian.org/security/2013/dsa-2783"
},
{
"name": "DSA-2783",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2783"
"url": "http://rack.github.com/",
"refsource": "MISC",
"name": "http://rack.github.com/"
},
{
"url": "http://secunia.com/advisories/52033",
"refsource": "MISC",
"name": "http://secunia.com/advisories/52033"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=909071",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=909071"
},
{
"url": "https://groups.google.com/forum/#%21msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ",
"refsource": "MISC",
"name": "https://groups.google.com/forum/#%21msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ"
},
{
"url": "https://groups.google.com/forum/#%21msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ",
"refsource": "MISC",
"name": "https://groups.google.com/forum/#%21msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ"
},
{
"url": "http://secunia.com/advisories/52134",
"refsource": "MISC",
"name": "http://secunia.com/advisories/52134"
},
{
"url": "http://www.osvdb.org/89939",
"refsource": "MISC",
"name": "http://www.osvdb.org/89939"
},
{
"url": "https://gist.github.com/codahale/f9f3781f7b54985bee94",
"refsource": "MISC",
"name": "https://gist.github.com/codahale/f9f3781f7b54985bee94"
},
{
"url": "https://github.com/rack/rack/commit/0cd7e9aa397f8ebb3b8481d67dbac8b4863a7f07",
"refsource": "MISC",
"name": "https://github.com/rack/rack/commit/0cd7e9aa397f8ebb3b8481d67dbac8b4863a7f07"
},
{
"url": "https://github.com/rack/rack/commit/9a81b961457805f6d1a5c275d053068440421e11",
"refsource": "MISC",
"name": "https://github.com/rack/rack/commit/9a81b961457805f6d1a5c275d053068440421e11"
},
{
"url": "https://groups.google.com/d/msg/rack-devel/xKrHVWeNvDM/4ZGA576CnK4J",
"refsource": "MISC",
"name": "https://groups.google.com/d/msg/rack-devel/xKrHVWeNvDM/4ZGA576CnK4J"
},
{
"url": "https://groups.google.com/forum/#%21msg/rack-devel/RnQxm6i13C4/xfakH81yWvgJ",
"refsource": "MISC",
"name": "https://groups.google.com/forum/#%21msg/rack-devel/RnQxm6i13C4/xfakH81yWvgJ"
},
{
"url": "https://groups.google.com/forum/#%21msg/rack-devel/hz-liLb9fKE/8jvVWU6xYiYJ",
"refsource": "MISC",
"name": "https://groups.google.com/forum/#%21msg/rack-devel/hz-liLb9fKE/8jvVWU6xYiYJ"
},
{
"url": "https://puppet.com/security/cve/cve-2013-0263",
"refsource": "MISC",
"name": "https://puppet.com/security/cve/cve-2013-0263"
},
{
"url": "https://twitter.com/coda/statuses/299732877745197056",
"refsource": "MISC",
"name": "https://twitter.com/coda/statuses/299732877745197056"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4189",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=978450",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=978450"
"url": "http://plone.org/products/plone-hotfix/releases/20130618",
"refsource": "MISC",
"name": "http://plone.org/products/plone-hotfix/releases/20130618"
},
{
"name": "http://plone.org/products/plone/security/advisories/20130618-announcement",
"refsource": "CONFIRM",
"url": "http://plone.org/products/plone/security/advisories/20130618-announcement"
"url": "http://plone.org/products/plone/security/advisories/20130618-announcement",
"refsource": "MISC",
"name": "http://plone.org/products/plone/security/advisories/20130618-announcement"
},
{
"name": "http://plone.org/products/plone-hotfix/releases/20130618",
"refsource": "CONFIRM",
"url": "http://plone.org/products/plone-hotfix/releases/20130618"
"url": "http://seclists.org/oss-sec/2013/q3/261",
"refsource": "MISC",
"name": "http://seclists.org/oss-sec/2013/q3/261"
},
{
"name": "[oss-security] 20130801 Re: CVE Request -- Plone: 20130618 Hotfix (multiple vectors)",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2013/q3/261"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=978450",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=978450"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4190",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=978451",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=978451"
"url": "http://plone.org/products/plone-hotfix/releases/20130618",
"refsource": "MISC",
"name": "http://plone.org/products/plone-hotfix/releases/20130618"
},
{
"name": "http://plone.org/products/plone/security/advisories/20130618-announcement",
"refsource": "CONFIRM",
"url": "http://plone.org/products/plone/security/advisories/20130618-announcement"
"url": "http://plone.org/products/plone/security/advisories/20130618-announcement",
"refsource": "MISC",
"name": "http://plone.org/products/plone/security/advisories/20130618-announcement"
},
{
"name": "http://plone.org/products/plone-hotfix/releases/20130618",
"refsource": "CONFIRM",
"url": "http://plone.org/products/plone-hotfix/releases/20130618"
"url": "http://seclists.org/oss-sec/2013/q3/261",
"refsource": "MISC",
"name": "http://seclists.org/oss-sec/2013/q3/261"
},
{
"name": "[oss-security] 20130801 Re: CVE Request -- Plone: 20130618 Hotfix (multiple vectors)",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2013/q3/261"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=978451",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=978451"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4191",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://plone.org/products/plone/security/advisories/20130618-announcement",
"refsource": "CONFIRM",
"url": "http://plone.org/products/plone/security/advisories/20130618-announcement"
"url": "http://plone.org/products/plone-hotfix/releases/20130618",
"refsource": "MISC",
"name": "http://plone.org/products/plone-hotfix/releases/20130618"
},
{
"name": "http://plone.org/products/plone-hotfix/releases/20130618",
"refsource": "CONFIRM",
"url": "http://plone.org/products/plone-hotfix/releases/20130618"
"url": "http://plone.org/products/plone/security/advisories/20130618-announcement",
"refsource": "MISC",
"name": "http://plone.org/products/plone/security/advisories/20130618-announcement"
},
{
"name": "[oss-security] 20130801 Re: CVE Request -- Plone: 20130618 Hotfix (multiple vectors)",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2013/q3/261"
"url": "http://seclists.org/oss-sec/2013/q3/261",
"refsource": "MISC",
"name": "http://seclists.org/oss-sec/2013/q3/261"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=978453",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=978453"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=978453",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=978453"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4192",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://plone.org/products/plone/security/advisories/20130618-announcement",
"refsource": "CONFIRM",
"url": "http://plone.org/products/plone/security/advisories/20130618-announcement"
"url": "http://plone.org/products/plone-hotfix/releases/20130618",
"refsource": "MISC",
"name": "http://plone.org/products/plone-hotfix/releases/20130618"
},
{
"name": "http://plone.org/products/plone-hotfix/releases/20130618",
"refsource": "CONFIRM",
"url": "http://plone.org/products/plone-hotfix/releases/20130618"
"url": "http://plone.org/products/plone/security/advisories/20130618-announcement",
"refsource": "MISC",
"name": "http://plone.org/products/plone/security/advisories/20130618-announcement"
},
{
"name": "[oss-security] 20130801 Re: CVE Request -- Plone: 20130618 Hotfix (multiple vectors)",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2013/q3/261"
"url": "http://seclists.org/oss-sec/2013/q3/261",
"refsource": "MISC",
"name": "http://seclists.org/oss-sec/2013/q3/261"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=978464",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=978464"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=978464",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=978464"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4193",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://plone.org/products/plone/security/advisories/20130618-announcement",
"refsource": "CONFIRM",
"url": "http://plone.org/products/plone/security/advisories/20130618-announcement"
"url": "http://plone.org/products/plone-hotfix/releases/20130618",
"refsource": "MISC",
"name": "http://plone.org/products/plone-hotfix/releases/20130618"
},
{
"name": "http://plone.org/products/plone-hotfix/releases/20130618",
"refsource": "CONFIRM",
"url": "http://plone.org/products/plone-hotfix/releases/20130618"
"url": "http://plone.org/products/plone/security/advisories/20130618-announcement",
"refsource": "MISC",
"name": "http://plone.org/products/plone/security/advisories/20130618-announcement"
},
{
"name": "[oss-security] 20130801 Re: CVE Request -- Plone: 20130618 Hotfix (multiple vectors)",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2013/q3/261"
"url": "http://seclists.org/oss-sec/2013/q3/261",
"refsource": "MISC",
"name": "http://seclists.org/oss-sec/2013/q3/261"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=978469",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=978469"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=978469",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=978469"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4194",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=978470",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=978470"
"url": "http://plone.org/products/plone-hotfix/releases/20130618",
"refsource": "MISC",
"name": "http://plone.org/products/plone-hotfix/releases/20130618"
},
{
"name": "http://plone.org/products/plone/security/advisories/20130618-announcement",
"refsource": "CONFIRM",
"url": "http://plone.org/products/plone/security/advisories/20130618-announcement"
"url": "http://plone.org/products/plone/security/advisories/20130618-announcement",
"refsource": "MISC",
"name": "http://plone.org/products/plone/security/advisories/20130618-announcement"
},
{
"name": "http://plone.org/products/plone-hotfix/releases/20130618",
"refsource": "CONFIRM",
"url": "http://plone.org/products/plone-hotfix/releases/20130618"
"url": "http://seclists.org/oss-sec/2013/q3/261",
"refsource": "MISC",
"name": "http://seclists.org/oss-sec/2013/q3/261"
},
{
"name": "[oss-security] 20130801 Re: CVE Request -- Plone: 20130618 Hotfix (multiple vectors)",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2013/q3/261"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=978470",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=978470"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4197",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://plone.org/products/plone/security/advisories/20130618-announcement",
"refsource": "CONFIRM",
"url": "http://plone.org/products/plone/security/advisories/20130618-announcement"
"url": "http://plone.org/products/plone-hotfix/releases/20130618",
"refsource": "MISC",
"name": "http://plone.org/products/plone-hotfix/releases/20130618"
},
{
"name": "http://plone.org/products/plone-hotfix/releases/20130618",
"refsource": "CONFIRM",
"url": "http://plone.org/products/plone-hotfix/releases/20130618"
"url": "http://plone.org/products/plone/security/advisories/20130618-announcement",
"refsource": "MISC",
"name": "http://plone.org/products/plone/security/advisories/20130618-announcement"
},
{
"name": "[oss-security] 20130801 Re: CVE Request -- Plone: 20130618 Hotfix (multiple vectors)",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2013/q3/261"
"url": "http://seclists.org/oss-sec/2013/q3/261",
"refsource": "MISC",
"name": "http://seclists.org/oss-sec/2013/q3/261"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=978478",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=978478"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=978478",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=978478"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4198",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=978480",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=978480"
"url": "http://plone.org/products/plone-hotfix/releases/20130618",
"refsource": "MISC",
"name": "http://plone.org/products/plone-hotfix/releases/20130618"
},
{
"name": "http://plone.org/products/plone/security/advisories/20130618-announcement",
"refsource": "CONFIRM",
"url": "http://plone.org/products/plone/security/advisories/20130618-announcement"
"url": "http://plone.org/products/plone/security/advisories/20130618-announcement",
"refsource": "MISC",
"name": "http://plone.org/products/plone/security/advisories/20130618-announcement"
},
{
"name": "http://plone.org/products/plone-hotfix/releases/20130618",
"refsource": "CONFIRM",
"url": "http://plone.org/products/plone-hotfix/releases/20130618"
"url": "http://seclists.org/oss-sec/2013/q3/261",
"refsource": "MISC",
"name": "http://seclists.org/oss-sec/2013/q3/261"
},
{
"name": "[oss-security] 20130801 Re: CVE Request -- Plone: 20130618 Hotfix (multiple vectors)",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2013/q3/261"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=978480",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=978480"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4199",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=978482",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=978482"
"url": "http://plone.org/products/plone-hotfix/releases/20130618",
"refsource": "MISC",
"name": "http://plone.org/products/plone-hotfix/releases/20130618"
},
{
"name": "http://plone.org/products/plone/security/advisories/20130618-announcement",
"refsource": "CONFIRM",
"url": "http://plone.org/products/plone/security/advisories/20130618-announcement"
"url": "http://plone.org/products/plone/security/advisories/20130618-announcement",
"refsource": "MISC",
"name": "http://plone.org/products/plone/security/advisories/20130618-announcement"
},
{
"name": "http://plone.org/products/plone-hotfix/releases/20130618",
"refsource": "CONFIRM",
"url": "http://plone.org/products/plone-hotfix/releases/20130618"
"url": "http://seclists.org/oss-sec/2013/q3/261",
"refsource": "MISC",
"name": "http://seclists.org/oss-sec/2013/q3/261"
},
{
"name": "[oss-security] 20130801 Re: CVE Request -- Plone: 20130618 Hotfix (multiple vectors)",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2013/q3/261"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=978482",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=978482"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4200",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The isURLInPortal method in the URLTool class in in_portal.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 treats URLs starting with a space as a relative URL, which allows remote attackers to bypass the allow_external_login_sites filtering property, redirect users to arbitrary web sites, and conduct phishing attacks via a space before a URL in the \"next\" parameter to acl_users/credentials_cookie_auth/require_login."
"value": "The isURLInPortal method in the URLTool class in in_portal.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 treats URLs starting with a space as a relative URL, which allows remote attackers to bypass the allow_external_login_sites filtering property, redirect users to arbitrary web sites, and conduct phishing attacks via a space before a URL in the \"next\" parameter to acl_users/credentials_cookie_auth/require_login."
}
]
},
@ -50,32 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20130801 Re: CVE Request -- Plone: 20130618 Hotfix (multiple",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/08/01/2"
"url": "http://plone.org/products/plone-hotfix/releases/20130618",
"refsource": "MISC",
"name": "http://plone.org/products/plone-hotfix/releases/20130618"
},
{
"name": "http://plone.org/products/plone/security/advisories/20130618-announcement",
"refsource": "CONFIRM",
"url": "http://plone.org/products/plone/security/advisories/20130618-announcement"
"url": "http://plone.org/products/plone/security/advisories/20130618-announcement",
"refsource": "MISC",
"name": "http://plone.org/products/plone/security/advisories/20130618-announcement"
},
{
"name": "http://plone.org/products/plone-hotfix/releases/20130618",
"refsource": "CONFIRM",
"url": "http://plone.org/products/plone-hotfix/releases/20130618"
"url": "http://www.openwall.com/lists/oss-security/2013/08/01/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/08/01/2"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4200",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4200"
"url": "http://www.securityfocus.com/archive/1/530787/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/530787/100/0/threaded"
},
{
"name": "20140116 CVE-2013-4200 - Plone URL redirection / Forwarding of cookie data (session hijack) in certain browsers",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/530787/100/0/threaded"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4200",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4200"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-4001",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,62 +27,86 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[qemu-devel] 20160408 [PATCH v3] net: stellaris_enet: check packet length against receive buffer",
"refsource": "MLIST",
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01334.html"
"url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=3a15cc0e1ee7168db0782133d2607a6bfa422d66",
"refsource": "MISC",
"name": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=3a15cc0e1ee7168db0782133d2607a6bfa422d66"
},
{
"name": "[oss-security] 20160411 CVE request: Qemu: net: buffer overflow in stellaris_enet emulator",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/04/11/4"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html"
},
{
"name": "FEDORA-2016-48e72b7bc5",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html"
},
{
"name": "[oss-security] 20160412 Re: CVE request: Qemu: net: buffer overflow in stellaris_enet emulator",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/04/12/6"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html"
},
{
"name": "85976",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/85976"
"url": "http://www.openwall.com/lists/oss-security/2016/04/11/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2016/04/11/4"
},
{
"name": "GLSA-201609-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201609-01"
"url": "http://www.openwall.com/lists/oss-security/2016/04/12/6",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2016/04/12/6"
},
{
"name": "FEDORA-2016-35d7b09908",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html"
"url": "http://www.securityfocus.com/bid/85976",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/85976"
},
{
"name": "http://git.qemu.org/?p=qemu.git;a=commit;h=3a15cc0e1ee7168db0782133d2607a6bfa422d66",
"refsource": "CONFIRM",
"url": "http://git.qemu.org/?p=qemu.git;a=commit;h=3a15cc0e1ee7168db0782133d2607a6bfa422d66"
"url": "http://www.ubuntu.com/usn/USN-2974-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2974-1"
},
{
"name": "FEDORA-2016-75063477ca",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html"
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
},
{
"name": "USN-2974-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2974-1"
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01334.html",
"refsource": "MISC",
"name": "https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01334.html"
},
{
"name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
"url": "https://security.gentoo.org/glsa/201609-01",
"refsource": "MISC",
"name": "https://security.gentoo.org/glsa/201609-01"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-4002",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,62 +27,86 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1326082",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326082"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html"
},
{
"name": "85992",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/85992"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html"
},
{
"name": "FEDORA-2016-48e72b7bc5",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html"
},
{
"name": "GLSA-201609-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201609-01"
"url": "http://www.ubuntu.com/usn/USN-2974-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2974-1"
},
{
"name": "[oss-security] 20160412 CVE Request: Qemu: net: buffer overflow in MIPSnet emulator",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/04/11/6"
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
},
{
"name": "FEDORA-2016-35d7b09908",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html"
"url": "https://security.gentoo.org/glsa/201609-01",
"refsource": "MISC",
"name": "https://security.gentoo.org/glsa/201609-01"
},
{
"name": "FEDORA-2016-75063477ca",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html"
"url": "http://www.openwall.com/lists/oss-security/2016/04/11/6",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2016/04/11/6"
},
{
"name": "USN-2974-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2974-1"
"url": "http://www.openwall.com/lists/oss-security/2016/04/12/7",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2016/04/12/7"
},
{
"name": "[oss-security] 20160412 Re: CVE Request: Qemu: net: buffer overflow in MIPSnet emulator",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/04/12/7"
"url": "http://www.securityfocus.com/bid/85992",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/85992"
},
{
"name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01131.html",
"refsource": "MISC",
"name": "https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01131.html"
},
{
"name": "[Qemu-devel] 20160407 [PATCH] net: mipsnet: check packet length against buffer",
"refsource": "MLIST",
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01131.html"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326082",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1326082"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "An information-exposure flaw was found in Quick Emulator (QEMU) in Task Priority Register (TPR) optimizations for 32-bit Windows guests. The flaw could occur while accessing TPR. A privileged user inside a guest could use this issue to read portions of the host memory."
"value": "The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR)."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Exposure of Sensitive Information to an Unauthorized Actor",
"cweId": "CWE-200"
"value": "n/a"
}
]
}
@ -32,93 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 7",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "10:1.5.3-141.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7",
"version": {
"version_data": [
{
"version_value": "10:2.9.0-10.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7",
"version": {
"version_data": [
{
"version_value": "10:2.9.0-10.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat OpenStack Platform 10.0 (Newton)",
"version": {
"version_data": [
{
"version_value": "10:2.9.0-10.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat OpenStack Platform 11.0 (Ocata)",
"version": {
"version_data": [
{
"version_value": "10:2.9.0-10.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat OpenStack Platform 8.0 (Liberty)",
"version": {
"version_data": [
{
"version_value": "10:2.9.0-10.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat OpenStack Platform 9.0 (Mitaka)",
"version": {
"version_data": [
{
"version_value": "10:2.9.0-10.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "10:2.9.0-14.el7",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -171,16 +93,6 @@
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2017:1856"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2016-4020",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-4020"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313686",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1313686"
},
{
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01106.html",
"refsource": "MISC",
@ -190,51 +102,11 @@
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01118.html",
"refsource": "MISC",
"name": "https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01118.html"
}
]
},
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Donghai Zdh (Alibaba Inc.) for reporting this issue."
}
],
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 2.9,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:A/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.4,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313686",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1313686"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-4439",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,47 +27,71 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "USN-3047-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3047-1"
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
},
{
"name": "90760",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/90760"
"url": "https://security.gentoo.org/glsa/201609-01",
"refsource": "MISC",
"name": "https://security.gentoo.org/glsa/201609-01"
},
{
"name": "GLSA-201609-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201609-01"
"url": "http://www.ubuntu.com/usn/USN-3047-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-3047-1"
},
{
"name": "USN-3047-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3047-2"
"url": "http://www.ubuntu.com/usn/USN-3047-2",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-3047-2"
},
{
"name": "[qemu-devel] 20160519 [PATCH 1/2] scsi: check command buffer length before write(CVE-2016-4439)",
"refsource": "MLIST",
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03273.html"
"url": "http://www.openwall.com/lists/oss-security/2016/05/19/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2016/05/19/3"
},
{
"name": "[oss-security] 20160519 CVE-2016-4439 Qemu: scsi: esp: OOB write while writing to 's->cmdbuf' in esp_reg_write",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/05/19/3"
"url": "http://www.securityfocus.com/bid/90760",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/90760"
},
{
"name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03273.html",
"refsource": "MISC",
"name": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03273.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1337502",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337502"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337502",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1337502"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-4440",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1337806",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337806"
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3ce424e45411cf5a13105e0386b6ecf6eeb4f66f",
"refsource": "MISC",
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3ce424e45411cf5a13105e0386b6ecf6eeb4f66f"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3ce424e45411cf5a13105e0386b6ecf6eeb4f66f",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3ce424e45411cf5a13105e0386b6ecf6eeb4f66f"
"url": "http://www.openwall.com/lists/oss-security/2016/05/20/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2016/05/20/2"
},
{
"name": "[oss-security] 20160520 CVE-2016-4440 Kernel: kvm: vmx: incorrect state update leading to MSR access",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/05/20/2"
"url": "https://github.com/torvalds/linux/commit/3ce424e45411cf5a13105e0386b6ecf6eeb4f66f",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/3ce424e45411cf5a13105e0386b6ecf6eeb4f66f"
},
{
"name": "https://github.com/torvalds/linux/commit/3ce424e45411cf5a13105e0386b6ecf6eeb4f66f",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/3ce424e45411cf5a13105e0386b6ecf6eeb4f66f"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337806",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1337806"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-4441",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,47 +27,71 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[qemu-devel] 20160519 [PATCH 2/2] scsi: check dma length before reading scsi command(CVE-2016-4441)",
"refsource": "MLIST",
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03274.html"
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
},
{
"name": "USN-3047-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3047-1"
"url": "https://security.gentoo.org/glsa/201609-01",
"refsource": "MISC",
"name": "https://security.gentoo.org/glsa/201609-01"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1337505",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337505"
"url": "http://www.openwall.com/lists/oss-security/2016/05/19/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2016/05/19/4"
},
{
"name": "GLSA-201609-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201609-01"
"url": "http://www.securityfocus.com/bid/90762",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/90762"
},
{
"name": "USN-3047-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3047-2"
"url": "http://www.ubuntu.com/usn/USN-3047-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-3047-1"
},
{
"name": "[oss-security] 20160519 CVE-2016-4441 Qemu: scsi: esp: OOB write while writing to 's-cmdbuf' in get_cmd",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/05/19/4"
"url": "http://www.ubuntu.com/usn/USN-3047-2",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-3047-2"
},
{
"name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03274.html",
"refsource": "MISC",
"name": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03274.html"
},
{
"name": "90762",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/90762"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337505",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1337505"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-4449",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,157 +27,181 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
"url": "http://xmlsoft.org/news.html",
"refsource": "MISC",
"name": "http://xmlsoft.org/news.html"
},
{
"name": "https://support.cybozu.com/ja-jp/article/9735",
"refsource": "CONFIRM",
"url": "https://support.cybozu.com/ja-jp/article/9735"
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "MISC",
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10170",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10170"
"url": "http://jvn.jp/en/jp/JVN17535578/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN17535578/index.html"
},
{
"name": "SSA:2016-148-01",
"refsource": "SLACKWARE",
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.404722"
"url": "http://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000066.html",
"refsource": "MISC",
"name": "http://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000066.html"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html"
},
{
"name": "JVN#17535578",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN17535578/index.html"
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html"
},
{
"name": "RHSA-2016:1292",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1292"
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html"
},
{
"name": "[oss-security] 20160525 3 libxml2 issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/05/25/2"
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html"
},
{
"name": "DSA-3593",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2016/dsa-3593"
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html"
},
{
"name": "APPLE-SA-2016-07-18-4",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html"
"url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-2957.html"
},
{
"name": "APPLE-SA-2016-07-18-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html"
"url": "http://www.openwall.com/lists/oss-security/2016/05/25/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2016/05/25/2"
},
{
"name": "APPLE-SA-2016-07-18-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html"
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource": "MISC",
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name": "http://xmlsoft.org/news.html",
"refsource": "CONFIRM",
"url": "http://xmlsoft.org/news.html"
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource": "MISC",
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"name": "https://support.apple.com/HT206901",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206901"
"url": "http://www.securityfocus.com/bid/90865",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/90865"
},
{
"name": "USN-2994-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2994-1"
"url": "http://www.securitytracker.com/id/1036348",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id/1036348"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.404722",
"refsource": "MISC",
"name": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.404722"
},
{
"name": "APPLE-SA-2016-07-18-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html"
"url": "http://www.ubuntu.com/usn/USN-2994-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2994-1"
},
{
"name": "JVNDB-2017-000066",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000066.html"
"url": "https://access.redhat.com/errata/RHSA-2016:1292",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:1292"
},
{
"name": "APPLE-SA-2016-07-18-6",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html"
"url": "https://git.gnome.org/browse/libxml2/commit/?id=b1d34de46a11323fccffa9fadeb33be670d602f5",
"refsource": "MISC",
"name": "https://git.gnome.org/browse/libxml2/commit/?id=b1d34de46a11323fccffa9fadeb33be670d602f5"
},
{
"name": "https://www.tenable.com/security/tns-2016-18",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2016-18"
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709",
"refsource": "MISC",
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709"
},
{
"name": "90865",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/90865"
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10170",
"refsource": "MISC",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10170"
},
{
"name": "https://git.gnome.org/browse/libxml2/commit/?id=b1d34de46a11323fccffa9fadeb33be670d602f5",
"refsource": "CONFIRM",
"url": "https://git.gnome.org/browse/libxml2/commit/?id=b1d34de46a11323fccffa9fadeb33be670d602f5"
"url": "https://support.apple.com/HT206899",
"refsource": "MISC",
"name": "https://support.apple.com/HT206899"
},
{
"name": "RHSA-2016:2957",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html"
"url": "https://support.apple.com/HT206901",
"refsource": "MISC",
"name": "https://support.apple.com/HT206901"
},
{
"name": "https://support.apple.com/HT206905",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206905"
"url": "https://support.apple.com/HT206902",
"refsource": "MISC",
"name": "https://support.apple.com/HT206902"
},
{
"name": "1036348",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036348"
"url": "https://support.apple.com/HT206903",
"refsource": "MISC",
"name": "https://support.apple.com/HT206903"
},
{
"name": "https://support.apple.com/HT206903",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206903"
"url": "https://support.apple.com/HT206904",
"refsource": "MISC",
"name": "https://support.apple.com/HT206904"
},
{
"name": "https://support.apple.com/HT206902",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206902"
"url": "https://support.apple.com/HT206905",
"refsource": "MISC",
"name": "https://support.apple.com/HT206905"
},
{
"name": "https://support.apple.com/HT206904",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206904"
"url": "https://support.cybozu.com/ja-jp/article/9735",
"refsource": "MISC",
"name": "https://support.cybozu.com/ja-jp/article/9735"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709"
"url": "https://www.debian.org/security/2016/dsa-3593",
"refsource": "MISC",
"name": "https://www.debian.org/security/2016/dsa-3593"
},
{
"name": "https://support.apple.com/HT206899",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206899"
"url": "https://www.tenable.com/security/tns-2016-18",
"refsource": "MISC",
"name": "https://www.tenable.com/security/tns-2016-18"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "An information disclosure flaw was found in 389 Directory Server. A user with no access to objects in certain LDAP sub-tree could send LDAP ADD operations with a specific object name. The error message returned to the user was different based on whether the target object existed or not."
"value": "389 Directory Server in Red Hat Enterprise Linux Desktop 6 through 7, Red Hat Enterprise Linux HPC Node 6 through 7, Red Hat Enterprise Linux Server 6 through 7, and Red Hat Enterprise Linux Workstation 6 through 7 allows remote attackers to infer the existence of RDN component objects."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Generation of Error Message Containing Sensitive Information",
"cweId": "CWE-209"
"value": "n/a"
}
]
}
@ -32,27 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 6",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:1.2.11.15-84.el6_8",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "0:1.3.5.10-11.el7",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -75,71 +63,11 @@
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-2765.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2016:2594",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:2594"
},
{
"url": "https://access.redhat.com/errata/RHSA-2016:2765",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:2765"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2016-4992",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-4992"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347760",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1347760"
}
]
},
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Martin Basti (Red Hat) and Petr Spacek (Red Hat)."
}
],
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 3.5,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
}
]
}
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in discovery-debug in foreman. An attacker, with permissions to view the debug results, would be able to view the root password associated with that system, potentially allowing them to access it."
"value": "discovery-debug in Foreman before 6.2 when the ssh service has been enabled on discovered nodes displays the root password in plaintext in the system journal when used to log in, which allows local users with access to the system journal to obtain the root password by reading the system journal, or by clicking Logs on the console."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Insertion of Sensitive Information into Log File",
"cweId": "CWE-532"
"value": "n/a"
}
]
}
@ -32,272 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Satellite 6.3 for RHEL 7",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:2.1.14-1.el7",
"version_affected": "!"
},
{
"version_value": "0:1.15.6.34-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:201801241201-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.4.4-1",
"version_affected": "!"
},
{
"version_value": "1:1.15.6.8-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.15.6.4-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.15.6.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.3.1-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.4.5-15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.4.0-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.5.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.4.5.26-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.0.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.5.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.13.4.6-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.4.1-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.2.1.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.13.4-3.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.13.4.8-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.16-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:4.0.5-4.el7",
"version_affected": "!"
},
{
"version_value": "0:0.0.9-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.0-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.0.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.6-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.1-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.2.1-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.4-3.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.9-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.10-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.6.9-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.3.0-1.git.0.b5c2768.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.3.7-2.git.0.3b416c9.el7sat",
"version_affected": "!"
},
{
"version_value": "0:6.3.0-23.0.el7sat",
"version_affected": "!"
},
{
"version_value": "0:6.3.0.12-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:5.1.1.4-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:10.0.2.2-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:9.1.5.3-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.1.0.3-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.14-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.7.11-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.0.13-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.3.7.2-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.6-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.9.6.4-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.8-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:5.0.1-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.4.16-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.9-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.11.0.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.3.0-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.11.0.5-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.8-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.3.3-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.0-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.6-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.5-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.6-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.12-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.3-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.11.3.5-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.4.5.58-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.2-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.10-1.fm1_15.el7sat",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -315,61 +58,11 @@
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2018:0336"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2016-4996",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-4996"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349136",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1349136"
}
]
},
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Thom Carlin (Red Hat)."
}
],
"impact": {
"cvss": [
{
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.2,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "COMPLETE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "COMPLETE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
}
]
}
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-4999",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,37 +27,61 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2016:1429",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1429"
"url": "http://www.securityfocus.com/bid/91795",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/91795"
},
{
"name": "https://issues.jboss.org/browse/DASHBUILDE-113",
"refsource": "CONFIRM",
"url": "https://issues.jboss.org/browse/DASHBUILDE-113"
"url": "https://access.redhat.com/errata/RHSA-2016:1428",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:1428"
},
{
"name": "RHSA-2016:1428",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1428"
"url": "https://access.redhat.com/errata/RHSA-2016:1429",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:1429"
},
{
"name": "91795",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91795"
"url": "https://github.com/dashbuilder/dashbuilder/commit/8574899e3b6455547b534f570b2330ff772e524b",
"refsource": "MISC",
"name": "https://github.com/dashbuilder/dashbuilder/commit/8574899e3b6455547b534f570b2330ff772e524b"
},
{
"name": "https://github.com/dashbuilder/dashbuilder/commit/8574899e3b6455547b534f570b2330ff772e524b",
"refsource": "CONFIRM",
"url": "https://github.com/dashbuilder/dashbuilder/commit/8574899e3b6455547b534f570b2330ff772e524b"
"url": "https://issues.jboss.org/browse/DASHBUILDE-113",
"refsource": "MISC",
"name": "https://issues.jboss.org/browse/DASHBUILDE-113"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1349990",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349990"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349990",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1349990"
}
]
}