diff --git a/2010/2xxx/CVE-2010-2221.json b/2010/2xxx/CVE-2010-2221.json index a4b6a4e0fe9..6c3b5dc9028 100644 --- a/2010/2xxx/CVE-2010-2221.json +++ b/2010/2xxx/CVE-2010-2221.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2010-2221 scsi-target-utils: stack buffer overflow vulnerability" + "value": "Multiple buffer overflows in the iSNS implementation in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) before 1.0.6, (2) iSCSI Enterprise Target (aka iscsitarget or IET) 1.4.20.1 and earlier, and (3) Generic SCSI Target Subsystem for Linux (aka SCST or iscsi-scst) 1.0.1.1 and earlier allow remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via (a) a long iSCSI Name string in an SCN message or (b) an invalid PDU." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Stack-based Buffer Overflow", - "cweId": "CWE-121" + "value": "n/a" } ] } @@ -32,16 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 5", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:0.0-6.20091205snap.el5_5.3", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -149,46 +148,11 @@ "refsource": "MISC", "name": "http://www.vupen.com/english/advisories/2010/1760" }, - { - "url": "https://access.redhat.com/errata/RHSA-2010:0518", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2010:0518" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2010-2221", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2010-2221" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=593877", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=593877" } ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "MEDIUM", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 6.8, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", - "version": "2.0" - } - ] } } \ No newline at end of file diff --git a/2010/2xxx/CVE-2010-2222.json b/2010/2xxx/CVE-2010-2222.json index 62b283f35a6..c154c146514 100644 --- a/2010/2xxx/CVE-2010-2222.json +++ b/2010/2xxx/CVE-2010-2222.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-2222", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Red Hat", - "product": { - "product_data": [ - { - "product_name": "Red Hat Directory Server", - "version": { - "version_data": [ - { - "version_value": "8" - } - ] - } - } - ] - } - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,17 +27,41 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Red Hat", + "product": { + "product_data": [ + { + "product_name": "Red Hat Directory Server", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "8" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2222", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2222" - }, { "url": "https://access.redhat.com/security/cve/cve-2010-2222", "refsource": "MISC", "name": "https://access.redhat.com/security/cve/cve-2010-2222" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2222", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2222" } ] } diff --git a/2010/2xxx/CVE-2010-2223.json b/2010/2xxx/CVE-2010-2223.json index e3fdec7bfca..45b66bafb76 100644 --- a/2010/2xxx/CVE-2010-2223.json +++ b/2010/2xxx/CVE-2010-2223.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-2223", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,32 +27,56 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "RHSA-2010:0476", - "refsource": "REDHAT", - "url": "https://rhn.redhat.com/errata/RHSA-2010-0476.html" + "url": "https://rhn.redhat.com/errata/RHSA-2010-0476.html", + "refsource": "MISC", + "name": "https://rhn.redhat.com/errata/RHSA-2010-0476.html" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=604752", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=604752" + "url": "http://securitytracker.com/id?1024137", + "refsource": "MISC", + "name": "http://securitytracker.com/id?1024137" }, { - "name": "41044", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/41044" + "url": "http://www.securityfocus.com/bid/41044", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/41044" }, { - "name": "RHSA-2010:0473", - "refsource": "REDHAT", - "url": "https://rhn.redhat.com/errata/RHSA-2010-0473.html" + "url": "https://rhn.redhat.com/errata/RHSA-2010-0473.html", + "refsource": "MISC", + "name": "https://rhn.redhat.com/errata/RHSA-2010-0473.html" }, { - "name": "1024137", - "refsource": "SECTRACK", - "url": "http://securitytracker.com/id?1024137" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=604752", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=604752" } ] } diff --git a/2010/2xxx/CVE-2010-2224.json b/2010/2xxx/CVE-2010-2224.json index 6e21a6f5aeb..b43c4039df7 100644 --- a/2010/2xxx/CVE-2010-2224.json +++ b/2010/2xxx/CVE-2010-2224.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-2224", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,22 +27,46 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "RHSA-2010:0478", - "refsource": "REDHAT", - "url": "https://rhn.redhat.com/errata/RHSA-2010-0478.html" + "url": "http://www.securityfocus.com/bid/41045", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/41045" }, { - "name": "41045", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/41045" + "url": "https://rhn.redhat.com/errata/RHSA-2010-0478.html", + "refsource": "MISC", + "name": "https://rhn.redhat.com/errata/RHSA-2010-0478.html" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=606774", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=606774" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=606774", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=606774" } ] } diff --git a/2010/2xxx/CVE-2010-2225.json b/2010/2xxx/CVE-2010-2225.json index 60128e0c57b..5f48746e778 100644 --- a/2010/2xxx/CVE-2010-2225.json +++ b/2010/2xxx/CVE-2010-2225.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-2225", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,77 +27,96 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "40860", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/40860" - }, - { - "name": "http://twitter.com/i0n1c/statuses/16373156076", + "url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html", "refsource": "MISC", - "url": "http://twitter.com/i0n1c/statuses/16373156076" + "name": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html" }, { - "name": "HPSBOV02763", - "refsource": "HP", - "url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2" - }, - { - "name": "php-splobjectstorage-code-execution(59610)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59610" - }, - { - "name": "DSA-2089", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2010/dsa-2089" - }, - { - "name": "APPLE-SA-2010-08-24-1", - "refsource": "APPLE", - "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html" - }, - { - "name": "40948", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/40948" - }, - { - "name": "SSRT100826", - "refsource": "HP", - "url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=605641", + "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html", "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=605641" + "name": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html" }, { - "name": "http://support.apple.com/kb/HT4312", - "refsource": "CONFIRM", - "url": "http://support.apple.com/kb/HT4312" - }, - { - "name": "http://twitter.com/i0n1c/statuses/16447867829", + "url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2", "refsource": "MISC", - "url": "http://twitter.com/i0n1c/statuses/16447867829" + "name": "http://marc.info/?l=bugtraq&m=133469208622507&w=2" }, { - "name": "SUSE-SR:2010:017", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html" - }, - { - "name": "SUSE-SR:2010:018", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html" - }, - { - "name": "http://pastebin.com/mXGidCsd", + "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html", "refsource": "MISC", - "url": "http://pastebin.com/mXGidCsd" + "name": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html" + }, + { + "url": "http://support.apple.com/kb/HT4312", + "refsource": "MISC", + "name": "http://support.apple.com/kb/HT4312" + }, + { + "url": "http://pastebin.com/mXGidCsd", + "refsource": "MISC", + "name": "http://pastebin.com/mXGidCsd" + }, + { + "url": "http://secunia.com/advisories/40860", + "refsource": "MISC", + "name": "http://secunia.com/advisories/40860" + }, + { + "url": "http://twitter.com/i0n1c/statuses/16373156076", + "refsource": "MISC", + "name": "http://twitter.com/i0n1c/statuses/16373156076" + }, + { + "url": "http://twitter.com/i0n1c/statuses/16447867829", + "refsource": "MISC", + "name": "http://twitter.com/i0n1c/statuses/16447867829" + }, + { + "url": "http://www.debian.org/security/2010/dsa-2089", + "refsource": "MISC", + "name": "http://www.debian.org/security/2010/dsa-2089" + }, + { + "url": "http://www.securityfocus.com/bid/40948", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/40948" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59610", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59610" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=605641", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=605641" } ] } diff --git a/2010/2xxx/CVE-2010-2226.json b/2010/2xxx/CVE-2010-2226.json index 174f6de553a..253f3bfea25 100644 --- a/2010/2xxx/CVE-2010-2226.json +++ b/2010/2xxx/CVE-2010-2226.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-2226", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,97 +27,121 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "RHSA-2010:0610", - "refsource": "REDHAT", - "url": "http://www.redhat.com/support/errata/RHSA-2010-0610.html" + "url": "http://secunia.com/advisories/43315", + "refsource": "MISC", + "name": "http://secunia.com/advisories/43315" }, { - "name": "[xfs] 20100616 Re: [Security] XFS swapext ioctl minor security issues", - "refsource": "MLIST", - "url": "http://archives.free.net.ph/message/20100616.135735.40f53a32.en.html" + "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded", + "refsource": "MISC", + "name": "http://www.securityfocus.com/archive/1/516397/100/0/threaded" }, { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1817176a86352f65210139d4c794ad2d19fc6b63", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1817176a86352f65210139d4c794ad2d19fc6b63" + "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html", + "refsource": "MISC", + "name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html" }, { - "name": "USN-1000-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1000-1" + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:198", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:198" }, { - "name": "[oss-security] 20100618 Re: CVE request - kernel: xfs swapext ioctl issue", - "refsource": "MLIST", - "url": "http://marc.info/?l=oss-security&m=127687486331790&w=2" + "url": "http://archives.free.net.ph/message/20100616.130710.301704aa.en.html", + "refsource": "MISC", + "name": "http://archives.free.net.ph/message/20100616.130710.301704aa.en.html" }, { - "name": "MDVSA-2010:198", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:198" + "url": "http://archives.free.net.ph/message/20100616.135735.40f53a32.en.html", + "refsource": "MISC", + "name": "http://archives.free.net.ph/message/20100616.135735.40f53a32.en.html" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=605158", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=605158" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1817176a86352f65210139d4c794ad2d19fc6b63", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1817176a86352f65210139d4c794ad2d19fc6b63" }, { - "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35", - "refsource": "CONFIRM", - "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35" + "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html" }, { - "name": "SUSE-SA:2011:007", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" }, { - "name": "SUSE-SA:2010:060", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html" + "url": "http://marc.info/?l=oss-security&m=127677135609357&w=2", + "refsource": "MISC", + "name": "http://marc.info/?l=oss-security&m=127677135609357&w=2" }, { - "name": "ADV-2011-0298", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0298" + "url": "http://marc.info/?l=oss-security&m=127687486331790&w=2", + "refsource": "MISC", + "name": "http://marc.info/?l=oss-security&m=127687486331790&w=2" }, { - "name": "[oss-security] 20100617 CVE request - kernel: xfs swapext ioctl issue", - "refsource": "MLIST", - "url": "http://marc.info/?l=oss-security&m=127677135609357&w=2" + "url": "http://www.debian.org/security/2010/dsa-2094", + "refsource": "MISC", + "name": "http://www.debian.org/security/2010/dsa-2094" }, { - "name": "43315", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/43315" + "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35", + "refsource": "MISC", + "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35" }, { - "name": "[xfs] 20100616 Re: [Security] XFS swapext ioctl minor security issues", - "refsource": "MLIST", - "url": "http://archives.free.net.ph/message/20100616.130710.301704aa.en.html" + "url": "http://www.redhat.com/support/errata/RHSA-2010-0610.html", + "refsource": "MISC", + "name": "http://www.redhat.com/support/errata/RHSA-2010-0610.html" }, { - "name": "DSA-2094", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2010/dsa-2094" + "url": "http://www.securityfocus.com/bid/40920", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/40920" }, { - "name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html", - "refsource": "CONFIRM", - "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html" + "url": "http://www.ubuntu.com/usn/USN-1000-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1000-1" }, { - "name": "40920", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/40920" + "url": "http://www.vupen.com/english/advisories/2011/0298", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0298" }, { - "name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX", - "refsource": "BUGTRAQ", - "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=605158", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=605158" } ] } diff --git a/2010/2xxx/CVE-2010-2228.json b/2010/2xxx/CVE-2010-2228.json index 9aebff4c305..d760c2165e3 100644 --- a/2010/2xxx/CVE-2010-2228.json +++ b/2010/2xxx/CVE-2010-2228.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-2228", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,77 +27,101 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes", - "refsource": "CONFIRM", - "url": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes" + "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" }, { - "name": "FEDORA-2010-10286", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html" + "url": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes", + "refsource": "MISC", + "name": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes" }, { - "name": "ADV-2010-1571", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/1571" + "url": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes", + "refsource": "MISC", + "name": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes" }, { - "name": "[oss-security] 20100621 Re: CVE request: moodle 1.9.9/1.8.13 multiple vulnerabilities", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2010/06/21/2" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html" }, { - "name": "40352", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/40352" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html" }, { - "name": "ADV-2010-1530", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/1530" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html" }, { - "name": "FEDORA-2010-10321", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html" + "url": "http://moodle.org/mod/forum/discuss.php?d=152366", + "refsource": "MISC", + "name": "http://moodle.org/mod/forum/discuss.php?d=152366" }, { - "name": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes", - "refsource": "CONFIRM", - "url": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes" + "url": "http://secunia.com/advisories/40248", + "refsource": "MISC", + "name": "http://secunia.com/advisories/40248" }, { - "name": "40248", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/40248" + "url": "http://secunia.com/advisories/40352", + "refsource": "MISC", + "name": "http://secunia.com/advisories/40352" }, { - "name": "FEDORA-2010-10291", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html" + "url": "http://tracker.moodle.org/browse/MDL-22040", + "refsource": "MISC", + "name": "http://tracker.moodle.org/browse/MDL-22040" }, { - "name": "http://moodle.org/mod/forum/discuss.php?d=152366", - "refsource": "CONFIRM", - "url": "http://moodle.org/mod/forum/discuss.php?d=152366" + "url": "http://www.openwall.com/lists/oss-security/2010/06/21/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2010/06/21/2" }, { - "name": "http://tracker.moodle.org/browse/MDL-22040", - "refsource": "CONFIRM", - "url": "http://tracker.moodle.org/browse/MDL-22040" + "url": "http://www.vupen.com/english/advisories/2010/1530", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/1530" }, { - "name": "SUSE-SR:2010:014", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" + "url": "http://www.vupen.com/english/advisories/2010/1571", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/1571" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=605809", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=605809" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=605809", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=605809" } ] } diff --git a/2010/2xxx/CVE-2010-2229.json b/2010/2xxx/CVE-2010-2229.json index c98a63a9d46..edf16b82142 100644 --- a/2010/2xxx/CVE-2010-2229.json +++ b/2010/2xxx/CVE-2010-2229.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-2229", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,87 +27,111 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://cvs.moodle.org/moodle/blog/lib.php?r1=1.62.2.9&r2=1.62.2.10", - "refsource": "CONFIRM", - "url": "http://cvs.moodle.org/moodle/blog/lib.php?r1=1.62.2.9&r2=1.62.2.10" + "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" }, { - "name": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes", - "refsource": "CONFIRM", - "url": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes" + "url": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes", + "refsource": "MISC", + "name": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes" }, { - "name": "FEDORA-2010-10286", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html" + "url": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes", + "refsource": "MISC", + "name": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes" }, { - "name": "ADV-2010-1571", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/1571" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html" }, { - "name": "[oss-security] 20100621 Re: CVE request: moodle 1.9.9/1.8.13 multiple vulnerabilities", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2010/06/21/2" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html" }, { - "name": "40352", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/40352" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html" }, { - "name": "ADV-2010-1530", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/1530" + "url": "http://secunia.com/advisories/40248", + "refsource": "MISC", + "name": "http://secunia.com/advisories/40248" }, { - "name": "FEDORA-2010-10321", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html" + "url": "http://secunia.com/advisories/40352", + "refsource": "MISC", + "name": "http://secunia.com/advisories/40352" }, { - "name": "http://moodle.org/mod/forum/discuss.php?d=152367", - "refsource": "CONFIRM", - "url": "http://moodle.org/mod/forum/discuss.php?d=152367" + "url": "http://www.openwall.com/lists/oss-security/2010/06/21/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2010/06/21/2" }, { - "name": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes", - "refsource": "CONFIRM", - "url": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes" + "url": "http://www.vupen.com/english/advisories/2010/1530", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/1530" }, { - "name": "40248", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/40248" + "url": "http://www.vupen.com/english/advisories/2010/1571", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/1571" }, { - "name": "FEDORA-2010-10291", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html" + "url": "http://cvs.moodle.org/moodle/blog/lib.php?r1=1.62.2.9&r2=1.62.2.10", + "refsource": "MISC", + "name": "http://cvs.moodle.org/moodle/blog/lib.php?r1=1.62.2.9&r2=1.62.2.10" }, { - "name": "SUSE-SR:2010:014", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" + "url": "http://cvs.moodle.org/moodle/blog/lib.php?r1=1.80.2.20&r2=1.80.2.21", + "refsource": "MISC", + "name": "http://cvs.moodle.org/moodle/blog/lib.php?r1=1.80.2.20&r2=1.80.2.21" }, { - "name": "http://tracker.moodle.org/browse/MDL-22631", - "refsource": "CONFIRM", - "url": "http://tracker.moodle.org/browse/MDL-22631" + "url": "http://moodle.org/mod/forum/discuss.php?d=152367", + "refsource": "MISC", + "name": "http://moodle.org/mod/forum/discuss.php?d=152367" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=605809", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=605809" + "url": "http://tracker.moodle.org/browse/MDL-22631", + "refsource": "MISC", + "name": "http://tracker.moodle.org/browse/MDL-22631" }, { - "name": "http://cvs.moodle.org/moodle/blog/lib.php?r1=1.80.2.20&r2=1.80.2.21", - "refsource": "CONFIRM", - "url": "http://cvs.moodle.org/moodle/blog/lib.php?r1=1.80.2.20&r2=1.80.2.21" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=605809", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=605809" } ] } diff --git a/2010/2xxx/CVE-2010-2230.json b/2010/2xxx/CVE-2010-2230.json index efef0ded950..f158f18c0d6 100644 --- a/2010/2xxx/CVE-2010-2230.json +++ b/2010/2xxx/CVE-2010-2230.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-2230", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,87 +27,111 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://tracker.moodle.org/browse/MDL-22042", - "refsource": "CONFIRM", - "url": "http://tracker.moodle.org/browse/MDL-22042" + "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" }, { - "name": "http://cvs.moodle.org/moodle/lib/weblib.php?r1=1.970.2.171&r2=1.970.2.172", - "refsource": "CONFIRM", - "url": "http://cvs.moodle.org/moodle/lib/weblib.php?r1=1.970.2.171&r2=1.970.2.172" + "url": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes", + "refsource": "MISC", + "name": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes" }, { - "name": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes", - "refsource": "CONFIRM", - "url": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes" + "url": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes", + "refsource": "MISC", + "name": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes" }, { - "name": "FEDORA-2010-10286", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html" }, { - "name": "ADV-2010-1571", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/1571" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html" }, { - "name": "[oss-security] 20100621 Re: CVE request: moodle 1.9.9/1.8.13 multiple vulnerabilities", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2010/06/21/2" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html" }, { - "name": "40352", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/40352" + "url": "http://secunia.com/advisories/40248", + "refsource": "MISC", + "name": "http://secunia.com/advisories/40248" }, { - "name": "ADV-2010-1530", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/1530" + "url": "http://secunia.com/advisories/40352", + "refsource": "MISC", + "name": "http://secunia.com/advisories/40352" }, { - "name": "http://moodle.org/mod/forum/discuss.php?d=152368", - "refsource": "CONFIRM", - "url": "http://moodle.org/mod/forum/discuss.php?d=152368" + "url": "http://www.openwall.com/lists/oss-security/2010/06/21/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2010/06/21/2" }, { - "name": "FEDORA-2010-10321", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html" + "url": "http://www.vupen.com/english/advisories/2010/1530", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/1530" }, { - "name": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes", - "refsource": "CONFIRM", - "url": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes" + "url": "http://www.vupen.com/english/advisories/2010/1571", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/1571" }, { - "name": "40248", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/40248" + "url": "http://cvs.moodle.org/moodle/lib/weblib.php?r1=1.812.2.114&r2=1.812.2.115", + "refsource": "MISC", + "name": "http://cvs.moodle.org/moodle/lib/weblib.php?r1=1.812.2.114&r2=1.812.2.115" }, { - "name": "FEDORA-2010-10291", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html" + "url": "http://cvs.moodle.org/moodle/lib/weblib.php?r1=1.970.2.171&r2=1.970.2.172", + "refsource": "MISC", + "name": "http://cvs.moodle.org/moodle/lib/weblib.php?r1=1.970.2.171&r2=1.970.2.172" }, { - "name": "http://cvs.moodle.org/moodle/lib/weblib.php?r1=1.812.2.114&r2=1.812.2.115", - "refsource": "CONFIRM", - "url": "http://cvs.moodle.org/moodle/lib/weblib.php?r1=1.812.2.114&r2=1.812.2.115" + "url": "http://moodle.org/mod/forum/discuss.php?d=152368", + "refsource": "MISC", + "name": "http://moodle.org/mod/forum/discuss.php?d=152368" }, { - "name": "SUSE-SR:2010:014", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" + "url": "http://tracker.moodle.org/browse/MDL-22042", + "refsource": "MISC", + "name": "http://tracker.moodle.org/browse/MDL-22042" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=605809", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=605809" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=605809", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=605809" } ] } diff --git a/2010/2xxx/CVE-2010-2231.json b/2010/2xxx/CVE-2010-2231.json index 0e169650dd1..63310590833 100644 --- a/2010/2xxx/CVE-2010-2231.json +++ b/2010/2xxx/CVE-2010-2231.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-2231", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,82 +27,106 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes", - "refsource": "CONFIRM", - "url": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes" + "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" }, { - "name": "FEDORA-2010-10286", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html" + "url": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes", + "refsource": "MISC", + "name": "http://docs.moodle.org/en/Moodle_1.8.13_release_notes" }, { - "name": "ADV-2010-1571", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/1571" + "url": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes", + "refsource": "MISC", + "name": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes" }, { - "name": "[oss-security] 20100621 Re: CVE request: moodle 1.9.9/1.8.13 multiple vulnerabilities", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2010/06/21/2" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html" }, { - "name": "40352", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/40352" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html" }, { - "name": "ADV-2010-1530", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/1530" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html" }, { - "name": "FEDORA-2010-10321", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html" + "url": "http://secunia.com/advisories/40248", + "refsource": "MISC", + "name": "http://secunia.com/advisories/40248" }, { - "name": "http://moodle.org/mod/forum/discuss.php?d=152369", - "refsource": "CONFIRM", - "url": "http://moodle.org/mod/forum/discuss.php?d=152369" + "url": "http://secunia.com/advisories/40352", + "refsource": "MISC", + "name": "http://secunia.com/advisories/40352" }, { - "name": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes", - "refsource": "CONFIRM", - "url": "http://docs.moodle.org/en/Moodle_1.9.9_release_notes" + "url": "http://www.openwall.com/lists/oss-security/2010/06/21/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2010/06/21/2" }, { - "name": "40248", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/40248" + "url": "http://www.vupen.com/english/advisories/2010/1530", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/1530" }, { - "name": "FEDORA-2010-10291", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html" + "url": "http://www.vupen.com/english/advisories/2010/1571", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/1571" }, { - "name": "http://tracker.moodle.org/browse/MDL-21688", - "refsource": "CONFIRM", - "url": "http://tracker.moodle.org/browse/MDL-21688" + "url": "http://cvs.moodle.org/moodle/mod/quiz/report/overview/report.php?r1=1.98.2.50&r2=1.98.2.51", + "refsource": "MISC", + "name": "http://cvs.moodle.org/moodle/mod/quiz/report/overview/report.php?r1=1.98.2.50&r2=1.98.2.51" }, { - "name": "SUSE-SR:2010:014", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" + "url": "http://moodle.org/mod/forum/discuss.php?d=152369", + "refsource": "MISC", + "name": "http://moodle.org/mod/forum/discuss.php?d=152369" }, { - "name": "http://cvs.moodle.org/moodle/mod/quiz/report/overview/report.php?r1=1.98.2.50&r2=1.98.2.51", - "refsource": "CONFIRM", - "url": "http://cvs.moodle.org/moodle/mod/quiz/report/overview/report.php?r1=1.98.2.50&r2=1.98.2.51" + "url": "http://tracker.moodle.org/browse/MDL-21688", + "refsource": "MISC", + "name": "http://tracker.moodle.org/browse/MDL-21688" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=605809", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=605809" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=605809", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=605809" } ] } diff --git a/2010/4xxx/CVE-2010-4253.json b/2010/4xxx/CVE-2010-4253.json index a0e288fe08e..e888bf9dee2 100644 --- a/2010/4xxx/CVE-2010-4253.json +++ b/2010/4xxx/CVE-2010-4253.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2010-4253 OpenOffice.org: heap based buffer overflow in PPT import" + "value": "Heap-based buffer overflow in Impress in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file in an ODF or Microsoft Office document, as demonstrated by a PowerPoint (aka PPT) document." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Heap-based Buffer Overflow", - "cweId": "CWE-122" + "value": "n/a" } ] } @@ -32,27 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 5", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "1:3.1.1-19.5.el5_5.6", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 6", - "version": { - "version_data": [ - { - "version_value": "1:3.2.1-19.6.el6_0.5", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -145,16 +133,6 @@ "refsource": "MISC", "name": "http://www.vupen.com/english/advisories/2011/0232" }, - { - "url": "https://access.redhat.com/errata/RHSA-2011:0182", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2011:0182" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2011:0183", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2011:0183" - }, { "url": "http://osvdb.org/70717", "refsource": "MISC", @@ -165,41 +143,11 @@ "refsource": "MISC", "name": "http://www.openoffice.org/security/cves/CVE-2010-4253.html" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2010-4253", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2010-4253" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=658259", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=658259" } ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "MEDIUM", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 6.8, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", - "version": "2.0" - } - ] } } \ No newline at end of file diff --git a/2010/4xxx/CVE-2010-4254.json b/2010/4xxx/CVE-2010-4254.json index 164cca58938..deaaa3c5707 100644 --- a/2010/4xxx/CVE-2010-4254.json +++ b/2010/4xxx/CVE-2010-4254.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-4254", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,72 +27,96 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "SUSE-SR:2011:001", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" }, { - "name": "42373", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42373" + "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html" }, { - "name": "http://www.mono-project.com/Vulnerabilities#Moonlight_Generic_Constraints_Bypass_Vulnerability", - "refsource": "CONFIRM", - "url": "http://www.mono-project.com/Vulnerabilities#Moonlight_Generic_Constraints_Bypass_Vulnerability" + "url": "http://secunia.com/advisories/42877", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42877" }, { - "name": "15974", - "refsource": "EXPLOIT-DB", - "url": "http://www.exploit-db.com/exploits/15974" + "url": "http://www.vupen.com/english/advisories/2011/0076", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0076" }, { - "name": "https://bugzilla.novell.com/show_bug.cgi?id=655847", - "refsource": "CONFIRM", - "url": "https://bugzilla.novell.com/show_bug.cgi?id=655847" + "url": "http://secunia.com/advisories/42373", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42373" }, { - "name": "42877", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42877" + "url": "http://www.exploit-db.com/exploits/15974", + "refsource": "MISC", + "name": "http://www.exploit-db.com/exploits/15974" }, { - "name": "https://github.com/mono/mono/commit/4905ef1130feb26c3150b28b97e4a96752e0d399", - "refsource": "CONFIRM", - "url": "https://github.com/mono/mono/commit/4905ef1130feb26c3150b28b97e4a96752e0d399" + "url": "http://www.mono-project.com/Vulnerabilities#Moonlight_Generic_Constraints_Bypass_Vulnerability", + "refsource": "MISC", + "name": "http://www.mono-project.com/Vulnerabilities#Moonlight_Generic_Constraints_Bypass_Vulnerability" }, { - "name": "https://github.com/mono/mono/commit/cf1ec146f7c6acdc6697032b3aaafc68ffacdcac", - "refsource": "CONFIRM", - "url": "https://github.com/mono/mono/commit/cf1ec146f7c6acdc6697032b3aaafc68ffacdcac" + "url": "http://www.securityfocus.com/bid/45051", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/45051" }, { - "name": "45051", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/45051" + "url": "https://bugzilla.novell.com/show_bug.cgi?id=654136", + "refsource": "MISC", + "name": "https://bugzilla.novell.com/show_bug.cgi?id=654136" }, { - "name": "ADV-2011-0076", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0076" + "url": "https://bugzilla.novell.com/show_bug.cgi?id=655847", + "refsource": "MISC", + "name": "https://bugzilla.novell.com/show_bug.cgi?id=655847" }, { - "name": "SUSE-SR:2010:024", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" + "url": "https://github.com/mono/mono/commit/4905ef1130feb26c3150b28b97e4a96752e0d399", + "refsource": "MISC", + "name": "https://github.com/mono/mono/commit/4905ef1130feb26c3150b28b97e4a96752e0d399" }, { - "name": "https://github.com/mono/mono/commit/65292a69c837b8a5f7a392d34db63de592153358", - "refsource": "CONFIRM", - "url": "https://github.com/mono/mono/commit/65292a69c837b8a5f7a392d34db63de592153358" + "url": "https://github.com/mono/mono/commit/65292a69c837b8a5f7a392d34db63de592153358", + "refsource": "MISC", + "name": "https://github.com/mono/mono/commit/65292a69c837b8a5f7a392d34db63de592153358" }, { - "name": "https://bugzilla.novell.com/show_bug.cgi?id=654136", - "refsource": "CONFIRM", - "url": "https://bugzilla.novell.com/show_bug.cgi?id=654136" + "url": "https://github.com/mono/mono/commit/cf1ec146f7c6acdc6697032b3aaafc68ffacdcac", + "refsource": "MISC", + "name": "https://github.com/mono/mono/commit/cf1ec146f7c6acdc6697032b3aaafc68ffacdcac" } ] } diff --git a/2010/4xxx/CVE-2010-4255.json b/2010/4xxx/CVE-2010-4255.json index c155d36be86..799e3c597de 100644 --- a/2010/4xxx/CVE-2010-4255.json +++ b/2010/4xxx/CVE-2010-4255.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-4255", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,52 +27,76 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console", - "refsource": "BUGTRAQ", - "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" + "url": "http://secunia.com/advisories/46397", + "refsource": "MISC", + "name": "http://secunia.com/advisories/46397" }, { - "name": "RHSA-2011:0017", - "refsource": "REDHAT", - "url": "http://www.redhat.com/support/errata/RHSA-2011-0017.html" + "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded", + "refsource": "MISC", + "name": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { - "name": "46397", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/46397" + "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", + "refsource": "MISC", + "name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=658155", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=658155" + "url": "http://secunia.com/advisories/42884", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42884" }, { - "name": "[oss-security] 20101130 CVE request: xen: x86-64: don't crash Xen upon direct pv guest access", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/11/30/5" + "url": "http://www.redhat.com/support/errata/RHSA-2011-0017.html", + "refsource": "MISC", + "name": "http://www.redhat.com/support/errata/RHSA-2011-0017.html" }, { - "name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", - "refsource": "CONFIRM", - "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" + "url": "http://lists.xensource.com/archives/html/xen-devel/2010-11/msg01650.html", + "refsource": "MISC", + "name": "http://lists.xensource.com/archives/html/xen-devel/2010-11/msg01650.html" }, { - "name": "42884", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42884" + "url": "http://openwall.com/lists/oss-security/2010/11/30/5", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/11/30/5" }, { - "name": "[xen-devel] 20101129 [PATCH] x86-64: don't crash Xen upon direct pv guest access", - "refsource": "MLIST", - "url": "http://lists.xensource.com/archives/html/xen-devel/2010-11/msg01650.html" + "url": "http://openwall.com/lists/oss-security/2010/11/30/8", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/11/30/8" }, { - "name": "[oss-security] 20101130 Re: CVE request: xen: x86-64: don't crash Xen upon direct pv guest access", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/11/30/8" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=658155", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=658155" } ] } diff --git a/2010/4xxx/CVE-2010-4256.json b/2010/4xxx/CVE-2010-4256.json index c066732ff60..1b31e818ca0 100644 --- a/2010/4xxx/CVE-2010-4256.json +++ b/2010/4xxx/CVE-2010-4256.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-4256", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c66fb347946ebdd5b10908866ecc9fa05ee2cf3d", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c66fb347946ebdd5b10908866ecc9fa05ee2cf3d" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c66fb347946ebdd5b10908866ecc9fa05ee2cf3d", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c66fb347946ebdd5b10908866ecc9fa05ee2cf3d" }, { - "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37", - "refsource": "CONFIRM", - "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37" + "url": "http://openwall.com/lists/oss-security/2010/11/30/6", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/11/30/6" }, { - "name": "[oss-security] 20101130 Re: CVE request: kernel: pipe_fcntl local DoS", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/11/30/9" + "url": "http://openwall.com/lists/oss-security/2010/11/30/9", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/11/30/9" }, { - "name": "[oss-security] 20101130 CVE request: kernel: pipe_fcntl local DoS", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/11/30/6" + "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37", + "refsource": "MISC", + "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37" } ] } diff --git a/2010/4xxx/CVE-2010-4257.json b/2010/4xxx/CVE-2010-4257.json index 5c6c95f8c01..aa7e1ceb214 100644 --- a/2010/4xxx/CVE-2010-4257.json +++ b/2010/4xxx/CVE-2010-4257.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-4257", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,107 +27,131 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "42844", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42844" - }, - { - "name": "http://wordpress.org/news/2010/11/wordpress-3-0-2/", - "refsource": "CONFIRM", - "url": "http://wordpress.org/news/2010/11/wordpress-3-0-2/" - }, - { - "name": "DSA-2138", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2010/dsa-2138" - }, - { - "name": "FEDORA-2010-19329", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052932.html" - }, - { - "name": "42753", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42753" - }, - { - "name": "http://blog.sjinks.pro/wordpress/858-information-disclosure-via-sql-injection-attack/", + "url": "http://blog.sjinks.pro/wordpress/858-information-disclosure-via-sql-injection-attack/", "refsource": "MISC", - "url": "http://blog.sjinks.pro/wordpress/858-information-disclosure-via-sql-injection-attack/" + "name": "http://blog.sjinks.pro/wordpress/858-information-disclosure-via-sql-injection-attack/" }, { - "name": "FEDORA-2010-19290", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052892.html" - }, - { - "name": "42871", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42871" - }, - { - "name": "ADV-2010-3337", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/3337" - }, - { - "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605603", - "refsource": "CONFIRM", - "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605603" - }, - { - "name": "http://core.trac.wordpress.org/changeset/16625", - "refsource": "CONFIRM", - "url": "http://core.trac.wordpress.org/changeset/16625" - }, - { - "name": "http://www.xakep.ru/magazine/xa/124/052/1.asp", + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605603", "refsource": "MISC", - "url": "http://www.xakep.ru/magazine/xa/124/052/1.asp" + "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605603" }, { - "name": "45131", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/45131" + "url": "http://codex.wordpress.org/Version_3.0.2", + "refsource": "MISC", + "name": "http://codex.wordpress.org/Version_3.0.2" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=659265", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=659265" + "url": "http://core.trac.wordpress.org/changeset/16625", + "refsource": "MISC", + "name": "http://core.trac.wordpress.org/changeset/16625" }, { - "name": "FEDORA-2010-19296", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052879.html" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052879.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052879.html" }, { - "name": "FEDORA-2010-19330", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052917.html" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052892.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052892.html" }, { - "name": "42431", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42431" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052917.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052917.html" }, { - "name": "http://codex.wordpress.org/Version_3.0.2", - "refsource": "CONFIRM", - "url": "http://codex.wordpress.org/Version_3.0.2" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052932.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052932.html" }, { - "name": "ADV-2011-0042", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0042" + "url": "http://secunia.com/advisories/42431", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42431" }, { - "name": "ADV-2011-0057", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0057" + "url": "http://secunia.com/advisories/42753", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42753" + }, + { + "url": "http://secunia.com/advisories/42844", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42844" + }, + { + "url": "http://secunia.com/advisories/42871", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42871" + }, + { + "url": "http://wordpress.org/news/2010/11/wordpress-3-0-2/", + "refsource": "MISC", + "name": "http://wordpress.org/news/2010/11/wordpress-3-0-2/" + }, + { + "url": "http://www.debian.org/security/2010/dsa-2138", + "refsource": "MISC", + "name": "http://www.debian.org/security/2010/dsa-2138" + }, + { + "url": "http://www.securityfocus.com/bid/45131", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/45131" + }, + { + "url": "http://www.vupen.com/english/advisories/2010/3337", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/3337" + }, + { + "url": "http://www.vupen.com/english/advisories/2011/0042", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0042" + }, + { + "url": "http://www.vupen.com/english/advisories/2011/0057", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0057" + }, + { + "url": "http://www.xakep.ru/magazine/xa/124/052/1.asp", + "refsource": "MISC", + "name": "http://www.xakep.ru/magazine/xa/124/052/1.asp" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=659265", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=659265" } ] } diff --git a/2010/4xxx/CVE-2010-4258.json b/2010/4xxx/CVE-2010-4258.json index 8d1bf8e45f0..c8b1f3bcf9b 100644 --- a/2010/4xxx/CVE-2010-4258.json +++ b/2010/4xxx/CVE-2010-4258.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-4258", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,197 +27,221 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[oss-security] 20101202 CVE request: kernel: failure to revert address limit override in OOPS error path", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/02/2" - }, - { - "name": "43056", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/43056" - }, - { - "name": "SUSE-SA:2011:004", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html" - }, - { - "name": "42778", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42778" - }, - { - "name": "[oss-security] 20101202 kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/02/3" - }, - { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=33dd94ae1ccbfb7bf0fb6c692bc3d1c4269e6177", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=33dd94ae1ccbfb7bf0fb6c692bc3d1c4269e6177" - }, - { - "name": "42801", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42801" - }, - { - "name": "SUSE-SA:2011:002", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html" - }, - { - "name": "http://blog.nelhage.com/2010/12/cve-2010-4258-from-dos-to-privesc/", + "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html", "refsource": "MISC", - "url": "http://blog.nelhage.com/2010/12/cve-2010-4258-from-dos-to-privesc/" + "name": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" }, { - "name": "[oss-security] 20101209 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/09/4" + "url": "http://www.vupen.com/english/advisories/2011/0298", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0298" }, { - "name": "FEDORA-2010-18983", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html" }, { - "name": "SUSE-SA:2011:001", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html" }, { - "name": "42932", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42932" + "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html" }, { - "name": "20101207 Linux kernel exploit", - "refsource": "FULLDISC", - "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0086.html" + "url": "http://secunia.com/advisories/42778", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42778" }, { - "name": "ADV-2011-0124", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0124" + "url": "http://secunia.com/advisories/42801", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42801" }, { - "name": "[linux-kernel] 20101201 [PATCH v2] do_exit(): Make sure we run with get_fs() == USER_DS.", - "refsource": "MLIST", - "url": "http://marc.info/?l=linux-kernel&m=129117048916957&w=2" + "url": "http://secunia.com/advisories/42932", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42932" }, { - "name": "SUSE-SA:2011:007", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029" }, { - "name": "ADV-2010-3321", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/3321" + "url": "http://www.vupen.com/english/advisories/2011/0012", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0012" }, { - "name": "[oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/08/9" + "url": "http://www.vupen.com/english/advisories/2011/0124", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0124" }, { - "name": "ADV-2011-0298", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0298" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html" }, { - "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2", - "refsource": "CONFIRM", - "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2" + "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html" }, { - "name": "[oss-security] 20101209 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/09/14" + "url": "http://secunia.com/advisories/42745", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42745" }, { - "name": "SUSE-SA:2011:005", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00007.html" + "url": "http://secunia.com/advisories/43291", + "refsource": "MISC", + "name": "http://secunia.com/advisories/43291" }, { - "name": "http://code.google.com/p/chromium-os/issues/detail?id=10234", - "refsource": "CONFIRM", - "url": "http://code.google.com/p/chromium-os/issues/detail?id=10234" + "url": "http://www.vupen.com/english/advisories/2010/3321", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/3321" }, { - "name": "ADV-2011-0375", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0375" + "url": "http://www.vupen.com/english/advisories/2011/0375", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0375" }, { - "name": "[linux-kernel] 20101201 Re: [PATCH v2] do_exit(): Make sure we run with get_fs() == USER_DS.", - "refsource": "MLIST", - "url": "https://lkml.org/lkml/2010/12/1/543" + "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00007.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00007.html" }, { - "name": "http://googlechromereleases.blogspot.com/2011/01/chrome-os-beta-channel-update.html", - "refsource": "CONFIRM", - "url": "http://googlechromereleases.blogspot.com/2011/01/chrome-os-beta-channel-update.html" + "url": "http://secunia.com/advisories/43056", + "refsource": "MISC", + "name": "http://secunia.com/advisories/43056" }, { - "name": "ADV-2011-0012", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0012" + "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2", + "refsource": "MISC", + "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2" }, { - "name": "SUSE-SA:2011:008", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html" + "url": "http://www.vupen.com/english/advisories/2011/0213", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0213" }, { - "name": "[oss-security] 20101202 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/02/4" + "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0086.html", + "refsource": "MISC", + "name": "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0086.html" }, { - "name": "MDVSA-2011:029", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029" + "url": "http://blog.nelhage.com/2010/12/cve-2010-4258-from-dos-to-privesc/", + "refsource": "MISC", + "name": "http://blog.nelhage.com/2010/12/cve-2010-4258-from-dos-to-privesc/" }, { - "name": "42745", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42745" + "url": "http://code.google.com/p/chromium-os/issues/detail?id=10234", + "refsource": "MISC", + "name": "http://code.google.com/p/chromium-os/issues/detail?id=10234" }, { - "name": "[oss-security] 20101202 Re: CVE request: kernel: failure to revert address limit override in OOPS error path", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/02/7" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=33dd94ae1ccbfb7bf0fb6c692bc3d1c4269e6177", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=33dd94ae1ccbfb7bf0fb6c692bc3d1c4269e6177" }, { - "name": "[oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/08/5" + "url": "http://googlechromereleases.blogspot.com/2011/01/chrome-os-beta-channel-update.html", + "refsource": "MISC", + "name": "http://googlechromereleases.blogspot.com/2011/01/chrome-os-beta-channel-update.html" }, { - "name": "43291", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/43291" + "url": "http://marc.info/?l=linux-kernel&m=129117048916957&w=2", + "refsource": "MISC", + "name": "http://marc.info/?l=linux-kernel&m=129117048916957&w=2" }, { - "name": "ADV-2011-0213", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0213" + "url": "http://openwall.com/lists/oss-security/2010/12/02/2", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/02/2" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=659567", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=659567" + "url": "http://openwall.com/lists/oss-security/2010/12/02/3", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/02/3" }, { - "name": "[oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/08/4" + "url": "http://openwall.com/lists/oss-security/2010/12/02/4", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/02/4" + }, + { + "url": "http://openwall.com/lists/oss-security/2010/12/02/7", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/02/7" + }, + { + "url": "http://openwall.com/lists/oss-security/2010/12/08/4", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/08/4" + }, + { + "url": "http://openwall.com/lists/oss-security/2010/12/08/5", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/08/5" + }, + { + "url": "http://openwall.com/lists/oss-security/2010/12/08/9", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/08/9" + }, + { + "url": "http://openwall.com/lists/oss-security/2010/12/09/14", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/09/14" + }, + { + "url": "http://openwall.com/lists/oss-security/2010/12/09/4", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/09/4" + }, + { + "url": "https://lkml.org/lkml/2010/12/1/543", + "refsource": "MISC", + "name": "https://lkml.org/lkml/2010/12/1/543" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=659567", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=659567" } ] } diff --git a/2010/4xxx/CVE-2010-4259.json b/2010/4xxx/CVE-2010-4259.json index b1875fe1d32..04b99a0e05e 100644 --- a/2010/4xxx/CVE-2010-4259.json +++ b/2010/4xxx/CVE-2010-4259.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-4259", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,62 +27,86 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "45162", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/45162" + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605537", + "refsource": "MISC", + "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605537" }, { - "name": "[oss-security] 20101202 Re: CVE Request -- FontForge: Stack-based buffer overflow by processing specially-crafted CHARSET_REGISTRY font file header", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/02/8" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052201.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052201.html" }, { - "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605537", - "refsource": "CONFIRM", - "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605537" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052219.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052219.html" }, { - "name": "DSA-2253", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2011/dsa-2253" + "url": "http://openwall.com/lists/oss-security/2010/12/02/5", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/02/5" }, { - "name": "FEDORA-2010-18577", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052219.html" + "url": "http://openwall.com/lists/oss-security/2010/12/02/8", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/02/8" }, { - "name": "42577", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42577" + "url": "http://secunia.com/advisories/42577", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42577" }, { - "name": "FEDORA-2010-18573", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052201.html" + "url": "http://www.debian.org/security/2011/dsa-2253", + "refsource": "MISC", + "name": "http://www.debian.org/security/2011/dsa-2253" }, { - "name": "[oss-security] 20101202 CVE Request -- FontForge: Stack-based buffer overflow by processing specially-crafted CHARSET_REGISTRY font file header", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/02/5" + "url": "http://www.exploit-db.com/exploits/15732", + "refsource": "MISC", + "name": "http://www.exploit-db.com/exploits/15732" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=659359", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=659359" + "url": "http://www.securityfocus.com/bid/45162", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/45162" }, { - "name": "15732", - "refsource": "EXPLOIT-DB", - "url": "http://www.exploit-db.com/exploits/15732" + "url": "http://www.vupen.com/english/advisories/2010/3200", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/3200" }, { - "name": "ADV-2010-3200", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/3200" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=659359", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=659359" } ] } diff --git a/2010/4xxx/CVE-2010-4260.json b/2010/4xxx/CVE-2010-4260.json index 35e54d05e55..e051c162e9e 100644 --- a/2010/4xxx/CVE-2010-4260.json +++ b/2010/4xxx/CVE-2010-4260.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-4260", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,127 +27,151 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "42555", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42555" - }, - { - "name": "ADV-2010-3137", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/3137" - }, - { - "name": "FEDORA-2010-18564", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052401.html" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=659861", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=659861" - }, - { - "name": "USN-1031-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1031-1" - }, - { - "name": "ADV-2010-3185", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/3185" - }, - { - "name": "1024818", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id?1024818" - }, - { - "name": "[oss-security] 20101203 clamav 0.96.5 released", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/03/1" - }, - { - "name": "APPLE-SA-2011-03-21-1", - "refsource": "APPLE", - "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" - }, - { - "name": "42523", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42523" - }, - { - "name": "FEDORA-2010-18568", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051905.html" - }, - { - "name": "42426", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42426" - }, - { - "name": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2358", - "refsource": "CONFIRM", - "url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2358" - }, - { - "name": "42720", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42720" - }, - { - "name": "[oss-security] 20101203 Re: clamav 0.96.5 released", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/03/6" - }, - { - "name": "MDVSA-2010:249", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:249" - }, - { - "name": "http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob_plain;f=ChangeLog;hb=master", - "refsource": "CONFIRM", - "url": "http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob_plain;f=ChangeLog;hb=master" - }, - { - "name": "45152", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/45152" - }, - { - "name": "SUSE-SR:2010:024", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" - }, - { - "name": "http://xorl.wordpress.com/2010/12/06/cve-2010-4260-clamav-multiple-pdf-vulnerabilities/", + "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html", "refsource": "MISC", - "url": "http://xorl.wordpress.com/2010/12/06/cve-2010-4260-clamav-multiple-pdf-vulnerabilities/" + "name": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" }, { - "name": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2396", - "refsource": "CONFIRM", - "url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2396" + "url": "http://support.apple.com/kb/HT4581", + "refsource": "MISC", + "name": "http://support.apple.com/kb/HT4581" }, { - "name": "ADV-2010-3135", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/3135" + "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" }, { - "name": "[oss-security] 20101203 Re: clamav 0.96.5 released", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/03/3" + "url": "http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob_plain%3Bf=ChangeLog%3Bhb=master", + "refsource": "MISC", + "name": "http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob_plain%3Bf=ChangeLog%3Bhb=master" }, { - "name": "http://support.apple.com/kb/HT4581", - "refsource": "CONFIRM", - "url": "http://support.apple.com/kb/HT4581" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051905.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051905.html" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052401.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052401.html" + }, + { + "url": "http://openwall.com/lists/oss-security/2010/12/03/1", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/03/1" + }, + { + "url": "http://openwall.com/lists/oss-security/2010/12/03/3", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/03/3" + }, + { + "url": "http://openwall.com/lists/oss-security/2010/12/03/6", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/03/6" + }, + { + "url": "http://secunia.com/advisories/42426", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42426" + }, + { + "url": "http://secunia.com/advisories/42523", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42523" + }, + { + "url": "http://secunia.com/advisories/42555", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42555" + }, + { + "url": "http://secunia.com/advisories/42720", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42720" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:249", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:249" + }, + { + "url": "http://www.securityfocus.com/bid/45152", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/45152" + }, + { + "url": "http://www.securitytracker.com/id?1024818", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id?1024818" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1031-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1031-1" + }, + { + "url": "http://www.vupen.com/english/advisories/2010/3135", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/3135" + }, + { + "url": "http://www.vupen.com/english/advisories/2010/3137", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/3137" + }, + { + "url": "http://www.vupen.com/english/advisories/2010/3185", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/3185" + }, + { + "url": "http://xorl.wordpress.com/2010/12/06/cve-2010-4260-clamav-multiple-pdf-vulnerabilities/", + "refsource": "MISC", + "name": "http://xorl.wordpress.com/2010/12/06/cve-2010-4260-clamav-multiple-pdf-vulnerabilities/" + }, + { + "url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2358", + "refsource": "MISC", + "name": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2358" + }, + { + "url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2396", + "refsource": "MISC", + "name": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2396" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=659861", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=659861" } ] } diff --git a/2010/4xxx/CVE-2010-4261.json b/2010/4xxx/CVE-2010-4261.json index 8d7eeaff297..633731979b5 100644 --- a/2010/4xxx/CVE-2010-4261.json +++ b/2010/4xxx/CVE-2010-4261.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-4261", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "Off-by-one error in the icon_cb function in pe_icons.c in libclamav in ClamAV before 0.96.5 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors. NOTE: some of these details are obtained from third party information." + "value": "Off-by-one error in the icon_cb function in pe_icons.c in libclamav in ClamAV before 0.96.5 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors. NOTE: some of these details are obtained from third party information." } ] }, @@ -50,122 +27,146 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "42555", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42555" - }, - { - "name": "ADV-2010-3137", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/3137" - }, - { - "name": "FEDORA-2010-18564", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052401.html" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=659861", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=659861" - }, - { - "name": "USN-1031-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1031-1" - }, - { - "name": "ADV-2010-3185", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/3185" - }, - { - "name": "1024818", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id?1024818" - }, - { - "name": "[oss-security] 20101203 clamav 0.96.5 released", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/03/1" - }, - { - "name": "APPLE-SA-2011-03-21-1", - "refsource": "APPLE", - "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" - }, - { - "name": "http://xorl.wordpress.com/2010/12/05/cve-2010-4261-clamav-icon_cb-off-by-one/", + "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html", "refsource": "MISC", - "url": "http://xorl.wordpress.com/2010/12/05/cve-2010-4261-clamav-icon_cb-off-by-one/" + "name": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" }, { - "name": "42523", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42523" + "url": "http://support.apple.com/kb/HT4581", + "refsource": "MISC", + "name": "http://support.apple.com/kb/HT4581" }, { - "name": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2344", - "refsource": "CONFIRM", - "url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2344" + "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" }, { - "name": "FEDORA-2010-18568", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051905.html" + "url": "http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob_plain%3Bf=ChangeLog%3Bhb=master", + "refsource": "MISC", + "name": "http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob_plain%3Bf=ChangeLog%3Bhb=master" }, { - "name": "42426", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42426" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051905.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051905.html" }, { - "name": "42720", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42720" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052401.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052401.html" }, { - "name": "[oss-security] 20101203 Re: clamav 0.96.5 released", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/03/6" + "url": "http://openwall.com/lists/oss-security/2010/12/03/1", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/03/1" }, { - "name": "MDVSA-2010:249", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:249" + "url": "http://openwall.com/lists/oss-security/2010/12/03/3", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/03/3" }, { - "name": "http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob_plain;f=ChangeLog;hb=master", - "refsource": "CONFIRM", - "url": "http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob_plain;f=ChangeLog;hb=master" + "url": "http://openwall.com/lists/oss-security/2010/12/03/6", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2010/12/03/6" }, { - "name": "45152", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/45152" + "url": "http://secunia.com/advisories/42426", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42426" }, { - "name": "SUSE-SR:2010:024", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" + "url": "http://secunia.com/advisories/42523", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42523" }, { - "name": "ADV-2010-3135", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/3135" + "url": "http://secunia.com/advisories/42555", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42555" }, { - "name": "[oss-security] 20101203 Re: clamav 0.96.5 released", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2010/12/03/3" + "url": "http://secunia.com/advisories/42720", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42720" }, { - "name": "http://support.apple.com/kb/HT4581", - "refsource": "CONFIRM", - "url": "http://support.apple.com/kb/HT4581" + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:249", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:249" + }, + { + "url": "http://www.securityfocus.com/bid/45152", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/45152" + }, + { + "url": "http://www.securitytracker.com/id?1024818", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id?1024818" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1031-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1031-1" + }, + { + "url": "http://www.vupen.com/english/advisories/2010/3135", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/3135" + }, + { + "url": "http://www.vupen.com/english/advisories/2010/3137", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/3137" + }, + { + "url": "http://www.vupen.com/english/advisories/2010/3185", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/3185" + }, + { + "url": "http://xorl.wordpress.com/2010/12/05/cve-2010-4261-clamav-icon_cb-off-by-one/", + "refsource": "MISC", + "name": "http://xorl.wordpress.com/2010/12/05/cve-2010-4261-clamav-icon_cb-off-by-one/" + }, + { + "url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2344", + "refsource": "MISC", + "name": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2344" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=659861", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=659861" } ] } diff --git a/2010/4xxx/CVE-2010-4262.json b/2010/4xxx/CVE-2010-4262.json index 3cc222bba1a..d050614bfda 100644 --- a/2010/4xxx/CVE-2010-4262.json +++ b/2010/4xxx/CVE-2010-4262.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-4262", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,57 +27,81 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[oss-security] 20101206 Re: CVE Request -- Xfig: Stack-based buffer overflow by processing FIG image with crafted color definition", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2010/12/06/8" - }, - { - "name": "ADV-2010-3232", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/3232" - }, - { - "name": "42579", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42579" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=659676", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=659676" - }, - { - "name": "MDVSA-2011:010", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:010" - }, - { - "name": "45177", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/45177" - }, - { - "name": "ADV-2011-0108", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0108" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=657981", + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052247.html", "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=657981" + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052247.html" }, { - "name": "FEDORA-2010-18589", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052247.html" + "url": "http://secunia.com/advisories/42579", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42579" }, { - "name": "[oss-security] 20101203 CVE Request -- Xfig: Stack-based buffer overflow by processing FIG image with crafted color definition", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2010/12/03/2" + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:010", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:010" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2010/12/03/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2010/12/03/2" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2010/12/06/8", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2010/12/06/8" + }, + { + "url": "http://www.securityfocus.com/bid/45177", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/45177" + }, + { + "url": "http://www.vupen.com/english/advisories/2010/3232", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/3232" + }, + { + "url": "http://www.vupen.com/english/advisories/2011/0108", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=657981", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=657981" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=659676", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=659676" } ] } diff --git a/2011/3xxx/CVE-2011-3639.json b/2011/3xxx/CVE-2011-3639.json index c7678b4540c..356dc4b9a37 100644 --- a/2011/3xxx/CVE-2011-3639.json +++ b/2011/3xxx/CVE-2011-3639.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-3639", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368." + "value": "The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368." } ] }, @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=752080", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=752080" + "url": "http://rhn.redhat.com/errata/RHSA-2012-0128.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2012-0128.html" }, { - "name": "RHSA-2012:0128", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2012-0128.html" + "url": "http://svn.apache.org/viewvc?view=revision&revision=1188745", + "refsource": "MISC", + "name": "http://svn.apache.org/viewvc?view=revision&revision=1188745" }, { - "name": "http://svn.apache.org/viewvc?view=revision&revision=1188745", - "refsource": "CONFIRM", - "url": "http://svn.apache.org/viewvc?view=revision&revision=1188745" + "url": "http://www.debian.org/security/2012/dsa-2405", + "refsource": "MISC", + "name": "http://www.debian.org/security/2012/dsa-2405" }, { - "name": "DSA-2405", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2012/dsa-2405" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=752080", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=752080" } ] } diff --git a/2011/4xxx/CVE-2011-4078.json b/2011/4xxx/CVE-2011-4078.json index 0638daecbb1..dcacc5e9a70 100644 --- a/2011/4xxx/CVE-2011-4078.json +++ b/2011/4xxx/CVE-2011-4078.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-4078", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,37 +27,56 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://trac.roundcube.net/ticket/1488086", - "refsource": "CONFIRM", - "url": "http://trac.roundcube.net/ticket/1488086" + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041", + "refsource": "MISC", + "name": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041" }, { - "name": "HPSBMU02786", - "refsource": "HP", - "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041" + "url": "http://openwall.com/lists/oss-security/2011/10/26/6", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2011/10/26/6" }, { - "name": "webmail-uri-dos(71025)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71025" + "url": "http://trac.roundcube.net/ticket/1488086", + "refsource": "MISC", + "name": "http://trac.roundcube.net/ticket/1488086" }, { - "name": "50402", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/50402" + "url": "http://www.securityfocus.com/bid/50402", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/50402" }, { - "name": "[oss-security] 20111026 Re: CVE Request -- Round Cube Webmail -- DoS (unavailability to access user's INBOX) after receiving an email message with the URL in the Subject", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2011/10/26/6" - }, - { - "name": "SSRT100877", - "refsource": "HP", - "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71025", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71025" } ] } diff --git a/2011/4xxx/CVE-2011-4079.json b/2011/4xxx/CVE-2011-4079.json index 140fb681e8a..d8e6722aee1 100644 --- a/2011/4xxx/CVE-2011-4079.json +++ b/2011/4xxx/CVE-2011-4079.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-4079", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,57 +27,81 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "GLSA-201406-36", - "refsource": "GENTOO", - "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" - }, - { - "name": "[oss-security] 20111026 CVE Request: openldap2 UTF8StringNormalize() can cause a (one-byte) buffer overflow", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2011/10/26/5" - }, - { - "name": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=7059;selectid=7059", + "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml", "refsource": "MISC", - "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=7059;selectid=7059" + "name": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=749324", + "url": "http://secunia.com/advisories/46599", "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=749324" + "name": "http://secunia.com/advisories/46599" }, { - "name": "USN-1266-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1266-1" - }, - { - "name": "46599", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/46599" - }, - { - "name": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commitdiff;h=507238713b71208ec4f262f312cb495a302df9e9", + "url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commitdiff%3Bh=507238713b71208ec4f262f312cb495a302df9e9", "refsource": "MISC", - "url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commitdiff;h=507238713b71208ec4f262f312cb495a302df9e9" + "name": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commitdiff%3Bh=507238713b71208ec4f262f312cb495a302df9e9" }, { - "name": "50384", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/50384" + "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=7059%3Bselectid=7059", + "refsource": "MISC", + "name": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=7059%3Bselectid=7059" }, { - "name": "openldap-utf8stringnormalize-dos(70991)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70991" + "url": "http://www.openwall.com/lists/oss-security/2011/10/26/5", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2011/10/26/5" }, { - "name": "[oss-security] 20111026 Re: CVE Request: openldap2 UTF8StringNormalize() can cause a (one-byte) buffer overflow", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2011/10/26/9" + "url": "http://www.openwall.com/lists/oss-security/2011/10/26/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2011/10/26/9" + }, + { + "url": "http://www.securityfocus.com/bid/50384", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/50384" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1266-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1266-1" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70991", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70991" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=749324", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=749324" } ] } diff --git a/2011/4xxx/CVE-2011-4080.json b/2011/4xxx/CVE-2011-4080.json index 95f296b8545..c9ee8d7a10b 100644 --- a/2011/4xxx/CVE-2011-4080.json +++ b/2011/4xxx/CVE-2011-4080.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-4080", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://github.com/torvalds/linux/commit/bfdc0b497faa82a0ba2f9dddcf109231dd519fcc", - "refsource": "CONFIRM", - "url": "https://github.com/torvalds/linux/commit/bfdc0b497faa82a0ba2f9dddcf109231dd519fcc" + "url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39", + "refsource": "MISC", + "name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39" }, { - "name": "[oss-security] 20111026 Re: CVE Request -- kernel: sysctl: restrict write access to dmesg_restrict", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2011/10/26/10" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bfdc0b497faa82a0ba2f9dddcf109231dd519fcc", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bfdc0b497faa82a0ba2f9dddcf109231dd519fcc" }, { - "name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39", - "refsource": "CONFIRM", - "url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39" + "url": "http://www.openwall.com/lists/oss-security/2011/10/26/10", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2011/10/26/10" }, { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bfdc0b497faa82a0ba2f9dddcf109231dd519fcc", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bfdc0b497faa82a0ba2f9dddcf109231dd519fcc" + "url": "https://github.com/torvalds/linux/commit/bfdc0b497faa82a0ba2f9dddcf109231dd519fcc", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/bfdc0b497faa82a0ba2f9dddcf109231dd519fcc" } ] } diff --git a/2011/4xxx/CVE-2011-4081.json b/2011/4xxx/CVE-2011-4081.json index 44c8c22d23f..c9f4e5e90ca 100644 --- a/2011/4xxx/CVE-2011-4081.json +++ b/2011/4xxx/CVE-2011-4081.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2011-4081 kernel: crypto: ghash: null pointer deref if no key is set" + "value": "crypto/ghash-generic.c in the Linux kernel before 3.1 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact by triggering a failed or missing ghash_setkey function call, followed by a (1) ghash_update function call or (2) ghash_final function call, as demonstrated by a write operation on an AF_ALG socket." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "NULL Pointer Dereference", - "cweId": "CWE-476" + "value": "n/a" } ] } @@ -32,27 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 6", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:2.6.32-220.7.1.el6", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise MRG 2", - "version": { - "version_data": [ - { - "version_value": "0:2.6.33.9-rt31.79.el6rt", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -70,16 +58,6 @@ "refsource": "MISC", "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1" }, - { - "url": "https://access.redhat.com/errata/RHSA-2012:0010", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2012:0010" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2012:0350", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2012:0350" - }, { "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7ed47b7d142ec99ad6880bbbec51e9f12b3af74c", "refsource": "MISC", @@ -91,44 +69,14 @@ "name": "http://www.openwall.com/lists/oss-security/2011/10/27/2" }, { - "url": "https://access.redhat.com/security/cve/CVE-2011-4081", + "url": "https://github.com/torvalds/linux/commit/7ed47b7d142ec99ad6880bbbec51e9f12b3af74c", "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2011-4081" + "name": "https://github.com/torvalds/linux/commit/7ed47b7d142ec99ad6880bbbec51e9f12b3af74c" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=749475", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=749475" - }, - { - "url": "https://github.com/torvalds/linux/commit/7ed47b7d142ec99ad6880bbbec51e9f12b3af74c", - "refsource": "MISC", - "name": "https://github.com/torvalds/linux/commit/7ed47b7d142ec99ad6880bbbec51e9f12b3af74c" - } - ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "LOW", - "accessVector": "LOCAL", - "authentication": "NONE", - "availabilityImpact": "COMPLETE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 4.9, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", - "version": "2.0" } ] } diff --git a/2011/4xxx/CVE-2011-4088.json b/2011/4xxx/CVE-2011-4088.json index d984426a09a..e43cc18d1de 100644 --- a/2011/4xxx/CVE-2011-4088.json +++ b/2011/4xxx/CVE-2011-4088.json @@ -1,12 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-4088", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -39,6 +39,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "2.0.8" } ] @@ -53,14 +54,14 @@ "references": { "reference_data": [ { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071027.html", "refsource": "MISC", - "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071027.html", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071027.html" + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071027.html" }, { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71871", "refsource": "MISC", - "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71871", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71871" + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71871" } ] } diff --git a/2011/4xxx/CVE-2011-4089.json b/2011/4xxx/CVE-2011-4089.json index c13cdf357d2..ac9b765f5da 100644 --- a/2011/4xxx/CVE-2011-4089.json +++ b/2011/4xxx/CVE-2011-4089.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-4089", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,32 +27,56 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "20111025 Re: Symlink vulnerabilities", - "refsource": "FULLDISC", - "url": "http://seclists.org/fulldisclosure/2011/Oct/804" + "url": "http://seclists.org/fulldisclosure/2011/Oct/804", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2011/Oct/804" }, { - "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=632862", - "refsource": "CONFIRM", - "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=632862" + "url": "http://www.exploit-db.com/exploits/18147", + "refsource": "MISC", + "name": "http://www.exploit-db.com/exploits/18147" }, { - "name": "USN-1308-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1308-1" + "url": "http://www.openwall.com/lists/oss-security/2011/10/28/16", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2011/10/28/16" }, { - "name": "18147", - "refsource": "EXPLOIT-DB", - "url": "http://www.exploit-db.com/exploits/18147" + "url": "http://www.ubuntu.com/usn/USN-1308-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1308-1" }, { - "name": "[oss-security] 20111028 Re: Request for CVE Identifier: bzexe insecure\ttemporary file", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2011/10/28/16" + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=632862", + "refsource": "MISC", + "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=632862" } ] } diff --git a/2011/4xxx/CVE-2011-4091.json b/2011/4xxx/CVE-2011-4091.json index c6bbc96d20e..20fab386c33 100644 --- a/2011/4xxx/CVE-2011-4091.json +++ b/2011/4xxx/CVE-2011-4091.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-4091", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://git.0x539.de/?p=net6.git;a=commitdiff;h=84afca022f063f89bfcd4bb32b1ee911f555abf1;hp=ac61d7fb42a1f977fb527e024bede319c4a9e169", - "refsource": "CONFIRM", - "url": "http://git.0x539.de/?p=net6.git;a=commitdiff;h=84afca022f063f89bfcd4bb32b1ee911f555abf1;hp=ac61d7fb42a1f977fb527e024bede319c4a9e169" + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "refsource": "MISC", + "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { - "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", - "refsource": "CONFIRM", - "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" + "url": "http://git.0x539.de/?p=net6.git%3Ba=commitdiff%3Bh=84afca022f063f89bfcd4bb32b1ee911f555abf1%3Bhp=ac61d7fb42a1f977fb527e024bede319c4a9e169", + "refsource": "MISC", + "name": "http://git.0x539.de/?p=net6.git%3Ba=commitdiff%3Bh=84afca022f063f89bfcd4bb32b1ee911f555abf1%3Bhp=ac61d7fb42a1f977fb527e024bede319c4a9e169" }, { - "name": "openSUSE-SU-2012:0008", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2012-01/msg00044.html" + "url": "http://lists.opensuse.org/opensuse-updates/2012-01/msg00044.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2012-01/msg00044.html" }, { - "name": "openSUSE-SU-2012:0040", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2012-01/msg00054.html" + "url": "http://lists.opensuse.org/opensuse-updates/2012-01/msg00054.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2012-01/msg00054.html" }, { - "name": "https://bugzilla.novell.com/show_bug.cgi?id=727708", - "refsource": "CONFIRM", - "url": "https://bugzilla.novell.com/show_bug.cgi?id=727708" + "url": "http://www.openwall.com/lists/oss-security/2011/10/31/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2011/10/31/1" }, { - "name": "[oss-security] 20111031 Re: CVE request: 3 flaws in libobby and libnet6", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2011/10/31/1" + "url": "https://bugzilla.novell.com/show_bug.cgi?id=727708", + "refsource": "MISC", + "name": "https://bugzilla.novell.com/show_bug.cgi?id=727708" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=750632", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=750632" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=750632", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=750632" } ] } diff --git a/2011/4xxx/CVE-2011-4099.json b/2011/4xxx/CVE-2011-4099.json index f99a2ac6077..1f82e0b0b3e 100644 --- a/2011/4xxx/CVE-2011-4099.json +++ b/2011/4xxx/CVE-2011-4099.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-4099", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,22 +27,46 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=722694", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=722694" + "url": "http://rhn.redhat.com/errata/RHSA-2011-1694.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2011-1694.html" }, { - "name": "https://sites.google.com/site/fullycapable/release-notes-for-libcap/releasenotesfor222", - "refsource": "CONFIRM", - "url": "https://sites.google.com/site/fullycapable/release-notes-for-libcap/releasenotesfor222" + "url": "https://sites.google.com/site/fullycapable/release-notes-for-libcap/releasenotesfor222", + "refsource": "MISC", + "name": "https://sites.google.com/site/fullycapable/release-notes-for-libcap/releasenotesfor222" }, { - "name": "RHSA-2011:1694", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2011-1694.html" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=722694", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=722694" } ] } diff --git a/2011/4xxx/CVE-2011-4100.json b/2011/4xxx/CVE-2011-4100.json index baf935a4d24..b524a4d50d9 100644 --- a/2011/4xxx/CVE-2011-4100.json +++ b/2011/4xxx/CVE-2011-4100.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-4100", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,57 +27,81 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=750643", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=750643" + "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=39140", + "refsource": "MISC", + "name": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=39140" }, { - "name": "50479", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/50479" + "url": "http://openwall.com/lists/oss-security/2011/11/01/9", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2011/11/01/9" }, { - "name": "http://www.wireshark.org/security/wnpa-sec-2011-17.html", - "refsource": "CONFIRM", - "url": "http://www.wireshark.org/security/wnpa-sec-2011-17.html" + "url": "http://osvdb.org/76768", + "refsource": "MISC", + "name": "http://osvdb.org/76768" }, { - "name": "46644", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/46644" + "url": "http://secunia.com/advisories/46644", + "refsource": "MISC", + "name": "http://secunia.com/advisories/46644" }, { - "name": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=39140", - "refsource": "CONFIRM", - "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=39140" + "url": "http://www.securityfocus.com/bid/50479", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/50479" }, { - "name": "76768", - "refsource": "OSVDB", - "url": "http://osvdb.org/76768" + "url": "http://www.wireshark.org/security/wnpa-sec-2011-17.html", + "refsource": "MISC", + "name": "http://www.wireshark.org/security/wnpa-sec-2011-17.html" }, { - "name": "oval:org.mitre.oval:def:14833", - "refsource": "OVAL", - "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14833" + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6351", + "refsource": "MISC", + "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6351" }, { - "name": "[oss-security] 20111101 Re: CVE request for wireshark flaws", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2011/11/01/9" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71090", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71090" }, { - "name": "wireshark-csn1-dissector-dos(71090)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71090" + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14833", + "refsource": "MISC", + "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14833" }, { - "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6351", - "refsource": "CONFIRM", - "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6351" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=750643", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=750643" } ] } diff --git a/2012/3xxx/CVE-2012-3365.json b/2012/3xxx/CVE-2012-3365.json index cfb2786b724..9ea787cc1f3 100644 --- a/2012/3xxx/CVE-2012-3365.json +++ b/2012/3xxx/CVE-2012-3365.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3365", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,57 +27,81 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "1027286", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id?1027286" + "url": "http://www.php.net/ChangeLog-5.php", + "refsource": "MISC", + "name": "http://www.php.net/ChangeLog-5.php" }, { - "name": "openSUSE-SU-2012:0976", - "refsource": "SUSE", - "url": "https://hermes.opensuse.org/messages/15376003" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00021.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00021.html" }, { - "name": "51178", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51178" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00022.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00022.html" }, { - "name": "54612", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/54612" + "url": "http://osvdb.org/84100", + "refsource": "MISC", + "name": "http://osvdb.org/84100" }, { - "name": "49969", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/49969" + "url": "http://secunia.com/advisories/49969", + "refsource": "MISC", + "name": "http://secunia.com/advisories/49969" }, { - "name": "http://www.php.net/ChangeLog-5.php", - "refsource": "CONFIRM", - "url": "http://www.php.net/ChangeLog-5.php" + "url": "http://secunia.com/advisories/51178", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51178" }, { - "name": "84100", - "refsource": "OSVDB", - "url": "http://osvdb.org/84100" + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:108", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:108" }, { - "name": "SUSE-SU-2012:1034", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00022.html" + "url": "http://www.securityfocus.com/bid/54612", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/54612" }, { - "name": "MDVSA-2012:108", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:108" + "url": "http://www.securitytracker.com/id?1027286", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id?1027286" }, { - "name": "SUSE-SU-2012:1033", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00021.html" + "url": "https://hermes.opensuse.org/messages/15376003", + "refsource": "MISC", + "name": "https://hermes.opensuse.org/messages/15376003" } ] } diff --git a/2012/3xxx/CVE-2012-3366.json b/2012/3xxx/CVE-2012-3366.json index 7f1767aaaa0..e83bc405df2 100644 --- a/2012/3xxx/CVE-2012-3366.json +++ b/2012/3xxx/CVE-2012-3366.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3366", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://github.com/Bcfg2/bcfg2/commit/a524967e8d5c4c22e49cd619aed20c87a316c0be", - "refsource": "CONFIRM", - "url": "https://github.com/Bcfg2/bcfg2/commit/a524967e8d5c4c22e49cd619aed20c87a316c0be" + "url": "http://permalink.gmane.org/gmane.comp.sysutils.bcfg2.devel/4539", + "refsource": "MISC", + "name": "http://permalink.gmane.org/gmane.comp.sysutils.bcfg2.devel/4539" }, { - "name": "DSA-2503", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2012/dsa-2503" + "url": "http://secunia.com/advisories/49629", + "refsource": "MISC", + "name": "http://secunia.com/advisories/49629" }, { - "name": "49690", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/49690" + "url": "http://secunia.com/advisories/49690", + "refsource": "MISC", + "name": "http://secunia.com/advisories/49690" }, { - "name": "[bcfg-dev] 20120612 Major security flaw in Trigger plugin", - "refsource": "MLIST", - "url": "http://permalink.gmane.org/gmane.comp.sysutils.bcfg2.devel/4539" + "url": "http://www.debian.org/security/2012/dsa-2503", + "refsource": "MISC", + "name": "http://www.debian.org/security/2012/dsa-2503" }, { - "name": "54217", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/54217" + "url": "http://www.securityfocus.com/bid/54217", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/54217" }, { - "name": "49629", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/49629" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76616", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76616" }, { - "name": "bcfg2-trigger-command-execution(76616)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76616" + "url": "https://github.com/Bcfg2/bcfg2/commit/a524967e8d5c4c22e49cd619aed20c87a316c0be", + "refsource": "MISC", + "name": "https://github.com/Bcfg2/bcfg2/commit/a524967e8d5c4c22e49cd619aed20c87a316c0be" } ] } diff --git a/2012/3xxx/CVE-2012-3367.json b/2012/3xxx/CVE-2012-3367.json index 663e71e3560..4d48505064f 100644 --- a/2012/3xxx/CVE-2012-3367.json +++ b/2012/3xxx/CVE-2012-3367.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3367", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,47 +27,71 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=836268", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=836268" + "url": "http://rhn.redhat.com/errata/RHSA-2012-1103.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2012-1103.html" }, { - "name": "1027284", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id?1027284" + "url": "http://secunia.com/advisories/50013", + "refsource": "MISC", + "name": "http://secunia.com/advisories/50013" }, { - "name": "84098", - "refsource": "OSVDB", - "url": "http://osvdb.org/84098" + "url": "http://www.securityfocus.com/bid/54608", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/54608" }, { - "name": "50013", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/50013" + "url": "http://www.securitytracker.com/id?1027284", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id?1027284" }, { - "name": "https://fedorahosted.org/pki/changeset/2430", - "refsource": "CONFIRM", - "url": "https://fedorahosted.org/pki/changeset/2430" + "url": "http://osvdb.org/84098", + "refsource": "MISC", + "name": "http://osvdb.org/84098" }, { - "name": "rhcs-certificate-manager-sec-bypass(77102)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77102" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77102", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77102" }, { - "name": "54608", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/54608" + "url": "https://fedorahosted.org/pki/changeset/2430", + "refsource": "MISC", + "name": "https://fedorahosted.org/pki/changeset/2430" }, { - "name": "RHSA-2012:1103", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2012-1103.html" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=836268", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=836268" } ] } diff --git a/2012/3xxx/CVE-2012-3368.json b/2012/3xxx/CVE-2012-3368.json index 5246e9d7152..ea07476b53f 100644 --- a/2012/3xxx/CVE-2012-3368.json +++ b/2012/3xxx/CVE-2012-3368.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3368", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,32 +27,56 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=812551", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=812551" + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=625302", + "refsource": "MISC", + "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=625302" }, { - "name": "http://sourceforge.net/tracker/download.php?group_id=36489&atid=417357&file_id=441195&aid=3517812", - "refsource": "CONFIRM", - "url": "http://sourceforge.net/tracker/download.php?group_id=36489&atid=417357&file_id=441195&aid=3517812" + "url": "http://sourceforge.net/tracker/?func=detail&aid=3517812&group_id=36489&atid=417357", + "refsource": "MISC", + "name": "http://sourceforge.net/tracker/?func=detail&aid=3517812&group_id=36489&atid=417357" }, { - "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=625302", - "refsource": "CONFIRM", - "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=625302" + "url": "http://sourceforge.net/tracker/download.php?group_id=36489&atid=417357&file_id=441195&aid=3517812", + "refsource": "MISC", + "name": "http://sourceforge.net/tracker/download.php?group_id=36489&atid=417357&file_id=441195&aid=3517812" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=835849", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=835849" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=812551", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=812551" }, { - "name": "http://sourceforge.net/tracker/?func=detail&aid=3517812&group_id=36489&atid=417357", - "refsource": "CONFIRM", - "url": "http://sourceforge.net/tracker/?func=detail&aid=3517812&group_id=36489&atid=417357" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=835849", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=835849" } ] } diff --git a/2012/3xxx/CVE-2012-3370.json b/2012/3xxx/CVE-2012-3370.json index 1f7bc8a689c..566971769f2 100644 --- a/2012/3xxx/CVE-2012-3370.json +++ b/2012/3xxx/CVE-2012-3370.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3370", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,92 +27,116 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=836456", + "url": "http://rhn.redhat.com/errata/RHSA-2013-0191.html", "refsource": "MISC", - "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=836456" + "name": "http://rhn.redhat.com/errata/RHSA-2013-0191.html" }, { - "name": "jboss-eap-getcredential-info-disc(81513)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81513" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0192.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0192.html" }, { - "name": "RHSA-2013:0192", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0192.html" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0193.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0193.html" }, { - "name": "RHSA-2013:0198", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0198.html" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0194.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0194.html" }, { - "name": "RHSA-2013:0195", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0195.html" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0195.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0195.html" }, { - "name": "RHSA-2013:0221", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0221.html" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0196.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0196.html" }, { - "name": "89581", - "refsource": "OSVDB", - "url": "http://www.osvdb.org/89581" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0197.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0197.html" }, { - "name": "RHSA-2013:0196", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0196.html" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0198.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0198.html" }, { - "name": "57550", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/57550" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0221.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0221.html" }, { - "name": "RHSA-2013:0193", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0193.html" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0533.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0533.html" }, { - "name": "51984", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51984" + "url": "http://secunia.com/advisories/51984", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51984" }, { - "name": "1028042", - "refsource": "SECTRACK", - "url": "http://securitytracker.com/id?1028042" + "url": "http://secunia.com/advisories/52054", + "refsource": "MISC", + "name": "http://secunia.com/advisories/52054" }, { - "name": "52054", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/52054" + "url": "http://securitytracker.com/id?1028042", + "refsource": "MISC", + "name": "http://securitytracker.com/id?1028042" }, { - "name": "RHSA-2013:0191", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0191.html" + "url": "http://www.osvdb.org/89581", + "refsource": "MISC", + "name": "http://www.osvdb.org/89581" }, { - "name": "RHSA-2013:0533", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0533.html" + "url": "http://www.securityfocus.com/bid/57550", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/57550" }, { - "name": "RHSA-2013:0197", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0197.html" + "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=836456", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=836456" }, { - "name": "RHSA-2013:0194", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0194.html" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81513", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81513" } ] } diff --git a/2012/3xxx/CVE-2012-3375.json b/2012/3xxx/CVE-2012-3375.json index 60460fdee4b..6d0bd1547f8 100644 --- a/2012/3xxx/CVE-2012-3375.json +++ b/2012/3xxx/CVE-2012-3375.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3375", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "The epoll_ctl system call in fs/eventpoll.c in the Linux kernel before 3.2.24 does not properly handle ELOOP errors in EPOLL_CTL_ADD operations, which allows local users to cause a denial of service (file-descriptor consumption and system crash) via a crafted application that attempts to create a circular epoll dependency. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1083." + "value": "The epoll_ctl system call in fs/eventpoll.c in the Linux kernel before 3.2.24 does not properly handle ELOOP errors in EPOLL_CTL_ADD operations, which allows local users to cause a denial of service (file-descriptor consumption and system crash) via a crafted application that attempts to create a circular epoll dependency. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1083." } ] }, @@ -50,52 +27,76 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://downloads.avaya.com/css/P8/documents/100165733", - "refsource": "CONFIRM", - "url": "https://downloads.avaya.com/css/P8/documents/100165733" + "url": "http://ubuntu.com/usn/usn-1529-1", + "refsource": "MISC", + "name": "http://ubuntu.com/usn/usn-1529-1" }, { - "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.24", - "refsource": "CONFIRM", - "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.24" + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.24", + "refsource": "MISC", + "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.24" }, { - "name": "1027237", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id?1027237" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=13d518074a952d33d47c428419693f63389547e9", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=13d518074a952d33d47c428419693f63389547e9" }, { - "name": "https://github.com/torvalds/linux/commit/13d518074a952d33d47c428419693f63389547e9", - "refsource": "CONFIRM", - "url": "https://github.com/torvalds/linux/commit/13d518074a952d33d47c428419693f63389547e9" + "url": "http://secunia.com/advisories/51164", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51164" }, { - "name": "51164", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51164" + "url": "http://www.openwall.com/lists/oss-security/2012/07/04/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/07/04/2" }, { - "name": "[oss-security] 20120704 Re: CVE Request -- kernel: epoll: can leak file descriptors when returning -ELOOP", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/07/04/2" + "url": "http://www.securitytracker.com/id?1027237", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id?1027237" }, { - "name": "USN-1529-1", - "refsource": "UBUNTU", - "url": "http://ubuntu.com/usn/usn-1529-1" + "url": "https://downloads.avaya.com/css/P8/documents/100165733", + "refsource": "MISC", + "name": "https://downloads.avaya.com/css/P8/documents/100165733" }, { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=13d518074a952d33d47c428419693f63389547e9", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=13d518074a952d33d47c428419693f63389547e9" + "url": "https://github.com/torvalds/linux/commit/13d518074a952d33d47c428419693f63389547e9", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/13d518074a952d33d47c428419693f63389547e9" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=837502", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=837502" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=837502", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=837502" } ] } diff --git a/2012/3xxx/CVE-2012-3378.json b/2012/3xxx/CVE-2012-3378.json index 9c608900b40..fd6ef911f80 100644 --- a/2012/3xxx/CVE-2012-3378.json +++ b/2012/3xxx/CVE-2012-3378.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3378", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=678026", + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=678026", "refsource": "MISC", - "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=678026" + "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=678026" }, { - "name": "[oss-security] 20120705 Three CVE requests: at-spi2-atk, as31, naxsi", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/07/05/1" + "url": "http://www.openwall.com/lists/oss-security/2012/07/05/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/07/05/1" }, { - "name": "https://bugzilla.gnome.org/show_bug.cgi?id=678348", - "refsource": "CONFIRM", - "url": "https://bugzilla.gnome.org/show_bug.cgi?id=678348" + "url": "http://www.openwall.com/lists/oss-security/2012/07/06/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/07/06/3" }, { - "name": "[oss-security] 20120706 Re: Three CVE requests: at-spi2-atk, as31, naxsi", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/07/06/3" + "url": "https://bugzilla.gnome.org/show_bug.cgi?id=678348", + "refsource": "MISC", + "name": "https://bugzilla.gnome.org/show_bug.cgi?id=678348" } ] } diff --git a/2012/3xxx/CVE-2012-3386.json b/2012/3xxx/CVE-2012-3386.json index ad8828e9b35..50c9e781cd1 100644 --- a/2012/3xxx/CVE-2012-3386.json +++ b/2012/3xxx/CVE-2012-3386.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "It was found that the distcheck rule in Automake-generated Makefiles made a directory world-writable when preparing source archives. If a malicious, local user could access this directory, they could execute arbitrary code with the privileges of the user running \"make distcheck\"." + "value": "The \"make distcheck\" rule in GNU Automake before 1.11.6 and 1.12.x before 1.12.2 grants world-writable permissions to the extraction directory, which introduces a race condition that allows local users to execute arbitrary code via unspecified vectors." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Incorrect Permission Assignment for Critical Resource", - "cweId": "CWE-732" + "value": "n/a" } ] } @@ -32,27 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 5", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:1.9.6-3.el5", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 6", - "version": { - "version_data": [ - { - "version_value": "0:1.11.1-4.el6", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -100,26 +88,6 @@ "refsource": "MISC", "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:103" }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:0526", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:0526" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2014:1243", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2014:1243" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2012-3386", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2012-3386" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=838286", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=838286" - }, { "url": "https://lists.gnu.org/archive/html/automake/2012-07/msg00021.html", "refsource": "MISC", @@ -136,30 +104,5 @@ "name": "https://lists.gnu.org/archive/html/automake/2012-07/msg00023.html" } ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "HIGH", - "accessVector": "LOCAL", - "authentication": "NONE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 3.7, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P", - "version": "2.0" - } - ] } } \ No newline at end of file diff --git a/2012/3xxx/CVE-2012-3387.json b/2012/3xxx/CVE-2012-3387.json index d3942293e89..6f55ed255be 100644 --- a/2012/3xxx/CVE-2012-3387.json +++ b/2012/3xxx/CVE-2012-3387.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3387", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,32 +27,56 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-33948", - "refsource": "CONFIRM", - "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-33948" + "url": "http://openwall.com/lists/oss-security/2012/07/17/1", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2012/07/17/1" }, { - "name": "49890", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/49890" + "url": "http://secunia.com/advisories/49890", + "refsource": "MISC", + "name": "http://secunia.com/advisories/49890" }, { - "name": "[oss-security] 20120717 Moodle security notifications public", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2012/07/17/1" + "url": "http://www.securityfocus.com/bid/54481", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/54481" }, { - "name": "54481", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/54481" + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-33948", + "refsource": "MISC", + "name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-33948" }, { - "name": "moodle-shortcut-sec-bypass(76954)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76954" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76954", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76954" } ] } diff --git a/2012/3xxx/CVE-2012-3388.json b/2012/3xxx/CVE-2012-3388.json index e4c9caa40f0..96f0745da0b 100644 --- a/2012/3xxx/CVE-2012-3388.json +++ b/2012/3xxx/CVE-2012-3388.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3388", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,32 +27,56 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "moodle-cached-users-sec-bypass(76955)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76955" + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-33916", + "refsource": "MISC", + "name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-33916" }, { - "name": "49890", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/49890" + "url": "http://openwall.com/lists/oss-security/2012/07/17/1", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2012/07/17/1" }, { - "name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-33916", - "refsource": "CONFIRM", - "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-33916" + "url": "http://secunia.com/advisories/49890", + "refsource": "MISC", + "name": "http://secunia.com/advisories/49890" }, { - "name": "[oss-security] 20120717 Moodle security notifications public", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2012/07/17/1" + "url": "http://www.securityfocus.com/bid/54481", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/54481" }, { - "name": "54481", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/54481" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76955", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76955" } ] } diff --git a/2013/0xxx/CVE-2013-0239.json b/2013/0xxx/CVE-2013-0239.json index 429ffa8d506..8949fad9791 100644 --- a/2013/0xxx/CVE-2013-0239.json +++ b/2013/0xxx/CVE-2013-0239.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-0239", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,82 +27,106 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "90078", - "refsource": "OSVDB", - "url": "http://osvdb.org/90078" - }, - { - "name": "51988", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51988" - }, - { - "name": "20130208 New security advisories for Apache CXF", - "refsource": "FULLDISC", - "url": "http://seclists.org/fulldisclosure/2013/Feb/39" - }, - { - "name": "apachecxf-username-tokens-sec-bypass(81981)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81981" - }, - { - "name": "http://cxf.apache.org/cve-2013-0239.html", - "refsource": "CONFIRM", - "url": "http://cxf.apache.org/cve-2013-0239.html" - }, - { - "name": "57876", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/57876" - }, - { - "name": "RHSA-2013:0749", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0749.html" - }, - { - "name": "http://svn.apache.org/viewvc?view=revision&revision=1438424", - "refsource": "CONFIRM", - "url": "http://svn.apache.org/viewvc?view=revision&revision=1438424" - }, - { - "name": "http://packetstormsecurity.com/files/120214/Apache-CXF-WS-Security-UsernameToken-Bypass.html", + "url": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E", "refsource": "MISC", - "url": "http://packetstormsecurity.com/files/120214/Apache-CXF-WS-Security-UsernameToken-Bypass.html" + "name": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[cxf-commits] 20200116 svn commit: r1055336 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-12423.txt.asc security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html", - "url": "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E" + "url": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[cxf-commits] 20200319 svn commit: r1058035 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html", - "url": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E" + "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[cxf-commits] 20200401 svn commit: r1058573 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2020-1954.txt.asc security-advisories.html", - "url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E" + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[cxf-commits] 20201112 svn commit: r1067927 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2020-13954.txt.asc security-advisories.html", - "url": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E" + "url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", - "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + "url": "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", - "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0749.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0749.html" + }, + { + "url": "http://seclists.org/fulldisclosure/2013/Feb/39", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2013/Feb/39" + }, + { + "url": "http://secunia.com/advisories/51988", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51988" + }, + { + "url": "http://cxf.apache.org/cve-2013-0239.html", + "refsource": "MISC", + "name": "http://cxf.apache.org/cve-2013-0239.html" + }, + { + "url": "http://osvdb.org/90078", + "refsource": "MISC", + "name": "http://osvdb.org/90078" + }, + { + "url": "http://packetstormsecurity.com/files/120214/Apache-CXF-WS-Security-UsernameToken-Bypass.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/120214/Apache-CXF-WS-Security-UsernameToken-Bypass.html" + }, + { + "url": "http://svn.apache.org/viewvc?view=revision&revision=1438424", + "refsource": "MISC", + "name": "http://svn.apache.org/viewvc?view=revision&revision=1438424" + }, + { + "url": "http://www.securityfocus.com/bid/57876", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/57876" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81981", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81981" } ] } diff --git a/2013/0xxx/CVE-2013-0240.json b/2013/0xxx/CVE-2013-0240.json index 29d49ba7815..9a3c59bc102 100644 --- a/2013/0xxx/CVE-2013-0240.json +++ b/2013/0xxx/CVE-2013-0240.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-0240", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,57 +27,81 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://git.gnome.org/browse/gnome-online-accounts/commit/?id=edde7c63326242a60a075341d3fea0be0bc4d80e", - "refsource": "CONFIRM", - "url": "https://git.gnome.org/browse/gnome-online-accounts/commit/?id=edde7c63326242a60a075341d3fea0be0bc4d80e" - }, - { - "name": "51976", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51976" - }, - { - "name": "https://git.gnome.org/browse/gnome-online-accounts/commit/?id=bc10fdb68f75f8be84eb698ada08743b9c7c248f", - "refsource": "CONFIRM", - "url": "https://git.gnome.org/browse/gnome-online-accounts/commit/?id=bc10fdb68f75f8be84eb698ada08743b9c7c248f" - }, - { - "name": "[gnome-announce-list] 20130304 GNOME Online Accounts 3.6.3 released", - "refsource": "MLIST", - "url": "https://mail.gnome.org/archives/gnome-announce-list/2013-March/msg00007.html" - }, - { - "name": "USN-1779-1", - "refsource": "UBUNTU", - "url": "http://ubuntu.com/usn/usn-1779-1" - }, - { - "name": "https://git.gnome.org/browse/gnome-online-accounts/commit/?h=gnome-3-6&id=ecad8142e9ac519b9fc74b96dcb5531052bbffe1", - "refsource": "CONFIRM", - "url": "https://git.gnome.org/browse/gnome-online-accounts/commit/?h=gnome-3-6&id=ecad8142e9ac519b9fc74b96dcb5531052bbffe1" - }, - { - "name": "52791", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/52791" - }, - { - "name": "https://bugzilla.gnome.org/show_bug.cgi?id=693214", - "refsource": "CONFIRM", - "url": "https://bugzilla.gnome.org/show_bug.cgi?id=693214" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=894352", + "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00046.html", "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=894352" + "name": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00046.html" }, { - "name": "openSUSE-SU-2013:0301", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00046.html" + "url": "http://secunia.com/advisories/51976", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51976" + }, + { + "url": "http://secunia.com/advisories/52791", + "refsource": "MISC", + "name": "http://secunia.com/advisories/52791" + }, + { + "url": "http://ubuntu.com/usn/usn-1779-1", + "refsource": "MISC", + "name": "http://ubuntu.com/usn/usn-1779-1" + }, + { + "url": "https://bugzilla.gnome.org/show_bug.cgi?id=693214", + "refsource": "MISC", + "name": "https://bugzilla.gnome.org/show_bug.cgi?id=693214" + }, + { + "url": "https://mail.gnome.org/archives/gnome-announce-list/2013-March/msg00007.html", + "refsource": "MISC", + "name": "https://mail.gnome.org/archives/gnome-announce-list/2013-March/msg00007.html" + }, + { + "url": "https://git.gnome.org/browse/gnome-online-accounts/commit/?h=gnome-3-6&id=ecad8142e9ac519b9fc74b96dcb5531052bbffe1", + "refsource": "MISC", + "name": "https://git.gnome.org/browse/gnome-online-accounts/commit/?h=gnome-3-6&id=ecad8142e9ac519b9fc74b96dcb5531052bbffe1" + }, + { + "url": "https://git.gnome.org/browse/gnome-online-accounts/commit/?id=bc10fdb68f75f8be84eb698ada08743b9c7c248f", + "refsource": "MISC", + "name": "https://git.gnome.org/browse/gnome-online-accounts/commit/?id=bc10fdb68f75f8be84eb698ada08743b9c7c248f" + }, + { + "url": "https://git.gnome.org/browse/gnome-online-accounts/commit/?id=edde7c63326242a60a075341d3fea0be0bc4d80e", + "refsource": "MISC", + "name": "https://git.gnome.org/browse/gnome-online-accounts/commit/?id=edde7c63326242a60a075341d3fea0be0bc4d80e" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=894352", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=894352" } ] } diff --git a/2013/0xxx/CVE-2013-0241.json b/2013/0xxx/CVE-2013-0241.json index 555e631bceb..45ea197191a 100644 --- a/2013/0xxx/CVE-2013-0241.json +++ b/2013/0xxx/CVE-2013-0241.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-0241", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "The QXL display driver in QXL Virtual GPU 0.1.0 allows local users to cause a denial of service (guest crash or hang) via a SPICE connection that prevents other threads from obtaining the qemu_mutex mutex. NOTE: some of these details are obtained from third party information." + "value": "The QXL display driver in QXL Virtual GPU 0.1.0 allows local users to cause a denial of service (guest crash or hang) via a SPICE connection that prevents other threads from obtaining the qemu_mutex mutex. NOTE: some of these details are obtained from third party information." } ] }, @@ -50,52 +27,76 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=906032", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906032" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0218.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0218.html" }, { - "name": "MDVSA-2013:138", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:138" + "url": "http://secunia.com/advisories/52021", + "refsource": "MISC", + "name": "http://secunia.com/advisories/52021" }, { - "name": "[oss-security] 20130130 CVE request -- qxl: synchronous io guest DoS", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/01/30/3" + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:138", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:138" }, { - "name": "qxl-virtual-spice-dos(81704)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81704" + "url": "http://www.openwall.com/lists/oss-security/2013/01/30/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/01/30/3" }, { - "name": "52021", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/52021" + "url": "http://www.openwall.com/lists/oss-security/2013/01/30/4", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/01/30/4" }, { - "name": "[oss-security] 20130130 Re: CVE request -- qxl: synchronous io guest DoS", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/01/30/4" + "url": "http://www.ubuntu.com/usn/USN-1714-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1714-1" }, { - "name": "USN-1714-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1714-1" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81704", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81704" }, { - "name": "RHSA-2013:0218", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0218.html" + "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0036", + "refsource": "MISC", + "name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0036" }, { - "name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0036", - "refsource": "CONFIRM", - "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0036" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906032", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=906032" } ] } diff --git a/2013/0xxx/CVE-2013-0242.json b/2013/0xxx/CVE-2013-0242.json index 836560b1dbf..8bb7a78848b 100644 --- a/2013/0xxx/CVE-2013-0242.json +++ b/2013/0xxx/CVE-2013-0242.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-0242", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,82 +27,106 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html", - "refsource": "CONFIRM", - "url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html" - }, - { - "name": "glibc-extendbuffers-dos(81707)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81707" - }, - { - "name": "RHSA-2013:1605", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-1605.html" - }, - { - "name": "55113", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/55113" - }, - { - "name": "USN-1991-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1991-1" - }, - { - "name": "57638", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/57638" - }, - { - "name": "89747", - "refsource": "OSVDB", - "url": "http://osvdb.org/89747" - }, - { - "name": "51951", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51951" - }, - { - "name": "1028063", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id/1028063" - }, - { - "name": "[oss-security] 20130130 Re: CVE Request -- glibc: DoS due to a buffer overrun in regexp matcher by processing multibyte characters", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/01/30/5" - }, - { - "name": "GLSA-201503-04", - "refsource": "GENTOO", - "url": "https://security.gentoo.org/glsa/201503-04" - }, - { - "name": "[libc-alpha] 20130129 [PATCH] Fix buffer overrun in regexp matcher", - "refsource": "MLIST", - "url": "http://sourceware.org/ml/libc-alpha/2013-01/msg00967.html" - }, - { - "name": "RHSA-2013:0769", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0769.html" - }, - { - "name": "MDVSA-2013:163", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:163" - }, - { - "name": "http://sourceware.org/bugzilla/show_bug.cgi?id=15078", + "url": "https://security.gentoo.org/glsa/201503-04", "refsource": "MISC", - "url": "http://sourceware.org/bugzilla/show_bug.cgi?id=15078" + "name": "https://security.gentoo.org/glsa/201503-04" + }, + { + "url": "http://secunia.com/advisories/55113", + "refsource": "MISC", + "name": "http://secunia.com/advisories/55113" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1991-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1991-1" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-0769.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0769.html" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-1605.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-1605.html" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:163", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:163" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html", + "refsource": "MISC", + "name": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html" + }, + { + "url": "http://osvdb.org/89747", + "refsource": "MISC", + "name": "http://osvdb.org/89747" + }, + { + "url": "http://secunia.com/advisories/51951", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51951" + }, + { + "url": "http://sourceware.org/bugzilla/show_bug.cgi?id=15078", + "refsource": "MISC", + "name": "http://sourceware.org/bugzilla/show_bug.cgi?id=15078" + }, + { + "url": "http://sourceware.org/ml/libc-alpha/2013-01/msg00967.html", + "refsource": "MISC", + "name": "http://sourceware.org/ml/libc-alpha/2013-01/msg00967.html" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2013/01/30/5", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/01/30/5" + }, + { + "url": "http://www.securityfocus.com/bid/57638", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/57638" + }, + { + "url": "http://www.securitytracker.com/id/1028063", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id/1028063" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81707", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81707" } ] } diff --git a/2013/0xxx/CVE-2013-0247.json b/2013/0xxx/CVE-2013-0247.json index 2e569fff65a..420fbba004e 100644 --- a/2013/0xxx/CVE-2013-0247.json +++ b/2013/0xxx/CVE-2013-0247.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-0247", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,37 +27,61 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=906171", + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098906.html", "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906171" + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098906.html" }, { - "name": "https://bugs.launchpad.net/keystone/+bug/1098307", - "refsource": "CONFIRM", - "url": "https://bugs.launchpad.net/keystone/+bug/1098307" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0253.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0253.html" }, { - "name": "FEDORA-2013-2168", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098906.html" + "url": "http://www.securityfocus.com/bid/57747", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/57747" }, { - "name": "RHSA-2013:0253", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0253.html" + "url": "http://www.ubuntu.com/usn/USN-1715-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1715-1" }, { - "name": "USN-1715-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1715-1" + "url": "https://bugs.launchpad.net/keystone/+bug/1098307", + "refsource": "MISC", + "name": "https://bugs.launchpad.net/keystone/+bug/1098307" }, { - "name": "57747", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/57747" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906171", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=906171" } ] } diff --git a/2013/0xxx/CVE-2013-0249.json b/2013/0xxx/CVE-2013-0249.json index 6494eb22190..7c2d3658411 100644 --- a/2013/0xxx/CVE-2013-0249.json +++ b/2013/0xxx/CVE-2013-0249.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-0249", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,72 +27,96 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", - "refsource": "CONFIRM", - "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" - }, - { - "name": "http://packetstormsecurity.com/files/120170/Slackware-Security-Advisory-curl-Updates.html", + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", "refsource": "MISC", - "url": "http://packetstormsecurity.com/files/120170/Slackware-Security-Advisory-curl-Updates.html" + "name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { - "name": "57842", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/57842" - }, - { - "name": "APPLE-SA-2013-10-22-3", - "refsource": "APPLE", - "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html" - }, - { - "name": "24487", - "refsource": "EXPLOIT-DB", - "url": "http://www.exploit-db.com/exploits/24487" - }, - { - "name": "USN-1721-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1721-1" - }, - { - "name": "FEDORA-2013-2098", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099140.html" - }, - { - "name": "1028093", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id/1028093" - }, - { - "name": "89988", - "refsource": "OSVDB", - "url": "http://www.osvdb.org/89988" - }, - { - "name": "http://packetstormsecurity.com/files/120147/cURL-Buffer-Overflow.html", + "url": "http://blog.volema.com/curl-rce.html", "refsource": "MISC", - "url": "http://packetstormsecurity.com/files/120147/cURL-Buffer-Overflow.html" + "name": "http://blog.volema.com/curl-rce.html" }, { - "name": "http://blog.volema.com/curl-rce.html", + "url": "http://curl.haxx.se/docs/adv_20130206.html", "refsource": "MISC", - "url": "http://blog.volema.com/curl-rce.html" + "name": "http://curl.haxx.se/docs/adv_20130206.html" }, { - "name": "http://curl.haxx.se/docs/adv_20130206.html", - "refsource": "CONFIRM", - "url": "http://curl.haxx.se/docs/adv_20130206.html" - }, - { - "name": "http://nakedsecurity.sophos.com/2013/02/10/anatomy-of-a-vulnerability-curl-web-download-toolkit-holed-by-authentication-bug/", + "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html", "refsource": "MISC", - "url": "http://nakedsecurity.sophos.com/2013/02/10/anatomy-of-a-vulnerability-curl-web-download-toolkit-holed-by-authentication-bug/" + "name": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099140.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099140.html" + }, + { + "url": "http://nakedsecurity.sophos.com/2013/02/10/anatomy-of-a-vulnerability-curl-web-download-toolkit-holed-by-authentication-bug/", + "refsource": "MISC", + "name": "http://nakedsecurity.sophos.com/2013/02/10/anatomy-of-a-vulnerability-curl-web-download-toolkit-holed-by-authentication-bug/" + }, + { + "url": "http://packetstormsecurity.com/files/120147/cURL-Buffer-Overflow.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/120147/cURL-Buffer-Overflow.html" + }, + { + "url": "http://packetstormsecurity.com/files/120170/Slackware-Security-Advisory-curl-Updates.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/120170/Slackware-Security-Advisory-curl-Updates.html" + }, + { + "url": "http://www.exploit-db.com/exploits/24487", + "refsource": "MISC", + "name": "http://www.exploit-db.com/exploits/24487" + }, + { + "url": "http://www.osvdb.org/89988", + "refsource": "MISC", + "name": "http://www.osvdb.org/89988" + }, + { + "url": "http://www.securityfocus.com/bid/57842", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/57842" + }, + { + "url": "http://www.securitytracker.com/id/1028093", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id/1028093" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1721-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1721-1" } ] } diff --git a/2013/0xxx/CVE-2013-0252.json b/2013/0xxx/CVE-2013-0252.json index 7087906ce09..bced205b896 100644 --- a/2013/0xxx/CVE-2013-0252.json +++ b/2013/0xxx/CVE-2013-0252.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-0252", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,62 +27,86 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "FEDORA-2013-2448", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099122.html" - }, - { - "name": "57675", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/57675" - }, - { - "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699649", + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699649", "refsource": "MISC", - "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699649" + "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699649" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=907481", + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699650", "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907481" + "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699650" }, { - "name": "https://svn.boost.org/trac/boost/ticket/7743", - "refsource": "CONFIRM", - "url": "https://svn.boost.org/trac/boost/ticket/7743" - }, - { - "name": "[oss-security] 20130203 Re: CVE id request: boost", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/02/04/2" - }, - { - "name": "FEDORA-2013-2420", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099103.html" - }, - { - "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699650", + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099103.html", "refsource": "MISC", - "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699650" + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099103.html" }, { - "name": "http://www.boost.org/users/news/boost_locale_security_notice.html", - "refsource": "CONFIRM", - "url": "http://www.boost.org/users/news/boost_locale_security_notice.html" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099122.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099122.html" }, { - "name": "USN-1727-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1727-1" + "url": "http://www.boost.org/users/news/boost_locale_security_notice.html", + "refsource": "MISC", + "name": "http://www.boost.org/users/news/boost_locale_security_notice.html" }, { - "name": "MDVSA-2013:065", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:065" + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:065", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:065" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2013/02/04/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/02/04/2" + }, + { + "url": "http://www.securityfocus.com/bid/57675", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/57675" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1727-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1727-1" + }, + { + "url": "https://svn.boost.org/trac/boost/ticket/7743", + "refsource": "MISC", + "name": "https://svn.boost.org/trac/boost/ticket/7743" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907481", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=907481" } ] } diff --git a/2013/0xxx/CVE-2013-0261.json b/2013/0xxx/CVE-2013-0261.json index 15652d489b3..f0dac9bc2ee 100644 --- a/2013/0xxx/CVE-2013-0261.json +++ b/2013/0xxx/CVE-2013-0261.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-0261", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,17 +27,41 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "RHSA-2013:0595", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0595.html" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0595.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0595.html" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=908101", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=908101", "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=908101" + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=908101" } ] } diff --git a/2013/0xxx/CVE-2013-0262.json b/2013/0xxx/CVE-2013-0262.json index 3054ebf7367..e2af59826a6 100644 --- a/2013/0xxx/CVE-2013-0262.json +++ b/2013/0xxx/CVE-2013-0262.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-0262", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,57 +27,81 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://groups.google.com/forum/#!msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ", - "refsource": "CONFIRM", - "url": "https://groups.google.com/forum/#!msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ" - }, - { - "name": "https://gist.github.com/rentzsch/4736940", + "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html", "refsource": "MISC", - "url": "https://gist.github.com/rentzsch/4736940" + "name": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html" }, { - "name": "52033", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/52033" - }, - { - "name": "http://rack.github.com/", - "refsource": "CONFIRM", - "url": "http://rack.github.com/" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=909071", + "url": "http://rack.github.com/", "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=909071" + "name": "http://rack.github.com/" }, { - "name": "https://groups.google.com/forum/#!msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ", - "refsource": "CONFIRM", - "url": "https://groups.google.com/forum/#!msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ" - }, - { - "name": "https://github.com/rack/rack/commit/6f237e4c9fab649d3750482514f0fde76c56ab30", - "refsource": "CONFIRM", - "url": "https://github.com/rack/rack/commit/6f237e4c9fab649d3750482514f0fde76c56ab30" - }, - { - "name": "openSUSE-SU-2013:0462", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html" - }, - { - "name": "https://github.com/rack/rack/blob/master/lib/rack/file.rb#L56", + "url": "http://secunia.com/advisories/52033", "refsource": "MISC", - "url": "https://github.com/rack/rack/blob/master/lib/rack/file.rb#L56" + "name": "http://secunia.com/advisories/52033" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=909072", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=909072" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=909071", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=909071" + }, + { + "url": "https://gist.github.com/rentzsch/4736940", + "refsource": "MISC", + "name": "https://gist.github.com/rentzsch/4736940" + }, + { + "url": "https://github.com/rack/rack/blob/master/lib/rack/file.rb#L56", + "refsource": "MISC", + "name": "https://github.com/rack/rack/blob/master/lib/rack/file.rb#L56" + }, + { + "url": "https://github.com/rack/rack/commit/6f237e4c9fab649d3750482514f0fde76c56ab30", + "refsource": "MISC", + "name": "https://github.com/rack/rack/commit/6f237e4c9fab649d3750482514f0fde76c56ab30" + }, + { + "url": "https://groups.google.com/forum/#%21msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ", + "refsource": "MISC", + "name": "https://groups.google.com/forum/#%21msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ" + }, + { + "url": "https://groups.google.com/forum/#%21msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ", + "refsource": "MISC", + "name": "https://groups.google.com/forum/#%21msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=909072", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=909072" } ] } diff --git a/2013/0xxx/CVE-2013-0263.json b/2013/0xxx/CVE-2013-0263.json index d7fc6c8f0a9..03f10e82697 100644 --- a/2013/0xxx/CVE-2013-0263.json +++ b/2013/0xxx/CVE-2013-0263.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-0263", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,102 +27,126 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "52774", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/52774" - }, - { - "name": "https://groups.google.com/forum/#!msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ", - "refsource": "CONFIRM", - "url": "https://groups.google.com/forum/#!msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ" - }, - { - "name": "https://groups.google.com/forum/#!msg/rack-devel/RnQxm6i13C4/xfakH81yWvgJ", - "refsource": "CONFIRM", - "url": "https://groups.google.com/forum/#!msg/rack-devel/RnQxm6i13C4/xfakH81yWvgJ" - }, - { - "name": "https://github.com/rack/rack/commit/9a81b961457805f6d1a5c275d053068440421e11", - "refsource": "CONFIRM", - "url": "https://github.com/rack/rack/commit/9a81b961457805f6d1a5c275d053068440421e11" - }, - { - "name": "52033", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/52033" - }, - { - "name": "https://github.com/rack/rack/commit/0cd7e9aa397f8ebb3b8481d67dbac8b4863a7f07", - "refsource": "CONFIRM", - "url": "https://github.com/rack/rack/commit/0cd7e9aa397f8ebb3b8481d67dbac8b4863a7f07" - }, - { - "name": "http://rack.github.com/", - "refsource": "CONFIRM", - "url": "http://rack.github.com/" - }, - { - "name": "52134", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/52134" - }, - { - "name": "https://groups.google.com/d/msg/rack-devel/xKrHVWeNvDM/4ZGA576CnK4J", - "refsource": "CONFIRM", - "url": "https://groups.google.com/d/msg/rack-devel/xKrHVWeNvDM/4ZGA576CnK4J" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=909071", + "url": "http://rhn.redhat.com/errata/RHSA-2013-0686.html", "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=909071" + "name": "http://rhn.redhat.com/errata/RHSA-2013-0686.html" }, { - "name": "https://groups.google.com/forum/#!msg/rack-devel/hz-liLb9fKE/8jvVWU6xYiYJ", - "refsource": "CONFIRM", - "url": "https://groups.google.com/forum/#!msg/rack-devel/hz-liLb9fKE/8jvVWU6xYiYJ" - }, - { - "name": "https://groups.google.com/forum/#!msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ", - "refsource": "CONFIRM", - "url": "https://groups.google.com/forum/#!msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ" - }, - { - "name": "RHSA-2013:0686", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0686.html" - }, - { - "name": "openSUSE-SU-2013:0462", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html" - }, - { - "name": "https://puppet.com/security/cve/cve-2013-0263", - "refsource": "CONFIRM", - "url": "https://puppet.com/security/cve/cve-2013-0263" - }, - { - "name": "https://gist.github.com/codahale/f9f3781f7b54985bee94", + "url": "http://secunia.com/advisories/52774", "refsource": "MISC", - "url": "https://gist.github.com/codahale/f9f3781f7b54985bee94" + "name": "http://secunia.com/advisories/52774" }, { - "name": "https://twitter.com/coda/statuses/299732877745197056", + "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html", "refsource": "MISC", - "url": "https://twitter.com/coda/statuses/299732877745197056" + "name": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html" }, { - "name": "89939", - "refsource": "OSVDB", - "url": "http://www.osvdb.org/89939" + "url": "http://www.debian.org/security/2013/dsa-2783", + "refsource": "MISC", + "name": "http://www.debian.org/security/2013/dsa-2783" }, { - "name": "DSA-2783", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2013/dsa-2783" + "url": "http://rack.github.com/", + "refsource": "MISC", + "name": "http://rack.github.com/" + }, + { + "url": "http://secunia.com/advisories/52033", + "refsource": "MISC", + "name": "http://secunia.com/advisories/52033" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=909071", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=909071" + }, + { + "url": "https://groups.google.com/forum/#%21msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ", + "refsource": "MISC", + "name": "https://groups.google.com/forum/#%21msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ" + }, + { + "url": "https://groups.google.com/forum/#%21msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ", + "refsource": "MISC", + "name": "https://groups.google.com/forum/#%21msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ" + }, + { + "url": "http://secunia.com/advisories/52134", + "refsource": "MISC", + "name": "http://secunia.com/advisories/52134" + }, + { + "url": "http://www.osvdb.org/89939", + "refsource": "MISC", + "name": "http://www.osvdb.org/89939" + }, + { + "url": "https://gist.github.com/codahale/f9f3781f7b54985bee94", + "refsource": "MISC", + "name": "https://gist.github.com/codahale/f9f3781f7b54985bee94" + }, + { + "url": "https://github.com/rack/rack/commit/0cd7e9aa397f8ebb3b8481d67dbac8b4863a7f07", + "refsource": "MISC", + "name": "https://github.com/rack/rack/commit/0cd7e9aa397f8ebb3b8481d67dbac8b4863a7f07" + }, + { + "url": "https://github.com/rack/rack/commit/9a81b961457805f6d1a5c275d053068440421e11", + "refsource": "MISC", + "name": "https://github.com/rack/rack/commit/9a81b961457805f6d1a5c275d053068440421e11" + }, + { + "url": "https://groups.google.com/d/msg/rack-devel/xKrHVWeNvDM/4ZGA576CnK4J", + "refsource": "MISC", + "name": "https://groups.google.com/d/msg/rack-devel/xKrHVWeNvDM/4ZGA576CnK4J" + }, + { + "url": "https://groups.google.com/forum/#%21msg/rack-devel/RnQxm6i13C4/xfakH81yWvgJ", + "refsource": "MISC", + "name": "https://groups.google.com/forum/#%21msg/rack-devel/RnQxm6i13C4/xfakH81yWvgJ" + }, + { + "url": "https://groups.google.com/forum/#%21msg/rack-devel/hz-liLb9fKE/8jvVWU6xYiYJ", + "refsource": "MISC", + "name": "https://groups.google.com/forum/#%21msg/rack-devel/hz-liLb9fKE/8jvVWU6xYiYJ" + }, + { + "url": "https://puppet.com/security/cve/cve-2013-0263", + "refsource": "MISC", + "name": "https://puppet.com/security/cve/cve-2013-0263" + }, + { + "url": "https://twitter.com/coda/statuses/299732877745197056", + "refsource": "MISC", + "name": "https://twitter.com/coda/statuses/299732877745197056" } ] } diff --git a/2013/4xxx/CVE-2013-4189.json b/2013/4xxx/CVE-2013-4189.json index 69da46f2484..8db7d3d6fbc 100644 --- a/2013/4xxx/CVE-2013-4189.json +++ b/2013/4xxx/CVE-2013-4189.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4189", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=978450", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=978450" + "url": "http://plone.org/products/plone-hotfix/releases/20130618", + "refsource": "MISC", + "name": "http://plone.org/products/plone-hotfix/releases/20130618" }, { - "name": "http://plone.org/products/plone/security/advisories/20130618-announcement", - "refsource": "CONFIRM", - "url": "http://plone.org/products/plone/security/advisories/20130618-announcement" + "url": "http://plone.org/products/plone/security/advisories/20130618-announcement", + "refsource": "MISC", + "name": "http://plone.org/products/plone/security/advisories/20130618-announcement" }, { - "name": "http://plone.org/products/plone-hotfix/releases/20130618", - "refsource": "CONFIRM", - "url": "http://plone.org/products/plone-hotfix/releases/20130618" + "url": "http://seclists.org/oss-sec/2013/q3/261", + "refsource": "MISC", + "name": "http://seclists.org/oss-sec/2013/q3/261" }, { - "name": "[oss-security] 20130801 Re: CVE Request -- Plone: 20130618 Hotfix (multiple vectors)", - "refsource": "MLIST", - "url": "http://seclists.org/oss-sec/2013/q3/261" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=978450", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=978450" } ] } diff --git a/2013/4xxx/CVE-2013-4190.json b/2013/4xxx/CVE-2013-4190.json index 7a0b8cbbe81..34574e14ebd 100644 --- a/2013/4xxx/CVE-2013-4190.json +++ b/2013/4xxx/CVE-2013-4190.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4190", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=978451", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=978451" + "url": "http://plone.org/products/plone-hotfix/releases/20130618", + "refsource": "MISC", + "name": "http://plone.org/products/plone-hotfix/releases/20130618" }, { - "name": "http://plone.org/products/plone/security/advisories/20130618-announcement", - "refsource": "CONFIRM", - "url": "http://plone.org/products/plone/security/advisories/20130618-announcement" + "url": "http://plone.org/products/plone/security/advisories/20130618-announcement", + "refsource": "MISC", + "name": "http://plone.org/products/plone/security/advisories/20130618-announcement" }, { - "name": "http://plone.org/products/plone-hotfix/releases/20130618", - "refsource": "CONFIRM", - "url": "http://plone.org/products/plone-hotfix/releases/20130618" + "url": "http://seclists.org/oss-sec/2013/q3/261", + "refsource": "MISC", + "name": "http://seclists.org/oss-sec/2013/q3/261" }, { - "name": "[oss-security] 20130801 Re: CVE Request -- Plone: 20130618 Hotfix (multiple vectors)", - "refsource": "MLIST", - "url": "http://seclists.org/oss-sec/2013/q3/261" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=978451", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=978451" } ] } diff --git a/2013/4xxx/CVE-2013-4191.json b/2013/4xxx/CVE-2013-4191.json index c0237b07646..2d3828bdba2 100644 --- a/2013/4xxx/CVE-2013-4191.json +++ b/2013/4xxx/CVE-2013-4191.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4191", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://plone.org/products/plone/security/advisories/20130618-announcement", - "refsource": "CONFIRM", - "url": "http://plone.org/products/plone/security/advisories/20130618-announcement" + "url": "http://plone.org/products/plone-hotfix/releases/20130618", + "refsource": "MISC", + "name": "http://plone.org/products/plone-hotfix/releases/20130618" }, { - "name": "http://plone.org/products/plone-hotfix/releases/20130618", - "refsource": "CONFIRM", - "url": "http://plone.org/products/plone-hotfix/releases/20130618" + "url": "http://plone.org/products/plone/security/advisories/20130618-announcement", + "refsource": "MISC", + "name": "http://plone.org/products/plone/security/advisories/20130618-announcement" }, { - "name": "[oss-security] 20130801 Re: CVE Request -- Plone: 20130618 Hotfix (multiple vectors)", - "refsource": "MLIST", - "url": "http://seclists.org/oss-sec/2013/q3/261" + "url": "http://seclists.org/oss-sec/2013/q3/261", + "refsource": "MISC", + "name": "http://seclists.org/oss-sec/2013/q3/261" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=978453", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=978453" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=978453", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=978453" } ] } diff --git a/2013/4xxx/CVE-2013-4192.json b/2013/4xxx/CVE-2013-4192.json index e9c24ba24f1..755c34338be 100644 --- a/2013/4xxx/CVE-2013-4192.json +++ b/2013/4xxx/CVE-2013-4192.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4192", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://plone.org/products/plone/security/advisories/20130618-announcement", - "refsource": "CONFIRM", - "url": "http://plone.org/products/plone/security/advisories/20130618-announcement" + "url": "http://plone.org/products/plone-hotfix/releases/20130618", + "refsource": "MISC", + "name": "http://plone.org/products/plone-hotfix/releases/20130618" }, { - "name": "http://plone.org/products/plone-hotfix/releases/20130618", - "refsource": "CONFIRM", - "url": "http://plone.org/products/plone-hotfix/releases/20130618" + "url": "http://plone.org/products/plone/security/advisories/20130618-announcement", + "refsource": "MISC", + "name": "http://plone.org/products/plone/security/advisories/20130618-announcement" }, { - "name": "[oss-security] 20130801 Re: CVE Request -- Plone: 20130618 Hotfix (multiple vectors)", - "refsource": "MLIST", - "url": "http://seclists.org/oss-sec/2013/q3/261" + "url": "http://seclists.org/oss-sec/2013/q3/261", + "refsource": "MISC", + "name": "http://seclists.org/oss-sec/2013/q3/261" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=978464", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=978464" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=978464", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=978464" } ] } diff --git a/2013/4xxx/CVE-2013-4193.json b/2013/4xxx/CVE-2013-4193.json index 213ca3576ae..242e4ee4abf 100644 --- a/2013/4xxx/CVE-2013-4193.json +++ b/2013/4xxx/CVE-2013-4193.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4193", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://plone.org/products/plone/security/advisories/20130618-announcement", - "refsource": "CONFIRM", - "url": "http://plone.org/products/plone/security/advisories/20130618-announcement" + "url": "http://plone.org/products/plone-hotfix/releases/20130618", + "refsource": "MISC", + "name": "http://plone.org/products/plone-hotfix/releases/20130618" }, { - "name": "http://plone.org/products/plone-hotfix/releases/20130618", - "refsource": "CONFIRM", - "url": "http://plone.org/products/plone-hotfix/releases/20130618" + "url": "http://plone.org/products/plone/security/advisories/20130618-announcement", + "refsource": "MISC", + "name": "http://plone.org/products/plone/security/advisories/20130618-announcement" }, { - "name": "[oss-security] 20130801 Re: CVE Request -- Plone: 20130618 Hotfix (multiple vectors)", - "refsource": "MLIST", - "url": "http://seclists.org/oss-sec/2013/q3/261" + "url": "http://seclists.org/oss-sec/2013/q3/261", + "refsource": "MISC", + "name": "http://seclists.org/oss-sec/2013/q3/261" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=978469", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=978469" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=978469", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=978469" } ] } diff --git a/2013/4xxx/CVE-2013-4194.json b/2013/4xxx/CVE-2013-4194.json index 6fa12965b9a..9346b831181 100644 --- a/2013/4xxx/CVE-2013-4194.json +++ b/2013/4xxx/CVE-2013-4194.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4194", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=978470", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=978470" + "url": "http://plone.org/products/plone-hotfix/releases/20130618", + "refsource": "MISC", + "name": "http://plone.org/products/plone-hotfix/releases/20130618" }, { - "name": "http://plone.org/products/plone/security/advisories/20130618-announcement", - "refsource": "CONFIRM", - "url": "http://plone.org/products/plone/security/advisories/20130618-announcement" + "url": "http://plone.org/products/plone/security/advisories/20130618-announcement", + "refsource": "MISC", + "name": "http://plone.org/products/plone/security/advisories/20130618-announcement" }, { - "name": "http://plone.org/products/plone-hotfix/releases/20130618", - "refsource": "CONFIRM", - "url": "http://plone.org/products/plone-hotfix/releases/20130618" + "url": "http://seclists.org/oss-sec/2013/q3/261", + "refsource": "MISC", + "name": "http://seclists.org/oss-sec/2013/q3/261" }, { - "name": "[oss-security] 20130801 Re: CVE Request -- Plone: 20130618 Hotfix (multiple vectors)", - "refsource": "MLIST", - "url": "http://seclists.org/oss-sec/2013/q3/261" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=978470", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=978470" } ] } diff --git a/2013/4xxx/CVE-2013-4197.json b/2013/4xxx/CVE-2013-4197.json index 78d9c98e6d1..1659b81cabb 100644 --- a/2013/4xxx/CVE-2013-4197.json +++ b/2013/4xxx/CVE-2013-4197.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4197", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://plone.org/products/plone/security/advisories/20130618-announcement", - "refsource": "CONFIRM", - "url": "http://plone.org/products/plone/security/advisories/20130618-announcement" + "url": "http://plone.org/products/plone-hotfix/releases/20130618", + "refsource": "MISC", + "name": "http://plone.org/products/plone-hotfix/releases/20130618" }, { - "name": "http://plone.org/products/plone-hotfix/releases/20130618", - "refsource": "CONFIRM", - "url": "http://plone.org/products/plone-hotfix/releases/20130618" + "url": "http://plone.org/products/plone/security/advisories/20130618-announcement", + "refsource": "MISC", + "name": "http://plone.org/products/plone/security/advisories/20130618-announcement" }, { - "name": "[oss-security] 20130801 Re: CVE Request -- Plone: 20130618 Hotfix (multiple vectors)", - "refsource": "MLIST", - "url": "http://seclists.org/oss-sec/2013/q3/261" + "url": "http://seclists.org/oss-sec/2013/q3/261", + "refsource": "MISC", + "name": "http://seclists.org/oss-sec/2013/q3/261" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=978478", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=978478" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=978478", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=978478" } ] } diff --git a/2013/4xxx/CVE-2013-4198.json b/2013/4xxx/CVE-2013-4198.json index a5142bbd0cd..6a74847fab8 100644 --- a/2013/4xxx/CVE-2013-4198.json +++ b/2013/4xxx/CVE-2013-4198.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4198", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=978480", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=978480" + "url": "http://plone.org/products/plone-hotfix/releases/20130618", + "refsource": "MISC", + "name": "http://plone.org/products/plone-hotfix/releases/20130618" }, { - "name": "http://plone.org/products/plone/security/advisories/20130618-announcement", - "refsource": "CONFIRM", - "url": "http://plone.org/products/plone/security/advisories/20130618-announcement" + "url": "http://plone.org/products/plone/security/advisories/20130618-announcement", + "refsource": "MISC", + "name": "http://plone.org/products/plone/security/advisories/20130618-announcement" }, { - "name": "http://plone.org/products/plone-hotfix/releases/20130618", - "refsource": "CONFIRM", - "url": "http://plone.org/products/plone-hotfix/releases/20130618" + "url": "http://seclists.org/oss-sec/2013/q3/261", + "refsource": "MISC", + "name": "http://seclists.org/oss-sec/2013/q3/261" }, { - "name": "[oss-security] 20130801 Re: CVE Request -- Plone: 20130618 Hotfix (multiple vectors)", - "refsource": "MLIST", - "url": "http://seclists.org/oss-sec/2013/q3/261" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=978480", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=978480" } ] } diff --git a/2013/4xxx/CVE-2013-4199.json b/2013/4xxx/CVE-2013-4199.json index 75cd3d3b416..a8ec29d2050 100644 --- a/2013/4xxx/CVE-2013-4199.json +++ b/2013/4xxx/CVE-2013-4199.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4199", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=978482", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=978482" + "url": "http://plone.org/products/plone-hotfix/releases/20130618", + "refsource": "MISC", + "name": "http://plone.org/products/plone-hotfix/releases/20130618" }, { - "name": "http://plone.org/products/plone/security/advisories/20130618-announcement", - "refsource": "CONFIRM", - "url": "http://plone.org/products/plone/security/advisories/20130618-announcement" + "url": "http://plone.org/products/plone/security/advisories/20130618-announcement", + "refsource": "MISC", + "name": "http://plone.org/products/plone/security/advisories/20130618-announcement" }, { - "name": "http://plone.org/products/plone-hotfix/releases/20130618", - "refsource": "CONFIRM", - "url": "http://plone.org/products/plone-hotfix/releases/20130618" + "url": "http://seclists.org/oss-sec/2013/q3/261", + "refsource": "MISC", + "name": "http://seclists.org/oss-sec/2013/q3/261" }, { - "name": "[oss-security] 20130801 Re: CVE Request -- Plone: 20130618 Hotfix (multiple vectors)", - "refsource": "MLIST", - "url": "http://seclists.org/oss-sec/2013/q3/261" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=978482", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=978482" } ] } diff --git a/2013/4xxx/CVE-2013-4200.json b/2013/4xxx/CVE-2013-4200.json index 46474d9792e..0baacdf5891 100644 --- a/2013/4xxx/CVE-2013-4200.json +++ b/2013/4xxx/CVE-2013-4200.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4200", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "The isURLInPortal method in the URLTool class in in_portal.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 treats URLs starting with a space as a relative URL, which allows remote attackers to bypass the allow_external_login_sites filtering property, redirect users to arbitrary web sites, and conduct phishing attacks via a space before a URL in the \"next\" parameter to acl_users/credentials_cookie_auth/require_login." + "value": "The isURLInPortal method in the URLTool class in in_portal.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 treats URLs starting with a space as a relative URL, which allows remote attackers to bypass the allow_external_login_sites filtering property, redirect users to arbitrary web sites, and conduct phishing attacks via a space before a URL in the \"next\" parameter to acl_users/credentials_cookie_auth/require_login." } ] }, @@ -50,32 +27,56 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[oss-security] 20130801 Re: CVE Request -- Plone: 20130618 Hotfix (multiple", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/08/01/2" + "url": "http://plone.org/products/plone-hotfix/releases/20130618", + "refsource": "MISC", + "name": "http://plone.org/products/plone-hotfix/releases/20130618" }, { - "name": "http://plone.org/products/plone/security/advisories/20130618-announcement", - "refsource": "CONFIRM", - "url": "http://plone.org/products/plone/security/advisories/20130618-announcement" + "url": "http://plone.org/products/plone/security/advisories/20130618-announcement", + "refsource": "MISC", + "name": "http://plone.org/products/plone/security/advisories/20130618-announcement" }, { - "name": "http://plone.org/products/plone-hotfix/releases/20130618", - "refsource": "CONFIRM", - "url": "http://plone.org/products/plone-hotfix/releases/20130618" + "url": "http://www.openwall.com/lists/oss-security/2013/08/01/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/08/01/2" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4200", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4200" + "url": "http://www.securityfocus.com/archive/1/530787/100/0/threaded", + "refsource": "MISC", + "name": "http://www.securityfocus.com/archive/1/530787/100/0/threaded" }, { - "name": "20140116 CVE-2013-4200 - Plone URL redirection / Forwarding of cookie data (session hijack) in certain browsers", - "refsource": "BUGTRAQ", - "url": "http://www.securityfocus.com/archive/1/530787/100/0/threaded" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4200", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4200" } ] } diff --git a/2016/4xxx/CVE-2016-4001.json b/2016/4xxx/CVE-2016-4001.json index efbb09d5e19..2529e5bdbdc 100644 --- a/2016/4xxx/CVE-2016-4001.json +++ b/2016/4xxx/CVE-2016-4001.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-4001", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,62 +27,86 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[qemu-devel] 20160408 [PATCH v3] net: stellaris_enet: check packet length against receive buffer", - "refsource": "MLIST", - "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01334.html" + "url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=3a15cc0e1ee7168db0782133d2607a6bfa422d66", + "refsource": "MISC", + "name": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=3a15cc0e1ee7168db0782133d2607a6bfa422d66" }, { - "name": "[oss-security] 20160411 CVE request: Qemu: net: buffer overflow in stellaris_enet emulator", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/04/11/4" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html" }, { - "name": "FEDORA-2016-48e72b7bc5", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html" }, { - "name": "[oss-security] 20160412 Re: CVE request: Qemu: net: buffer overflow in stellaris_enet emulator", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/04/12/6" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html" }, { - "name": "85976", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/85976" + "url": "http://www.openwall.com/lists/oss-security/2016/04/11/4", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/04/11/4" }, { - "name": "GLSA-201609-01", - "refsource": "GENTOO", - "url": "https://security.gentoo.org/glsa/201609-01" + "url": "http://www.openwall.com/lists/oss-security/2016/04/12/6", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/04/12/6" }, { - "name": "FEDORA-2016-35d7b09908", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html" + "url": "http://www.securityfocus.com/bid/85976", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/85976" }, { - "name": "http://git.qemu.org/?p=qemu.git;a=commit;h=3a15cc0e1ee7168db0782133d2607a6bfa422d66", - "refsource": "CONFIRM", - "url": "http://git.qemu.org/?p=qemu.git;a=commit;h=3a15cc0e1ee7168db0782133d2607a6bfa422d66" + "url": "http://www.ubuntu.com/usn/USN-2974-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-2974-1" }, { - "name": "FEDORA-2016-75063477ca", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html" + "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html" }, { - "name": "USN-2974-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-2974-1" + "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01334.html", + "refsource": "MISC", + "name": "https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01334.html" }, { - "name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update", - "refsource": "MLIST", - "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html" + "url": "https://security.gentoo.org/glsa/201609-01", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/201609-01" } ] } diff --git a/2016/4xxx/CVE-2016-4002.json b/2016/4xxx/CVE-2016-4002.json index 6f8e054efec..5cb8bd21646 100644 --- a/2016/4xxx/CVE-2016-4002.json +++ b/2016/4xxx/CVE-2016-4002.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-4002", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,62 +27,86 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1326082", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326082" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html" }, { - "name": "85992", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/85992" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html" }, { - "name": "FEDORA-2016-48e72b7bc5", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html" }, { - "name": "GLSA-201609-01", - "refsource": "GENTOO", - "url": "https://security.gentoo.org/glsa/201609-01" + "url": "http://www.ubuntu.com/usn/USN-2974-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-2974-1" }, { - "name": "[oss-security] 20160412 CVE Request: Qemu: net: buffer overflow in MIPSnet emulator", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/04/11/6" + "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html" }, { - "name": "FEDORA-2016-35d7b09908", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html" + "url": "https://security.gentoo.org/glsa/201609-01", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/201609-01" }, { - "name": "FEDORA-2016-75063477ca", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html" + "url": "http://www.openwall.com/lists/oss-security/2016/04/11/6", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/04/11/6" }, { - "name": "USN-2974-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-2974-1" + "url": "http://www.openwall.com/lists/oss-security/2016/04/12/7", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/04/12/7" }, { - "name": "[oss-security] 20160412 Re: CVE Request: Qemu: net: buffer overflow in MIPSnet emulator", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/04/12/7" + "url": "http://www.securityfocus.com/bid/85992", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/85992" }, { - "name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update", - "refsource": "MLIST", - "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html" + "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01131.html", + "refsource": "MISC", + "name": "https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01131.html" }, { - "name": "[Qemu-devel] 20160407 [PATCH] net: mipsnet: check packet length against buffer", - "refsource": "MLIST", - "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01131.html" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326082", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1326082" } ] } diff --git a/2016/4xxx/CVE-2016-4020.json b/2016/4xxx/CVE-2016-4020.json index b6a06dbd27d..24f9a2af1cb 100644 --- a/2016/4xxx/CVE-2016-4020.json +++ b/2016/4xxx/CVE-2016-4020.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "An information-exposure flaw was found in Quick Emulator (QEMU) in Task Priority Register (TPR) optimizations for 32-bit Windows guests. The flaw could occur while accessing TPR. A privileged user inside a guest could use this issue to read portions of the host memory." + "value": "The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR)." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Exposure of Sensitive Information to an Unauthorized Actor", - "cweId": "CWE-200" + "value": "n/a" } ] } @@ -32,93 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 7", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "10:1.5.3-141.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", - "version": { - "version_data": [ - { - "version_value": "10:2.9.0-10.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7", - "version": { - "version_data": [ - { - "version_value": "10:2.9.0-10.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat OpenStack Platform 10.0 (Newton)", - "version": { - "version_data": [ - { - "version_value": "10:2.9.0-10.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat OpenStack Platform 11.0 (Ocata)", - "version": { - "version_data": [ - { - "version_value": "10:2.9.0-10.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat OpenStack Platform 8.0 (Liberty)", - "version": { - "version_data": [ - { - "version_value": "10:2.9.0-10.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat OpenStack Platform 9.0 (Mitaka)", - "version": { - "version_data": [ - { - "version_value": "10:2.9.0-10.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7", - "version": { - "version_data": [ - { - "version_value": "10:2.9.0-14.el7", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -171,16 +93,6 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2017:1856" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2016-4020", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2016-4020" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313686", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1313686" - }, { "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01106.html", "refsource": "MISC", @@ -190,51 +102,11 @@ "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01118.html", "refsource": "MISC", "name": "https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01118.html" - } - ] - }, - "credits": [ - { - "lang": "en", - "value": "Red Hat would like to thank Donghai Zdh (Alibaba Inc.) for reporting this issue." - } - ], - "impact": { - "cvss": [ - { - "accessComplexity": "MEDIUM", - "accessVector": "ADJACENT_NETWORK", - "authentication": "NONE", - "availabilityImpact": "NONE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 2.9, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:A/AC:M/Au:N/C:P/I:N/A:N", - "version": "2.0" }, { - "attackComplexity": "HIGH", - "attackVector": "ADJACENT_NETWORK", - "availabilityImpact": "NONE", - "baseScore": 3.4, - "baseSeverity": "LOW", - "confidentialityImpact": "LOW", - "integrityImpact": "NONE", - "privilegesRequired": "NONE", - "scope": "CHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", - "version": "3.0" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313686", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1313686" } ] } diff --git a/2016/4xxx/CVE-2016-4439.json b/2016/4xxx/CVE-2016-4439.json index 47104e16238..b1efd1b1d7a 100644 --- a/2016/4xxx/CVE-2016-4439.json +++ b/2016/4xxx/CVE-2016-4439.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-4439", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,47 +27,71 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "USN-3047-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-3047-1" + "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html" }, { - "name": "90760", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/90760" + "url": "https://security.gentoo.org/glsa/201609-01", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/201609-01" }, { - "name": "GLSA-201609-01", - "refsource": "GENTOO", - "url": "https://security.gentoo.org/glsa/201609-01" + "url": "http://www.ubuntu.com/usn/USN-3047-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-3047-1" }, { - "name": "USN-3047-2", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-3047-2" + "url": "http://www.ubuntu.com/usn/USN-3047-2", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-3047-2" }, { - "name": "[qemu-devel] 20160519 [PATCH 1/2] scsi: check command buffer length before write(CVE-2016-4439)", - "refsource": "MLIST", - "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03273.html" + "url": "http://www.openwall.com/lists/oss-security/2016/05/19/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/05/19/3" }, { - "name": "[oss-security] 20160519 CVE-2016-4439 Qemu: scsi: esp: OOB write while writing to 's->cmdbuf' in esp_reg_write", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/05/19/3" + "url": "http://www.securityfocus.com/bid/90760", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/90760" }, { - "name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update", - "refsource": "MLIST", - "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html" + "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03273.html", + "refsource": "MISC", + "name": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03273.html" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1337502", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337502" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337502", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1337502" } ] } diff --git a/2016/4xxx/CVE-2016-4440.json b/2016/4xxx/CVE-2016-4440.json index 205d621d127..9b2d1dd8b18 100644 --- a/2016/4xxx/CVE-2016-4440.json +++ b/2016/4xxx/CVE-2016-4440.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-4440", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1337806", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337806" + "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3ce424e45411cf5a13105e0386b6ecf6eeb4f66f", + "refsource": "MISC", + "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3ce424e45411cf5a13105e0386b6ecf6eeb4f66f" }, { - "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3ce424e45411cf5a13105e0386b6ecf6eeb4f66f", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3ce424e45411cf5a13105e0386b6ecf6eeb4f66f" + "url": "http://www.openwall.com/lists/oss-security/2016/05/20/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/05/20/2" }, { - "name": "[oss-security] 20160520 CVE-2016-4440 Kernel: kvm: vmx: incorrect state update leading to MSR access", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/05/20/2" + "url": "https://github.com/torvalds/linux/commit/3ce424e45411cf5a13105e0386b6ecf6eeb4f66f", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/3ce424e45411cf5a13105e0386b6ecf6eeb4f66f" }, { - "name": "https://github.com/torvalds/linux/commit/3ce424e45411cf5a13105e0386b6ecf6eeb4f66f", - "refsource": "CONFIRM", - "url": "https://github.com/torvalds/linux/commit/3ce424e45411cf5a13105e0386b6ecf6eeb4f66f" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337806", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1337806" } ] } diff --git a/2016/4xxx/CVE-2016-4441.json b/2016/4xxx/CVE-2016-4441.json index 502c9dec850..05f48afbf52 100644 --- a/2016/4xxx/CVE-2016-4441.json +++ b/2016/4xxx/CVE-2016-4441.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-4441", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,47 +27,71 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[qemu-devel] 20160519 [PATCH 2/2] scsi: check dma length before reading scsi command(CVE-2016-4441)", - "refsource": "MLIST", - "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03274.html" + "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html" }, { - "name": "USN-3047-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-3047-1" + "url": "https://security.gentoo.org/glsa/201609-01", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/201609-01" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1337505", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337505" + "url": "http://www.openwall.com/lists/oss-security/2016/05/19/4", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/05/19/4" }, { - "name": "GLSA-201609-01", - "refsource": "GENTOO", - "url": "https://security.gentoo.org/glsa/201609-01" + "url": "http://www.securityfocus.com/bid/90762", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/90762" }, { - "name": "USN-3047-2", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-3047-2" + "url": "http://www.ubuntu.com/usn/USN-3047-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-3047-1" }, { - "name": "[oss-security] 20160519 CVE-2016-4441 Qemu: scsi: esp: OOB write while writing to 's-cmdbuf' in get_cmd", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/05/19/4" + "url": "http://www.ubuntu.com/usn/USN-3047-2", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-3047-2" }, { - "name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update", - "refsource": "MLIST", - "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html" + "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03274.html", + "refsource": "MISC", + "name": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03274.html" }, { - "name": "90762", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/90762" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337505", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1337505" } ] } diff --git a/2016/4xxx/CVE-2016-4449.json b/2016/4xxx/CVE-2016-4449.json index a2872cee980..82aa1e83ead 100644 --- a/2016/4xxx/CVE-2016-4449.json +++ b/2016/4xxx/CVE-2016-4449.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-4449", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,157 +27,181 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", - "refsource": "CONFIRM", - "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" + "url": "http://xmlsoft.org/news.html", + "refsource": "MISC", + "name": "http://xmlsoft.org/news.html" }, { - "name": "https://support.cybozu.com/ja-jp/article/9735", - "refsource": "CONFIRM", - "url": "https://support.cybozu.com/ja-jp/article/9735" + "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", + "refsource": "MISC", + "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { - "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", - "refsource": "CONFIRM", - "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10170" + "url": "http://jvn.jp/en/jp/JVN17535578/index.html", + "refsource": "MISC", + "name": "http://jvn.jp/en/jp/JVN17535578/index.html" }, { - "name": "SSA:2016-148-01", - "refsource": "SLACKWARE", - "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.404722" + "url": "http://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000066.html", + "refsource": "MISC", + "name": "http://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000066.html" }, { - "name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", - "refsource": "CONFIRM", - "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" + "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html", + "refsource": "MISC", + "name": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html" }, { - "name": "JVN#17535578", - "refsource": "JVN", - "url": "http://jvn.jp/en/jp/JVN17535578/index.html" + "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html", + "refsource": "MISC", + "name": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html" }, { - "name": "RHSA-2016:1292", - "refsource": "REDHAT", - "url": "https://access.redhat.com/errata/RHSA-2016:1292" + "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html", + "refsource": "MISC", + "name": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html" }, { - "name": "[oss-security] 20160525 3 libxml2 issues", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/05/25/2" + "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html", + "refsource": "MISC", + "name": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html" }, { - "name": "DSA-3593", - "refsource": "DEBIAN", - "url": "https://www.debian.org/security/2016/dsa-3593" + "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html", + "refsource": "MISC", + "name": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html" }, { - "name": "APPLE-SA-2016-07-18-4", - "refsource": "APPLE", - "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html" + "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { - "name": "APPLE-SA-2016-07-18-3", - "refsource": "APPLE", - "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html" + "url": "http://www.openwall.com/lists/oss-security/2016/05/25/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/05/25/2" }, { - "name": "APPLE-SA-2016-07-18-2", - "refsource": "APPLE", - "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html" + "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", + "refsource": "MISC", + "name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { - "name": "http://xmlsoft.org/news.html", - "refsource": "CONFIRM", - "url": "http://xmlsoft.org/news.html" + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", + "refsource": "MISC", + "name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" }, { - "name": "https://support.apple.com/HT206901", - "refsource": "CONFIRM", - "url": "https://support.apple.com/HT206901" + "url": "http://www.securityfocus.com/bid/90865", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/90865" }, { - "name": "USN-2994-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-2994-1" + "url": "http://www.securitytracker.com/id/1036348", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id/1036348" }, { - "name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", - "refsource": "CONFIRM", - "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" + "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.404722", + "refsource": "MISC", + "name": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.404722" }, { - "name": "APPLE-SA-2016-07-18-1", - "refsource": "APPLE", - "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html" + "url": "http://www.ubuntu.com/usn/USN-2994-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-2994-1" }, { - "name": "JVNDB-2017-000066", - "refsource": "JVNDB", - "url": "http://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000066.html" + "url": "https://access.redhat.com/errata/RHSA-2016:1292", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2016:1292" }, { - "name": "APPLE-SA-2016-07-18-6", - "refsource": "APPLE", - "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html" + "url": "https://git.gnome.org/browse/libxml2/commit/?id=b1d34de46a11323fccffa9fadeb33be670d602f5", + "refsource": "MISC", + "name": "https://git.gnome.org/browse/libxml2/commit/?id=b1d34de46a11323fccffa9fadeb33be670d602f5" }, { - "name": "https://www.tenable.com/security/tns-2016-18", - "refsource": "CONFIRM", - "url": "https://www.tenable.com/security/tns-2016-18" + "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709", + "refsource": "MISC", + "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709" }, { - "name": "90865", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/90865" + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", + "refsource": "MISC", + "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10170" }, { - "name": "https://git.gnome.org/browse/libxml2/commit/?id=b1d34de46a11323fccffa9fadeb33be670d602f5", - "refsource": "CONFIRM", - "url": "https://git.gnome.org/browse/libxml2/commit/?id=b1d34de46a11323fccffa9fadeb33be670d602f5" + "url": "https://support.apple.com/HT206899", + "refsource": "MISC", + "name": "https://support.apple.com/HT206899" }, { - "name": "RHSA-2016:2957", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" + "url": "https://support.apple.com/HT206901", + "refsource": "MISC", + "name": "https://support.apple.com/HT206901" }, { - "name": "https://support.apple.com/HT206905", - "refsource": "CONFIRM", - "url": "https://support.apple.com/HT206905" + "url": "https://support.apple.com/HT206902", + "refsource": "MISC", + "name": "https://support.apple.com/HT206902" }, { - "name": "1036348", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id/1036348" + "url": "https://support.apple.com/HT206903", + "refsource": "MISC", + "name": "https://support.apple.com/HT206903" }, { - "name": "https://support.apple.com/HT206903", - "refsource": "CONFIRM", - "url": "https://support.apple.com/HT206903" + "url": "https://support.apple.com/HT206904", + "refsource": "MISC", + "name": "https://support.apple.com/HT206904" }, { - "name": "https://support.apple.com/HT206902", - "refsource": "CONFIRM", - "url": "https://support.apple.com/HT206902" + "url": "https://support.apple.com/HT206905", + "refsource": "MISC", + "name": "https://support.apple.com/HT206905" }, { - "name": "https://support.apple.com/HT206904", - "refsource": "CONFIRM", - "url": "https://support.apple.com/HT206904" + "url": "https://support.cybozu.com/ja-jp/article/9735", + "refsource": "MISC", + "name": "https://support.cybozu.com/ja-jp/article/9735" }, { - "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709", - "refsource": "CONFIRM", - "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709" + "url": "https://www.debian.org/security/2016/dsa-3593", + "refsource": "MISC", + "name": "https://www.debian.org/security/2016/dsa-3593" }, { - "name": "https://support.apple.com/HT206899", - "refsource": "CONFIRM", - "url": "https://support.apple.com/HT206899" + "url": "https://www.tenable.com/security/tns-2016-18", + "refsource": "MISC", + "name": "https://www.tenable.com/security/tns-2016-18" } ] } diff --git a/2016/4xxx/CVE-2016-4992.json b/2016/4xxx/CVE-2016-4992.json index 922ff52b7f9..ccbb35afa84 100644 --- a/2016/4xxx/CVE-2016-4992.json +++ b/2016/4xxx/CVE-2016-4992.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "An information disclosure flaw was found in 389 Directory Server. A user with no access to objects in certain LDAP sub-tree could send LDAP ADD operations with a specific object name. The error message returned to the user was different based on whether the target object existed or not." + "value": "389 Directory Server in Red Hat Enterprise Linux Desktop 6 through 7, Red Hat Enterprise Linux HPC Node 6 through 7, Red Hat Enterprise Linux Server 6 through 7, and Red Hat Enterprise Linux Workstation 6 through 7 allows remote attackers to infer the existence of RDN component objects." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Generation of Error Message Containing Sensitive Information", - "cweId": "CWE-209" + "value": "n/a" } ] } @@ -32,27 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 6", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:1.2.11.15-84.el6_8", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 7", - "version": { - "version_data": [ - { - "version_value": "0:1.3.5.10-11.el7", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -75,71 +63,11 @@ "refsource": "MISC", "name": "http://rhn.redhat.com/errata/RHSA-2016-2765.html" }, - { - "url": "https://access.redhat.com/errata/RHSA-2016:2594", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2016:2594" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2016:2765", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2016:2765" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2016-4992", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2016-4992" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347760", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1347760" } ] - }, - "credits": [ - { - "lang": "en", - "value": "This issue was discovered by Martin Basti (Red Hat) and Petr Spacek (Red Hat)." - } - ], - "impact": { - "cvss": [ - { - "accessComplexity": "MEDIUM", - "accessVector": "NETWORK", - "authentication": "SINGLE", - "availabilityImpact": "NONE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 3.5, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", - "version": "2.0" - }, - { - "attackComplexity": "LOW", - "attackVector": "NETWORK", - "availabilityImpact": "NONE", - "baseScore": 4.3, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "LOW", - "integrityImpact": "NONE", - "privilegesRequired": "LOW", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", - "version": "3.0" - } - ] } } \ No newline at end of file diff --git a/2016/4xxx/CVE-2016-4996.json b/2016/4xxx/CVE-2016-4996.json index a0d7dcf1241..8b5eae51932 100644 --- a/2016/4xxx/CVE-2016-4996.json +++ b/2016/4xxx/CVE-2016-4996.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A flaw was found in discovery-debug in foreman. An attacker, with permissions to view the debug results, would be able to view the root password associated with that system, potentially allowing them to access it." + "value": "discovery-debug in Foreman before 6.2 when the ssh service has been enabled on discovered nodes displays the root password in plaintext in the system journal when used to log in, which allows local users with access to the system journal to obtain the root password by reading the system journal, or by clicking Logs on the console." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Insertion of Sensitive Information into Log File", - "cweId": "CWE-532" + "value": "n/a" } ] } @@ -32,272 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Satellite 6.3 for RHEL 7", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:2.1.14-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.15.6.34-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:201801241201-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.4.4-1", - "version_affected": "!" - }, - { - "version_value": "1:1.15.6.8-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.15.6.4-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.15.6.2-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.1-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.4.5-15.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.4.0-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.1-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.4.5.26-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.0.2-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.5.1-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.13.4.6-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.4.1-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.2-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.2.1.1-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.13.4-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.13.4.8-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.16-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:4.0.5-4.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.0.9-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.0-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.2-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.6-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.1-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.2.1-1.fm1_15.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.4-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.9-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.10-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.9-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.0-1.git.0.b5c2768.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.7-2.git.0.3b416c9.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:6.3.0-23.0.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:6.3.0.12-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:5.1.1.4-1.fm1_15.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:10.0.2.2-1.fm1_15.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:9.1.5.3-1.fm1_15.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.1.0.3-1.fm1_15.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.14-1.fm1_15.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.7.11-1.fm1_15.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.13-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.7.2-1.fm1_15.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.6-1.fm1_15.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.9.6.4-1.fm1_15.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.8-1.fm1_15.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:5.0.1-1.fm1_15.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.4.16-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.9-1.fm1_15.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.11.0.1-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.11.0.5-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.8-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.3.3-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.0-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.6-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.5-1.fm1_15.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.6-1.fm1_15.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.12-1.fm1_15.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.3-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.11.3.5-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.4.5.58-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.2-1.fm1_15.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.10-1.fm1_15.el7sat", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -315,61 +58,11 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2018:0336" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2016-4996", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2016-4996" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349136", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1349136" } ] - }, - "credits": [ - { - "lang": "en", - "value": "This issue was discovered by Thom Carlin (Red Hat)." - } - ], - "impact": { - "cvss": [ - { - "accessComplexity": "HIGH", - "accessVector": "LOCAL", - "authentication": "NONE", - "availabilityImpact": "COMPLETE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 6.2, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "COMPLETE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "COMPLETE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", - "version": "2.0" - }, - { - "attackComplexity": "HIGH", - "attackVector": "LOCAL", - "availabilityImpact": "HIGH", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "privilegesRequired": "HIGH", - "scope": "CHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", - "version": "3.0" - } - ] } } \ No newline at end of file diff --git a/2016/4xxx/CVE-2016-4999.json b/2016/4xxx/CVE-2016-4999.json index 9e9ec909e58..abf340a9901 100644 --- a/2016/4xxx/CVE-2016-4999.json +++ b/2016/4xxx/CVE-2016-4999.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-4999", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,37 +27,61 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "RHSA-2016:1429", - "refsource": "REDHAT", - "url": "https://access.redhat.com/errata/RHSA-2016:1429" + "url": "http://www.securityfocus.com/bid/91795", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/91795" }, { - "name": "https://issues.jboss.org/browse/DASHBUILDE-113", - "refsource": "CONFIRM", - "url": "https://issues.jboss.org/browse/DASHBUILDE-113" + "url": "https://access.redhat.com/errata/RHSA-2016:1428", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2016:1428" }, { - "name": "RHSA-2016:1428", - "refsource": "REDHAT", - "url": "https://access.redhat.com/errata/RHSA-2016:1428" + "url": "https://access.redhat.com/errata/RHSA-2016:1429", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2016:1429" }, { - "name": "91795", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/91795" + "url": "https://github.com/dashbuilder/dashbuilder/commit/8574899e3b6455547b534f570b2330ff772e524b", + "refsource": "MISC", + "name": "https://github.com/dashbuilder/dashbuilder/commit/8574899e3b6455547b534f570b2330ff772e524b" }, { - "name": "https://github.com/dashbuilder/dashbuilder/commit/8574899e3b6455547b534f570b2330ff772e524b", - "refsource": "CONFIRM", - "url": "https://github.com/dashbuilder/dashbuilder/commit/8574899e3b6455547b534f570b2330ff772e524b" + "url": "https://issues.jboss.org/browse/DASHBUILDE-113", + "refsource": "MISC", + "name": "https://issues.jboss.org/browse/DASHBUILDE-113" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1349990", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349990" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349990", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1349990" } ] }