"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-02-13 03:00:49 +00:00
parent 9c570d9205
commit 92bfc69073
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
45 changed files with 2240 additions and 2730 deletions

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-2519 freetype: heap buffer overflow vulnerability when processing certain font files"
"value": "Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Heap-based Buffer Overflow",
"cweId": "CWE-122"
"value": "n/a"
}
]
}
@ -32,27 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 4",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:2.1.9-14.el4.8",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5",
"version": {
"version_data": [
{
"version_value": "0:2.2.1-25.el5_5",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -120,11 +108,6 @@
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-963-1"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0578",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0578"
},
{
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=5ef20c8c1d4de12a84b50ba497c2a358c90ec44b",
"refsource": "MISC",
@ -136,44 +119,14 @@
"name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-2519",
"url": "https://savannah.nongnu.org/bugs/?30306",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-2519"
"name": "https://savannah.nongnu.org/bugs/?30306"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=613194",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=613194"
},
{
"url": "https://savannah.nongnu.org/bugs/?30306",
"refsource": "MISC",
"name": "https://savannah.nongnu.org/bugs/?30306"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.8,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2520",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,67 +27,91 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "USN-963-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-963-1"
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
},
{
"name": "http://support.apple.com/kb/HT4435",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4435"
"url": "http://support.apple.com/kb/HT4435",
"refsource": "MISC",
"name": "http://support.apple.com/kb/HT4435"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=613198",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=613198"
"url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html",
"refsource": "MISC",
"name": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"
},
{
"name": "https://savannah.nongnu.org/bugs/?30361",
"refsource": "CONFIRM",
"url": "https://savannah.nongnu.org/bugs/?30361"
"url": "http://marc.info/?l=oss-security&m=127905701201340&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=127905701201340&w=2"
},
{
"name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b",
"refsource": "CONFIRM",
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b"
"url": "http://marc.info/?l=oss-security&m=127909326909362&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=127909326909362&w=2"
},
{
"name": "[freetype] 20100712 FreeType 2.4.0 has been released",
"refsource": "MLIST",
"url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"
"url": "http://secunia.com/advisories/48951",
"refsource": "MISC",
"name": "http://secunia.com/advisories/48951"
},
{
"name": "APPLE-SA-2010-11-10-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
"url": "http://www.debian.org/security/2010/dsa-2070",
"refsource": "MISC",
"name": "http://www.debian.org/security/2010/dsa-2070"
},
{
"name": "[oss-security] 20100714 Re: Multiple bugs in freetype",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127909326909362&w=2"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"
},
{
"name": "DSA-2070",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2070"
"url": "http://www.ubuntu.com/usn/USN-963-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-963-1"
},
{
"name": "[oss-security] 20100713 Multiple bugs in freetype",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127905701201340&w=2"
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b",
"refsource": "MISC",
"name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b"
},
{
"name": "MDVSA-2010:137",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"
"url": "https://savannah.nongnu.org/bugs/?30361",
"refsource": "MISC",
"name": "https://savannah.nongnu.org/bugs/?30361"
},
{
"name": "48951",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48951"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=613198",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=613198"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-2521 kernel: nfsd4: bug in read_buf"
"value": "Multiple buffer overflows in fs/nfsd/nfs4xdr.c in the XDR implementation in the NFS server in the Linux kernel before 2.6.34-rc6 allow remote attackers to cause a denial of service (panic) or possibly execute arbitrary code via a crafted NFSv4 compound WRITE request, related to the read_buf and nfsd4_decode_compound functions."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"cweId": "CWE-119"
"value": "n/a"
}
]
}
@ -32,60 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "MRG for RHEL-5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:2.6.24.7-161.el5rt",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 4",
"version": {
"version_data": [
{
"version_value": "0:2.6.9-89.0.28.EL",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5",
"version": {
"version_data": [
{
"version_value": "0:2.6.18-194.11.1.el5",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5.3.Z - Server Only",
"version": {
"version_data": [
{
"version_value": "0:2.6.18-128.26.1.el5",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5.4.Z - Server Only",
"version": {
"version_data": [
{
"version_value": "0:2.6.18-164.30.1.el5",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -103,11 +58,6 @@
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0631",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0631"
},
{
"url": "http://secunia.com/advisories/43315",
"refsource": "MISC",
@ -143,11 +93,6 @@
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1000-1"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0610",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0610"
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2bc3c1179c781b359d4f2f3439cb3df72afc17fc",
"refsource": "MISC",
@ -199,59 +144,14 @@
"name": "http://www.vupen.com/english/advisories/2010/3050"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0606",
"url": "https://rhn.redhat.com/errata/RHSA-2010-0606.html",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0606"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0893",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0893"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0907",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0907"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-2521",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-2521"
"name": "https://rhn.redhat.com/errata/RHSA-2010-0606.html"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=612028",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=612028"
},
{
"url": "https://rhn.redhat.com/errata/RHSA-2010-0606.html",
"refsource": "MISC",
"name": "https://rhn.redhat.com/errata/RHSA-2010-0606.html"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 8.3,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "COMPLETE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "COMPLETE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2522",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,42 +27,66 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20100707 Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/07/07/4"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
},
{
"name": "[oss-security] 20100706 patch for remote buffer overflows and local message spoofing in mipv6 daemon",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/07/06/5"
"url": "http://marc.info/?l=oss-security&m=127850299910685&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=127850299910685&w=2"
},
{
"name": "[oss-security] 20100708 Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/07/09/1"
"url": "http://marc.info/?l=oss-security&m=127859390815405&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=127859390815405&w=2"
},
{
"name": "[oss-security] 20100707 Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127850299910685&w=2"
"url": "http://www.openwall.com/lists/oss-security/2010/07/06/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/07/06/5"
},
{
"name": "[oss-security] 20100708 Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127859390815405&w=2"
"url": "http://www.openwall.com/lists/oss-security/2010/07/07/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/07/07/4"
},
{
"name": "SUSE-SR:2010:019",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
"url": "http://www.openwall.com/lists/oss-security/2010/07/09/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/07/09/1"
},
{
"name": "41524",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/41524"
"url": "http://www.securityfocus.com/bid/41524",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/41524"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2523",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,42 +27,66 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20100707 Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/07/07/4"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
},
{
"name": "41522",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/41522"
"url": "http://marc.info/?l=oss-security&m=127850299910685&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=127850299910685&w=2"
},
{
"name": "[oss-security] 20100706 patch for remote buffer overflows and local message spoofing in mipv6 daemon",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/07/06/5"
"url": "http://marc.info/?l=oss-security&m=127859390815405&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=127859390815405&w=2"
},
{
"name": "[oss-security] 20100708 Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/07/09/1"
"url": "http://www.openwall.com/lists/oss-security/2010/07/06/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/07/06/5"
},
{
"name": "[oss-security] 20100707 Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127850299910685&w=2"
"url": "http://www.openwall.com/lists/oss-security/2010/07/07/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/07/07/4"
},
{
"name": "[oss-security] 20100708 Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127859390815405&w=2"
"url": "http://www.openwall.com/lists/oss-security/2010/07/09/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/07/09/1"
},
{
"name": "SUSE-SR:2010:019",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
"url": "http://www.securityfocus.com/bid/41522",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/41522"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2524",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,72 +27,96 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2010:0610",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0610.html"
"url": "http://secunia.com/advisories/43315",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43315"
},
{
"name": "USN-1000-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1000-1"
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
},
{
"name": "[oss-security] 20100802 Re: CVE-2010-2524 kernel: dns_resolver upcall security issue",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=128078387328921&w=2"
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
"refsource": "MISC",
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"name": "SUSE-SA:2010:040",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html"
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35"
"url": "http://www.redhat.com/support/errata/RHSA-2010-0610.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0610.html"
},
{
"name": "43315",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43315"
"url": "http://www.ubuntu.com/usn/USN-1000-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1000-1"
},
{
"name": "[oss-security] 20100802 CVE-2010-2524 kernel: dns_resolver upcall security issue",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=128072090331700&w=2"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:172",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:172"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=612166",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=612166"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4c0c03ca54f72fdd5912516ad0a23ec5cf01bda7",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4c0c03ca54f72fdd5912516ad0a23ec5cf01bda7"
},
{
"name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
"url": "http://marc.info/?l=oss-security&m=128072090331700&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=128072090331700&w=2"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4c0c03ca54f72fdd5912516ad0a23ec5cf01bda7",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4c0c03ca54f72fdd5912516ad0a23ec5cf01bda7"
"url": "http://marc.info/?l=oss-security&m=128078387328921&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=128078387328921&w=2"
},
{
"name": "MDVSA-2010:172",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:172"
"url": "http://marc.info/?l=oss-security&m=128080755321157&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=128080755321157&w=2"
},
{
"name": "[oss-security] 20100803 Re: CVE-2010-2524 kernel: dns_resolver upcall security issue",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=128080755321157&w=2"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=612166",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=612166"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2526",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,62 +27,86 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "USN-1001-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1001-1"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"
},
{
"name": "[linux-lvm] 20100728 lvm2-cluster (clvmd) security fix (Moderate)",
"refsource": "MLIST",
"url": "https://www.redhat.com/archives/linux-lvm/2010-July/msg00083.html"
"url": "http://secunia.com/advisories/40759",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40759"
},
{
"name": "40759",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40759"
"url": "http://securitytracker.com/id?1024258",
"refsource": "MISC",
"name": "http://securitytracker.com/id?1024258"
},
{
"name": "lvm2-socket-privilege-escalation(60809)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60809"
"url": "http://www.osvdb.org/66753",
"refsource": "MISC",
"name": "http://www.osvdb.org/66753"
},
{
"name": "RHSA-2010:0568",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2010-0568.html"
"url": "http://www.ubuntu.com/usn/USN-1001-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1001-1"
},
{
"name": "RHSA-2010:0567",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2010-0567.html"
"url": "http://www.vupen.com/english/advisories/2010/1944",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/1944"
},
{
"name": "1024258",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1024258"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60809",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60809"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=614248",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=614248"
"url": "https://rhn.redhat.com/errata/RHSA-2010-0567.html",
"refsource": "MISC",
"name": "https://rhn.redhat.com/errata/RHSA-2010-0567.html"
},
{
"name": "SUSE-SR:2010:017",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"
"url": "https://rhn.redhat.com/errata/RHSA-2010-0568.html",
"refsource": "MISC",
"name": "https://rhn.redhat.com/errata/RHSA-2010-0568.html"
},
{
"name": "66753",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/66753"
"url": "https://www.redhat.com/archives/linux-lvm/2010-July/msg00083.html",
"refsource": "MISC",
"name": "https://www.redhat.com/archives/linux-lvm/2010-July/msg00083.html"
},
{
"name": "ADV-2010-1944",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1944"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=614248",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=614248"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2527",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,62 +27,86 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "USN-963-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-963-1"
"url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html",
"refsource": "MISC",
"name": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=614557",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=614557"
"url": "http://secunia.com/advisories/48951",
"refsource": "MISC",
"name": "http://secunia.com/advisories/48951"
},
{
"name": "[freetype] 20100712 FreeType 2.4.0 has been released",
"refsource": "MLIST",
"url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"
"url": "http://securitytracker.com/id?1024266",
"refsource": "MISC",
"name": "http://securitytracker.com/id?1024266"
},
{
"name": "DSA-2070",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2070"
"url": "http://www.debian.org/security/2010/dsa-2070",
"refsource": "MISC",
"name": "http://www.debian.org/security/2010/dsa-2070"
},
{
"name": "http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec",
"refsource": "CONFIRM",
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec"
"url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0578.html"
},
{
"name": "1024266",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1024266"
"url": "http://www.ubuntu.com/usn/USN-963-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-963-1"
},
{
"name": "[oss-security] 20100714 Re: Multiple bugs in freetype",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127912955808467&w=2"
"url": "http://www.redhat.com/support/errata/RHSA-2010-0577.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0577.html"
},
{
"name": "RHSA-2010:0578",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html"
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec",
"refsource": "MISC",
"name": "http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec"
},
{
"name": "RHSA-2010:0577",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0577.html"
"url": "http://marc.info/?l=oss-security&m=127912955808467&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=127912955808467&w=2"
},
{
"name": "http://savannah.nongnu.org/bugs/?30054",
"refsource": "CONFIRM",
"url": "http://savannah.nongnu.org/bugs/?30054"
"url": "http://savannah.nongnu.org/bugs/?30054",
"refsource": "MISC",
"name": "http://savannah.nongnu.org/bugs/?30054"
},
{
"name": "48951",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48951"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=614557",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=614557"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2528",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,62 +27,86 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "ADV-2010-1887",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1887"
"url": "http://developer.pidgin.im/viewmtn/revision/diff/fcb70f7c12120206d30ad33223ff85be7b226d1c/with/8e8ff246492e45af8f8d0808296d6f2906794dc0/libpurple/protocols/oscar/family_icbm.c",
"refsource": "MISC",
"name": "http://developer.pidgin.im/viewmtn/revision/diff/fcb70f7c12120206d30ad33223ff85be7b226d1c/with/8e8ff246492e45af8f8d0808296d6f2906794dc0/libpurple/protocols/oscar/family_icbm.c"
},
{
"name": "SSA:2010-240-05",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.462873"
"url": "http://developer.pidgin.im/viewmtn/revision/info/8e8ff246492e45af8f8d0808296d6f2906794dc0",
"refsource": "MISC",
"name": "http://developer.pidgin.im/viewmtn/revision/info/8e8ff246492e45af8f8d0808296d6f2906794dc0"
},
{
"name": "http://developer.pidgin.im/viewmtn/revision/diff/fcb70f7c12120206d30ad33223ff85be7b226d1c/with/8e8ff246492e45af8f8d0808296d6f2906794dc0/libpurple/protocols/oscar/family_icbm.c",
"refsource": "CONFIRM",
"url": "http://developer.pidgin.im/viewmtn/revision/diff/fcb70f7c12120206d30ad33223ff85be7b226d1c/with/8e8ff246492e45af8f8d0808296d6f2906794dc0/libpurple/protocols/oscar/family_icbm.c"
"url": "http://secunia.com/advisories/40699",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40699"
},
{
"name": "oval:org.mitre.oval:def:18359",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18359"
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.462873",
"refsource": "MISC",
"name": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.462873"
},
{
"name": "http://www.pidgin.im/news/security/index.php?id=47",
"refsource": "CONFIRM",
"url": "http://www.pidgin.im/news/security/index.php?id=47"
"url": "http://www.osvdb.org/66506",
"refsource": "MISC",
"name": "http://www.osvdb.org/66506"
},
{
"name": "pidgin-xstatus-dos(60566)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60566"
"url": "http://www.pidgin.im/news/security/index.php?id=47",
"refsource": "MISC",
"name": "http://www.pidgin.im/news/security/index.php?id=47"
},
{
"name": "66506",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/66506"
"url": "http://www.securityfocus.com/bid/41881",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/41881"
},
{
"name": "40699",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40699"
"url": "http://www.vupen.com/english/advisories/2010/1887",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/1887"
},
{
"name": "41881",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/41881"
"url": "http://www.vupen.com/english/advisories/2010/2221",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/2221"
},
{
"name": "ADV-2010-2221",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2221"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60566",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60566"
},
{
"name": "http://developer.pidgin.im/viewmtn/revision/info/8e8ff246492e45af8f8d0808296d6f2906794dc0",
"refsource": "CONFIRM",
"url": "http://developer.pidgin.im/viewmtn/revision/info/8e8ff246492e45af8f8d0808296d6f2906794dc0"
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18359",
"refsource": "MISC",
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18359"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2529",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,22 +27,46 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "MDVSA-2010:138",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:138"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:138",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:138"
},
{
"name": "ADV-2010-1890",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1890"
"url": "http://www.securityfocus.com/bid/41911",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/41911"
},
{
"name": "41911",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/41911"
"url": "http://www.vupen.com/english/advisories/2010/1890",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/1890"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2531",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,107 +27,121 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://support.apple.com/kb/HT4435",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4435"
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
},
{
"name": "HPSBOV02763",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
"url": "http://support.apple.com/kb/HT4435",
"refsource": "MISC",
"name": "http://support.apple.com/kb/HT4435"
},
{
"name": "HPSBMA02662",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=130331363227777&w=2"
"url": "http://marc.info/?l=bugtraq&m=130331363227777&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=bugtraq&m=130331363227777&w=2"
},
{
"name": "[oss-security] 20100716 Re: Re: CVE request, php var_export",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/07/16/3"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"
},
{
"name": "http://svn.php.net/viewvc/php/php-src/trunk/ext/standard/tests/general_functions/var_export_error2.phpt?view=log&pathrev=301143",
"refsource": "CONFIRM",
"url": "http://svn.php.net/viewvc/php/php-src/trunk/ext/standard/tests/general_functions/var_export_error2.phpt?view=log&pathrev=301143"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=617673",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=617673"
"url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
},
{
"name": "DSA-2266",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2266"
"url": "http://secunia.com/advisories/42410",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42410"
},
{
"name": "APPLE-SA-2010-11-10-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
"url": "http://www.redhat.com/support/errata/RHSA-2010-0919.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0919.html"
},
{
"name": "RHSA-2010:0919",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0919.html"
"url": "http://www.vupen.com/english/advisories/2010/3081",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/3081"
},
{
"name": "APPLE-SA-2010-08-24-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html"
"url": "http://www.debian.org/security/2011/dsa-2266",
"refsource": "MISC",
"name": "http://www.debian.org/security/2011/dsa-2266"
},
{
"name": "[oss-security] 20100713 CVE request, php var_export",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/07/13/1"
"url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html"
},
{
"name": "http://www.php.net/archive/2010.php#id2010-07-22-2",
"refsource": "CONFIRM",
"url": "http://www.php.net/archive/2010.php#id2010-07-22-2"
"url": "http://support.apple.com/kb/HT4312",
"refsource": "MISC",
"name": "http://support.apple.com/kb/HT4312"
},
{
"name": "SSRT100826",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
"url": "http://svn.php.net/viewvc/php/php-src/trunk/ext/standard/tests/general_functions/var_export_error2.phpt?view=log&pathrev=301143",
"refsource": "MISC",
"name": "http://svn.php.net/viewvc/php/php-src/trunk/ext/standard/tests/general_functions/var_export_error2.phpt?view=log&pathrev=301143"
},
{
"name": "http://support.apple.com/kb/HT4312",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4312"
"url": "http://www.openwall.com/lists/oss-security/2010/07/13/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/07/13/1"
},
{
"name": "42410",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42410"
"url": "http://www.openwall.com/lists/oss-security/2010/07/16/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/07/16/3"
},
{
"name": "SUSE-SR:2010:017",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"
"url": "http://www.php.net/archive/2010.php#id2010-07-22-1",
"refsource": "MISC",
"name": "http://www.php.net/archive/2010.php#id2010-07-22-1"
},
{
"name": "SSRT100409",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=130331363227777&w=2"
"url": "http://www.php.net/archive/2010.php#id2010-07-22-2",
"refsource": "MISC",
"name": "http://www.php.net/archive/2010.php#id2010-07-22-2"
},
{
"name": "http://www.php.net/archive/2010.php#id2010-07-22-1",
"refsource": "CONFIRM",
"url": "http://www.php.net/archive/2010.php#id2010-07-22-1"
},
{
"name": "SUSE-SR:2010:018",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html"
},
{
"name": "ADV-2010-3081",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3081"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=617673",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=617673"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2534",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,72 +27,96 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "openttd-networksynccommandqueue-dos(60568)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60568"
},
{
"name": "FEDORA-2010-11450",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044565.html"
},
{
"name": "ADV-2010-1888",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1888"
},
{
"name": "http://bugs.openttd.org/task/3909/getfile/6237/loop_fix.patch",
"url": "http://bugs.openttd.org/task/3909",
"refsource": "MISC",
"url": "http://bugs.openttd.org/task/3909/getfile/6237/loop_fix.patch"
"name": "http://bugs.openttd.org/task/3909"
},
{
"name": "http://security.openttd.org/en/CVE-2010-2534",
"refsource": "CONFIRM",
"url": "http://security.openttd.org/en/CVE-2010-2534"
"url": "http://bugs.openttd.org/task/3909/getfile/6237/loop_fix.patch",
"refsource": "MISC",
"name": "http://bugs.openttd.org/task/3909/getfile/6237/loop_fix.patch"
},
{
"name": "[oss-security] 20100720 CVE request for OpenTTD",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/07/20/1"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044516.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044516.html"
},
{
"name": "FEDORA-2010-11401",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044516.html"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044565.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044565.html"
},
{
"name": "http://bugs.openttd.org/task/3909",
"refsource": "CONFIRM",
"url": "http://bugs.openttd.org/task/3909"
"url": "http://osvdb.org/66503",
"refsource": "MISC",
"name": "http://osvdb.org/66503"
},
{
"name": "41804",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/41804"
"url": "http://secunia.com/advisories/40630",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40630"
},
{
"name": "66503",
"refsource": "OSVDB",
"url": "http://osvdb.org/66503"
"url": "http://secunia.com/advisories/40760",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40760"
},
{
"name": "40760",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40760"
"url": "http://security.openttd.org/en/CVE-2010-2534",
"refsource": "MISC",
"name": "http://security.openttd.org/en/CVE-2010-2534"
},
{
"name": "40630",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40630"
"url": "http://www.openwall.com/lists/oss-security/2010/07/20/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/07/20/1"
},
{
"name": "ADV-2010-1916",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1916"
"url": "http://www.securityfocus.com/bid/41804",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/41804"
},
{
"url": "http://www.vupen.com/english/advisories/2010/1888",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/1888"
},
{
"url": "http://www.vupen.com/english/advisories/2010/1916",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/1916"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60568",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60568"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2536",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,42 +27,66 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20100721 Re: Universal XSS in Rekonq",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127973502617945&w=2"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049406.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049406.html"
},
{
"name": "40646",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40646"
"url": "http://marc.info/?l=oss-security&m=127971194610788&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=127971194610788&w=2"
},
{
"name": "66568",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/66568"
"url": "http://marc.info/?l=oss-security&m=127973502617945&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=127973502617945&w=2"
},
{
"name": "ADV-2010-2689",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2689"
"url": "http://secunia.com/advisories/40646",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40646"
},
{
"name": "[oss-security] 20100721 Universal XSS in Rekonq",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127971194610788&w=2"
"url": "http://www.osvdb.org/66568",
"refsource": "MISC",
"name": "http://www.osvdb.org/66568"
},
{
"name": "https://bugs.kde.org/show_bug.cgi?id=217464",
"refsource": "CONFIRM",
"url": "https://bugs.kde.org/show_bug.cgi?id=217464"
"url": "http://www.vupen.com/english/advisories/2010/2689",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/2689"
},
{
"name": "FEDORA-2010-15874",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049406.html"
"url": "https://bugs.kde.org/show_bug.cgi?id=217464",
"refsource": "MISC",
"name": "https://bugs.kde.org/show_bug.cgi?id=217464"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2537",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,57 +27,81 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "USN-1041-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1041-1"
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35"
},
{
"name": "[oss-security] 20100721 Re: CVE request: kernel: btrfs",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/07/21/10"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html"
},
{
"name": "SUSE-SA:2010:040",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html"
"url": "http://secunia.com/advisories/42758",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42758"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35"
"url": "http://www.ubuntu.com/usn/USN-1041-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1041-1"
},
{
"name": "42758",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42758"
"url": "http://www.vupen.com/english/advisories/2011/0070",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0070"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=616998",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=616998"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2ebc3464781ad24474abcbd2274e6254689853b5",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2ebc3464781ad24474abcbd2274e6254689853b5"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2ebc3464781ad24474abcbd2274e6254689853b5",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2ebc3464781ad24474abcbd2274e6254689853b5"
"url": "http://www.openwall.com/lists/oss-security/2010/07/21/10",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/07/21/10"
},
{
"name": "ADV-2011-0070",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0070"
"url": "http://www.openwall.com/lists/oss-security/2010/07/21/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/07/21/4"
},
{
"name": "[oss-security] 20100721 CVE request: kernel: btrfs",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/07/21/4"
"url": "http://www.securityfocus.com/bid/41847",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/41847"
},
{
"name": "41847",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/41847"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=616998",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=616998"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-4643 OpenOffice.org: heap based buffer overflow when parsing TGA files"
"value": "Heap-based buffer overflow in Impress in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Truevision TGA (TARGA) file in an ODF or Microsoft Office document."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Heap-based Buffer Overflow",
"cweId": "CWE-122"
"value": "n/a"
}
]
}
@ -32,42 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 4",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:1.1.5-10.7.el4_8.10",
"version_affected": "!"
},
{
"version_value": "1:2.0.4-5.7.0.6.1.el4_8.8",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5",
"version": {
"version_data": [
{
"version_value": "1:3.1.1-19.5.el5_5.6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "1:3.2.1-19.6.el6_0.5",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -170,21 +143,6 @@
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0232"
},
{
"url": "https://access.redhat.com/errata/RHSA-2011:0181",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0181"
},
{
"url": "https://access.redhat.com/errata/RHSA-2011:0182",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0182"
},
{
"url": "https://access.redhat.com/errata/RHSA-2011:0183",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0183"
},
{
"url": "http://osvdb.org/70718",
"refsource": "MISC",
@ -196,44 +154,14 @@
"name": "http://www.openoffice.org/security/cves/CVE-2010-4643.html"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-4643",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65441",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-4643"
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65441"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=667588",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=667588"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65441",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65441"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.8,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4644",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,142 +27,166 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20110104 Re: CVE request for subversion",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/01/04/8"
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
},
{
"name": "ADV-2011-0103",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0103"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053230.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053230.html"
},
{
"name": "subversion-blameg-dos(64473)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64473"
"url": "http://mail-archives.apache.org/mod_mbox/subversion-users/201011.mbox/%3C4CD33B61.7030203%40thepond.com%3E",
"refsource": "MISC",
"name": "http://mail-archives.apache.org/mod_mbox/subversion-users/201011.mbox/%3C4CD33B61.7030203%40thepond.com%3E"
},
{
"name": "42969",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42969"
"url": "http://mail-archives.apache.org/mod_mbox/www-announce/201011.mbox/%3CAANLkTi=5+NOi-Cp=fKCx6mAW-TofFVW=ikEQkXgQB8Bt%40mail.gmail.com%3E",
"refsource": "MISC",
"name": "http://mail-archives.apache.org/mod_mbox/www-announce/201011.mbox/%3CAANLkTi=5+NOi-Cp=fKCx6mAW-TofFVW=ikEQkXgQB8Bt%40mail.gmail.com%3E"
},
{
"name": "[dev] 20101104 \"svn blame -g\" causing svnserve to hang & mem usage to hit 2GB",
"refsource": "MLIST",
"url": "http://svn.haxx.se/dev/archive-2010-11/0102.shtml"
"url": "http://openwall.com/lists/oss-security/2011/01/02/1",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/01/02/1"
},
{
"name": "ADV-2011-0264",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0264"
"url": "http://openwall.com/lists/oss-security/2011/01/04/10",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/01/04/10"
},
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=1032808",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1032808"
"url": "http://openwall.com/lists/oss-security/2011/01/04/8",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/01/04/8"
},
{
"name": "42780",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42780"
"url": "http://openwall.com/lists/oss-security/2011/01/05/4",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/01/05/4"
},
{
"name": "http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES"
"url": "http://secunia.com/advisories/42780",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42780"
},
{
"name": "[oss-security] 20110105 Re: CVE request for subversion",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/01/05/4"
"url": "http://secunia.com/advisories/42969",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42969"
},
{
"name": "SUSE-SR:2011:005",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
"url": "http://secunia.com/advisories/43115",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43115"
},
{
"name": "43346",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43346"
"url": "http://secunia.com/advisories/43139",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43139"
},
{
"name": "43115",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43115"
"url": "http://secunia.com/advisories/43346",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43346"
},
{
"name": "FEDORA-2011-0099",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053230.html"
"url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES",
"refsource": "MISC",
"name": "http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES"
},
{
"name": "ADV-2011-0015",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0015"
"url": "http://svn.apache.org/viewvc?view=revision&revision=1032808",
"refsource": "MISC",
"name": "http://svn.apache.org/viewvc?view=revision&revision=1032808"
},
{
"name": "[oss-security] 20110102 CVE request for subversion",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/01/02/1"
"url": "http://svn.haxx.se/dev/archive-2010-11/0102.shtml",
"refsource": "MISC",
"name": "http://svn.haxx.se/dev/archive-2010-11/0102.shtml"
},
{
"name": "[www-announce] 20101124 Apache Subversion 1.6.15 Released",
"refsource": "MLIST",
"url": "http://mail-archives.apache.org/mod_mbox/www-announce/201011.mbox/%3CAANLkTi=5+NOi-Cp=fKCx6mAW-TofFVW=ikEQkXgQB8Bt@mail.gmail.com%3E"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:006",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:006"
},
{
"name": "RHSA-2011:0258",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0258.html"
"url": "http://www.redhat.com/support/errata/RHSA-2011-0257.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0257.html"
},
{
"name": "RHSA-2011:0257",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0257.html"
"url": "http://www.redhat.com/support/errata/RHSA-2011-0258.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0258.html"
},
{
"name": "[subversion-users] 20101104 svnserve.exe (Win32) using 2GB of memory and then crashing?",
"refsource": "MLIST",
"url": "http://mail-archives.apache.org/mod_mbox/subversion-users/201011.mbox/%3C4CD33B61.7030203@thepond.com%3E"
"url": "http://www.securityfocus.com/bid/45655",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45655"
},
{
"name": "MDVSA-2011:006",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:006"
"url": "http://www.securitytracker.com/id?1024935",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1024935"
},
{
"name": "[oss-security] 20110104 Re: CVE request for subversion",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/01/04/10"
"url": "http://www.ubuntu.com/usn/USN-1053-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1053-1"
},
{
"name": "USN-1053-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1053-1"
"url": "http://www.vupen.com/english/advisories/2011/0015",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0015"
},
{
"name": "45655",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45655"
"url": "http://www.vupen.com/english/advisories/2011/0103",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0103"
},
{
"name": "43139",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43139"
"url": "http://www.vupen.com/english/advisories/2011/0162",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0162"
},
{
"name": "1024935",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024935"
"url": "http://www.vupen.com/english/advisories/2011/0264",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0264"
},
{
"name": "ADV-2011-0162",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0162"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64473",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64473"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4645",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,152 +27,166 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "ADV-2011-0077",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0077"
},
{
"name": "45668",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45668"
},
{
"name": "HPSBMU02752",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133226187115472&w=2"
},
{
"name": "SSRT100802",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133226187115472&w=2"
},
{
"name": "42812",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42812"
},
{
"name": "HPSBOV02763",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
},
{
"name": "RHSA-2011:0196",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0196.html"
},
{
"name": "FEDORA-2011-0321",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053355.html"
},
{
"name": "[oss-security] 20110105 Re: possible flaw in widely used strtod.c implementation",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/01/05/8"
},
{
"name": "RHSA-2011:0195",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0195.html"
},
{
"name": "http://bugs.php.net/53632",
"refsource": "CONFIRM",
"url": "http://bugs.php.net/53632"
},
{
"name": "http://hal.archives-ouvertes.fr/docs/00/28/14/29/PDF/floating-point-article.pdf",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html",
"refsource": "MISC",
"url": "http://hal.archives-ouvertes.fr/docs/00/28/14/29/PDF/floating-point-article.pdf"
"name": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"name": "http://www.exploringbinary.com/php-hangs-on-numeric-value-2-2250738585072011e-308/",
"url": "http://support.apple.com/kb/HT5002",
"refsource": "MISC",
"url": "http://www.exploringbinary.com/php-hangs-on-numeric-value-2-2250738585072011e-308/"
"name": "http://support.apple.com/kb/HT5002"
},
{
"name": "ADV-2011-0198",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0198"
},
{
"name": "SSA:2011-010-01",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.484686"
},
{
"name": "ADV-2011-0066",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0066"
},
{
"name": "USN-1042-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1042-1"
},
{
"name": "SSRT100826",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
},
{
"name": "APPLE-SA-2011-10-12-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"name": "FEDORA-2011-0329",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053333.html"
},
{
"name": "42843",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42843"
},
{
"name": "ADV-2011-0060",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0060"
},
{
"name": "http://support.apple.com/kb/HT5002",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5002"
},
{
"name": "php-zendstrtod-dos(64470)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64470"
},
{
"name": "43189",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43189"
},
{
"name": "43051",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43051"
},
{
"name": "[oss-security] 20110105 possible flaw in widely used strtod.c implementation",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/01/05/2"
},
{
"name": "http://svn.php.net/viewvc/php/php-src/branches/PHP_5_2/Zend/zend_strtod.c?r1=266327&r2=307095&pathrev=307095",
"url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2",
"refsource": "MISC",
"url": "http://svn.php.net/viewvc/php/php-src/branches/PHP_5_2/Zend/zend_strtod.c?r1=266327&r2=307095&pathrev=307095"
"name": "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
},
{
"name": "[oss-security] 20110106 Re: possible flaw in widely used strtod.c implementation",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/01/06/5"
"url": "http://secunia.com/advisories/42812",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42812"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2011-0195.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0195.html"
},
{
"url": "http://www.ubuntu.com/usn/USN-1042-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1042-1"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0077",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0077"
},
{
"url": "http://secunia.com/advisories/43189",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43189"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2011-0196.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0196.html"
},
{
"url": "http://marc.info/?l=bugtraq&m=133226187115472&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=bugtraq&m=133226187115472&w=2"
},
{
"url": "http://bugs.php.net/53632",
"refsource": "MISC",
"name": "http://bugs.php.net/53632"
},
{
"url": "http://hal.archives-ouvertes.fr/docs/00/28/14/29/PDF/floating-point-article.pdf",
"refsource": "MISC",
"name": "http://hal.archives-ouvertes.fr/docs/00/28/14/29/PDF/floating-point-article.pdf"
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053333.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053333.html"
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053355.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053355.html"
},
{
"url": "http://secunia.com/advisories/42843",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42843"
},
{
"url": "http://secunia.com/advisories/43051",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43051"
},
{
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.484686",
"refsource": "MISC",
"name": "http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.484686"
},
{
"url": "http://svn.php.net/viewvc/php/php-src/branches/PHP_5_2/Zend/zend_strtod.c?r1=266327&r2=307095&pathrev=307095",
"refsource": "MISC",
"name": "http://svn.php.net/viewvc/php/php-src/branches/PHP_5_2/Zend/zend_strtod.c?r1=266327&r2=307095&pathrev=307095"
},
{
"url": "http://www.exploringbinary.com/php-hangs-on-numeric-value-2-2250738585072011e-308/",
"refsource": "MISC",
"name": "http://www.exploringbinary.com/php-hangs-on-numeric-value-2-2250738585072011e-308/"
},
{
"url": "http://www.openwall.com/lists/oss-security/2011/01/05/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/01/05/2"
},
{
"url": "http://www.openwall.com/lists/oss-security/2011/01/05/8",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/01/05/8"
},
{
"url": "http://www.openwall.com/lists/oss-security/2011/01/06/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/01/06/5"
},
{
"url": "http://www.securityfocus.com/bid/45668",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45668"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0060",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0060"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0066",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0066"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0198",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0198"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64470",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64470"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-4647 eclipse: Help Content web application vulnerable to multiple XSS"
"value": "Multiple cross-site scripting (XSS) vulnerabilities in the Help Contents web application (aka the Help Server) in Eclipse IDE before 3.6.2 allow remote attackers to inject arbitrary web script or HTML via the query string to (1) help/index.jsp or (2) help/advanced/content.jsp."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
"cweId": "CWE-79"
"value": "n/a"
}
]
}
@ -32,68 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 6",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "1:3.6.1-6.13.el6",
"version_affected": "!"
},
{
"version_value": "0:2.6.0-1.1.el6",
"version_affected": "!"
},
{
"version_value": "0:0.6.1-1.el6",
"version_affected": "!"
},
{
"version_value": "1:7.0.1-4.el6",
"version_affected": "!"
},
{
"version_value": "1:2.7.0-1.el6",
"version_affected": "!"
},
{
"version_value": "0:1.8.1-1.1.el6",
"version_affected": "!"
},
{
"version_value": "0:2.6.0-1.el6",
"version_affected": "!"
},
{
"version_value": "0:3.6.1-3.el6",
"version_affected": "!"
},
{
"version_value": "0:3.4.2-9.el6",
"version_affected": "!"
},
{
"version_value": "0:3.2-1.el6",
"version_affected": "!"
},
{
"version_value": "1:4.2.1-5.el6",
"version_affected": "!"
},
{
"version_value": "0:6.1.24-2.el6",
"version_affected": "!"
},
{
"version_value": "0:3.2-2.1.el6",
"version_affected": "!"
},
{
"version_value": "0:2.2.0-4.0.el6",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -141,56 +88,16 @@
"refsource": "MISC",
"name": "http://yehg.net/lab/pr0js/advisories/eclipse/%5Beclipse_help_server%5D_cross_site_scripting"
},
{
"url": "https://access.redhat.com/errata/RHSA-2011:0568",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0568"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-4647",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-4647"
},
{
"url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=329582",
"refsource": "MISC",
"name": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=329582"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=661901",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=661901"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64833",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64833"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 2.6,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
}
]
}
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4648",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,32 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20110106 Re: CVE Request: kernel [Re: Security review of 2.6.32.28]",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/01/06/18"
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37",
"refsource": "MISC",
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=667907",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=667907"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0a54917c3fc295cb61f3fb52373c173fd3b69f48",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0a54917c3fc295cb61f3fb52373c173fd3b69f48"
},
{
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37",
"refsource": "CONFIRM",
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37"
"url": "http://www.openwall.com/lists/oss-security/2011/01/06/18",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/01/06/18"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=0a54917c3fc295cb61f3fb52373c173fd3b69f48",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=0a54917c3fc295cb61f3fb52373c173fd3b69f48"
"url": "https://github.com/torvalds/linux/commit/0a54917c3fc295cb61f3fb52373c173fd3b69f48",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/0a54917c3fc295cb61f3fb52373c173fd3b69f48"
},
{
"name": "https://github.com/torvalds/linux/commit/0a54917c3fc295cb61f3fb52373c173fd3b69f48",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/0a54917c3fc295cb61f3fb52373c173fd3b69f48"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=667907",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=667907"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4649",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,32 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "46073",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46073"
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37"
},
{
"name": "RHSA-2011:0927",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html"
"url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2011-0927.html"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7182afea8d1afd432a17c18162cc3fd441d0da93",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7182afea8d1afd432a17c18162cc3fd441d0da93"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37"
"url": "http://www.securityfocus.com/bid/46073",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/46073"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=667916",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=667916"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=667916",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=667916"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4650",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,32 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20110106 Re: CVE Request: kernel [Re: Security review of 2.6.32.28]",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/01/06/18"
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37",
"refsource": "MISC",
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37"
},
{
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37",
"refsource": "CONFIRM",
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37"
"url": "http://www.openwall.com/lists/oss-security/2011/01/06/18",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/01/06/18"
},
{
"name": "https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7572777eef78ebdee1ecb7c258c0ef94d35bad16",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7572777eef78ebdee1ecb7c258c0ef94d35bad16"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7572777eef78ebdee1ecb7c258c0ef94d35bad16",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7572777eef78ebdee1ecb7c258c0ef94d35bad16"
"url": "https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=667892",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=667892"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=667892",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=667892"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4651",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,82 +27,106 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "ADV-2011-0600",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0600"
"url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
},
{
"name": "http://support.apple.com/kb/HT4723",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4723"
"url": "http://support.apple.com/kb/HT4723",
"refsource": "MISC",
"name": "http://support.apple.com/kb/HT4723"
},
{
"name": "[oss-security] 20110106 Re: CVE request: patch directory traversal flaw",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/01/06/20"
"url": "http://git.savannah.gnu.org/cgit/patch.git/commit/?id=685a78b6052f4df6eac6d625a545cfb54a6ac0e1",
"refsource": "MISC",
"name": "http://git.savannah.gnu.org/cgit/patch.git/commit/?id=685a78b6052f4df6eac6d625a545cfb54a6ac0e1"
},
{
"name": "46768",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46768"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055241.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055241.html"
},
{
"name": "APPLE-SA-2011-06-23-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055246.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055246.html"
},
{
"name": "[oss-security] 20110106 Re: CVE request: patch directory traversal flaw",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/01/06/21"
"url": "http://lists.gnu.org/archive/html/bug-patch/2010-12/msg00000.html",
"refsource": "MISC",
"name": "http://lists.gnu.org/archive/html/bug-patch/2010-12/msg00000.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=667529",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=667529"
"url": "http://openwall.com/lists/oss-security/2011/01/05/10",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/01/05/10"
},
{
"name": "FEDORA-2011-1269",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055246.html"
"url": "http://openwall.com/lists/oss-security/2011/01/06/19",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/01/06/19"
},
{
"name": "[oss-security] 20110106 Re: CVE request: patch directory traversal flaw",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/01/06/19"
"url": "http://openwall.com/lists/oss-security/2011/01/06/20",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/01/06/20"
},
{
"name": "http://git.savannah.gnu.org/cgit/patch.git/commit/?id=685a78b6052f4df6eac6d625a545cfb54a6ac0e1",
"refsource": "CONFIRM",
"url": "http://git.savannah.gnu.org/cgit/patch.git/commit/?id=685a78b6052f4df6eac6d625a545cfb54a6ac0e1"
"url": "http://openwall.com/lists/oss-security/2011/01/06/21",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/01/06/21"
},
{
"name": "43677",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43677"
"url": "http://secunia.com/advisories/43663",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43663"
},
{
"name": "FEDORA-2011-1272",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055241.html"
"url": "http://secunia.com/advisories/43677",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43677"
},
{
"name": "[oss-security] 20110105 CVE request: patch directory traversal flaw",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/01/05/10"
"url": "http://www.securityfocus.com/bid/46768",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/46768"
},
{
"name": "[bug-patch] 20101230 Directory traversal vulnerability in patch (or dpkg-source) (fwd)",
"refsource": "MLIST",
"url": "http://lists.gnu.org/archive/html/bug-patch/2010-12/msg00000.html"
"url": "http://www.vupen.com/english/advisories/2011/0600",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0600"
},
{
"name": "43663",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43663"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=667529",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=667529"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4652",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,62 +27,86 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "FEDORA-2011-0610",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053540.html"
},
{
"name": "FEDORA-2011-0613",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053537.html"
},
{
"name": "DSA-2191",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2191"
},
{
"name": "http://proftpd.org/docs/RELEASE_NOTES-1.3.3d",
"refsource": "CONFIRM",
"url": "http://proftpd.org/docs/RELEASE_NOTES-1.3.3d"
},
{
"name": "ADV-2011-0248",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0248"
},
{
"name": "MDVSA-2011:023",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:023"
},
{
"name": "http://bugs.proftpd.org/show_bug.cgi?id=3536",
"url": "http://www.debian.org/security/2011/dsa-2191",
"refsource": "MISC",
"url": "http://bugs.proftpd.org/show_bug.cgi?id=3536"
"name": "http://www.debian.org/security/2011/dsa-2191"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=670170",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=670170"
},
{
"name": "44933",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/44933"
},
{
"name": "ADV-2011-0331",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0331"
},
{
"name": "http://phrack.org/issues.html?issue=67&id=7#article",
"url": "http://bugs.proftpd.org/show_bug.cgi?id=3536",
"refsource": "MISC",
"url": "http://phrack.org/issues.html?issue=67&id=7#article"
"name": "http://bugs.proftpd.org/show_bug.cgi?id=3536"
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053537.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053537.html"
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053540.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053540.html"
},
{
"url": "http://phrack.org/issues.html?issue=67&id=7#article",
"refsource": "MISC",
"name": "http://phrack.org/issues.html?issue=67&id=7#article"
},
{
"url": "http://proftpd.org/docs/RELEASE_NOTES-1.3.3d",
"refsource": "MISC",
"name": "http://proftpd.org/docs/RELEASE_NOTES-1.3.3d"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:023",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:023"
},
{
"url": "http://www.securityfocus.com/bid/44933",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/44933"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0248",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0248"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0331",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0331"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=670170",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=670170"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-4653 xpdf: integer overflow in CharCodeToUnicode::addMapping"
"value": "An integer overflow condition in poppler before 0.16.3 can occur when parsing CharCodes for fonts."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Integer Overflow or Wraparound",
"cweId": "CWE-190"
"value": "Integer Overflow"
}
]
}
@ -40,8 +39,8 @@
"version": {
"version_data": [
{
"version_value": "before 0.16.3",
"version_affected": "="
"version_affected": "=",
"version_value": "before 0.16.3"
}
]
}
@ -64,21 +63,11 @@
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45948"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-4653",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-4653"
},
{
"url": "https://access.redhat.com/security/cve/cve-2010-4653",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2010-4653"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=672165",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=672165"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4653",
"refsource": "MISC",
@ -90,30 +79,5 @@
"name": "https://security-tracker.debian.org/tracker/CVE-2010-4653"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.1,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4654",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "poppler",
"product": {
"product_data": [
{
"product_name": "poppler",
"version": {
"version_data": [
{
"version_value": "before 0.16.3"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,17 +27,36 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "poppler",
"product": {
"product_data": [
{
"product_name": "poppler",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "before 0.16.3"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://security-tracker.debian.org/tracker/CVE-2010-4654",
"url": "http://security.gentoo.org/glsa/glsa-201310-03.xml",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2010-4654"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4654",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4654"
"name": "http://security.gentoo.org/glsa/glsa-201310-03.xml"
},
{
"url": "https://access.redhat.com/security/cve/cve-2010-4654",
@ -68,9 +64,14 @@
"name": "https://access.redhat.com/security/cve/cve-2010-4654"
},
{
"url": "http://security.gentoo.org/glsa/glsa-201310-03.xml",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4654",
"refsource": "MISC",
"name": "http://security.gentoo.org/glsa/glsa-201310-03.xml"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4654"
},
{
"url": "https://security-tracker.debian.org/tracker/CVE-2010-4654",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2010-4654"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4655",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,77 +27,101 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "USN-1146-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1146-1"
"url": "http://secunia.com/advisories/46397",
"refsource": "MISC",
"name": "http://secunia.com/advisories/46397"
},
{
"name": "45972",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45972"
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"name": "[oss-security] 20110124 CVE request: linux kernel heap issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/01/24/9"
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "MISC",
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b00916b189d13a615ff05c9242201135992fcda3",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b00916b189d13a615ff05c9242201135992fcda3"
},
{
"name": "46397",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46397"
"url": "http://openwall.com/lists/oss-security/2011/01/24/9",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/01/24/9"
},
{
"name": "[oss-security] 20110125 Re: CVE request: linux kernel heap issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/01/25/4"
"url": "http://openwall.com/lists/oss-security/2011/01/25/3",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/01/25/3"
},
{
"name": "[oss-security] 20110124 Re: CVE request: linux kernel heap issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/01/25/3"
"url": "http://openwall.com/lists/oss-security/2011/01/25/4",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/01/25/4"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
"url": "http://openwall.com/lists/oss-security/2011/01/25/5",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/01/25/5"
},
{
"name": "[oss-security] 20110125 Re: CVE request: linux kernel heap issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/01/25/5"
"url": "http://openwall.com/lists/oss-security/2011/01/28/1",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/01/28/1"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b00916b189d13a615ff05c9242201135992fcda3",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b00916b189d13a615ff05c9242201135992fcda3"
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36"
"url": "http://www.securityfocus.com/bid/45972",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45972"
},
{
"name": "[oss-security] 20110128 Re: CVE request: linux kernel heap issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/01/28/1"
"url": "http://www.ubuntu.com/usn/USN-1146-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1146-1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=672428",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=672428"
"url": "https://lkml.org/lkml/2010/10/7/297",
"refsource": "MISC",
"name": "https://lkml.org/lkml/2010/10/7/297"
},
{
"name": "[linux-kernel] 20101007 [PATCH] net: clear heap allocations for privileged ethtool actions",
"refsource": "MLIST",
"url": "https://lkml.org/lkml/2010/10/7/297"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=672428",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=672428"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4656",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,47 +27,71 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "USN-1146-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1146-1"
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=672420",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=672420"
"url": "http://openwall.com/lists/oss-security/2011/01/24/9",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/01/24/9"
},
{
"name": "[oss-security] 20110124 CVE request: linux kernel heap issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/01/24/9"
"url": "http://openwall.com/lists/oss-security/2011/01/25/3",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/01/25/3"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3ed780117dbe5acb64280d218f0347f238dafed0",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3ed780117dbe5acb64280d218f0347f238dafed0"
"url": "http://openwall.com/lists/oss-security/2011/01/25/4",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/01/25/4"
},
{
"name": "[oss-security] 20110125 Re: CVE request: linux kernel heap issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/01/25/4"
"url": "http://www.ubuntu.com/usn/USN-1146-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1146-1"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3ed780117dbe5acb64280d218f0347f238dafed0",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3ed780117dbe5acb64280d218f0347f238dafed0"
},
{
"name": "[oss-security] 20110124 Re: CVE request: linux kernel heap issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/01/25/3"
"url": "http://www.securityfocus.com/bid/46069",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/46069"
},
{
"name": "46069",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46069"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=672420",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=672420"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4657",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "php5",
"product": {
"product_data": [
{
"product_name": "php5",
"version": {
"version_data": [
{
"version_value": "before 5.4.4"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,12 +27,41 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "php5",
"product": {
"product_data": [
{
"product_name": "php5",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "before 5.4.4"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://security-tracker.debian.org/tracker/CVE-2010-4657",
"url": "https://access.redhat.com/security/cve/cve-2010-4657",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2010-4657"
"name": "https://access.redhat.com/security/cve/cve-2010-4657"
},
{
"url": "https://bugs.launchpad.net/php/%2Bbug/655442",
"refsource": "MISC",
"name": "https://bugs.launchpad.net/php/%2Bbug/655442"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4657",
@ -63,14 +69,9 @@
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4657"
},
{
"url": "https://access.redhat.com/security/cve/cve-2010-4657",
"url": "https://security-tracker.debian.org/tracker/CVE-2010-4657",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2010-4657"
},
{
"refsource": "MISC",
"name": "https://bugs.launchpad.net/php/%2Bbug/655442",
"url": "https://bugs.launchpad.net/php/%2Bbug/655442"
"name": "https://security-tracker.debian.org/tracker/CVE-2010-4657"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4609",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,12 +27,36 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=767299",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=767299"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=767299",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=767299"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4610",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,52 +27,76 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "51829",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/51829"
"url": "http://rhn.redhat.com/errata/RHSA-2012-0074.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-0074.html"
},
{
"name": "RHSA-2012:0325",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0325.html"
"url": "http://rhn.redhat.com/errata/RHSA-2012-0075.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-0075.html"
},
{
"name": "RHSA-2012:0078",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0078.html"
"url": "http://rhn.redhat.com/errata/RHSA-2012-0076.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-0076.html"
},
{
"name": "RHSA-2012:0075",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0075.html"
"url": "http://rhn.redhat.com/errata/RHSA-2012-0077.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-0077.html"
},
{
"name": "RHSA-2012:0074",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0074.html"
"url": "http://rhn.redhat.com/errata/RHSA-2012-0078.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-0078.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=767871",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=767871"
"url": "http://rhn.redhat.com/errata/RHSA-2012-0325.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-0325.html"
},
{
"name": "78775",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/78775"
"url": "http://www.osvdb.org/78775",
"refsource": "MISC",
"name": "http://www.osvdb.org/78775"
},
{
"name": "RHSA-2012:0076",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0076.html"
"url": "http://www.securityfocus.com/bid/51829",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/51829"
},
{
"name": "RHSA-2012:0077",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0077.html"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=767871",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=767871"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4611",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,32 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20111215 Re: CVE request - kernel: perf, powerpc: Handle events that raise an exception without overflowing",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/12/15/2"
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39",
"refsource": "MISC",
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"
},
{
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39",
"refsource": "CONFIRM",
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0837e3242c73566fc1c0196b4ec61779c25ffc93",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0837e3242c73566fc1c0196b4ec61779c25ffc93"
},
{
"name": "https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93"
"url": "http://www.openwall.com/lists/oss-security/2011/12/15/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/12/15/2"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=0837e3242c73566fc1c0196b4ec61779c25ffc93",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=0837e3242c73566fc1c0196b4ec61779c25ffc93"
"url": "https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=767914",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=767914"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=767914",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=767914"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4619",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,142 +27,141 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "48528",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48528"
"url": "http://secunia.com/advisories/57353",
"refsource": "MISC",
"name": "http://secunia.com/advisories/57353"
},
{
"name": "HPSBMU02786",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564",
"refsource": "MISC",
"name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564"
"url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
},
{
"name": "openSUSE-SU-2012:0083",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00017.html"
"url": "http://support.apple.com/kb/HT5784",
"refsource": "MISC",
"name": "http://support.apple.com/kb/HT5784"
},
{
"name": "MDVSA-2012:006",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:006"
"url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc",
"refsource": "MISC",
"name": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc"
},
{
"name": "FEDORA-2012-18035",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html"
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041",
"refsource": "MISC",
"name": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
},
{
"name": "http://www.openssl.org/news/secadv_20120104.txt",
"refsource": "CONFIRM",
"url": "http://www.openssl.org/news/secadv_20120104.txt"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html"
},
{
"name": "SUSE-SU-2012:0084",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00018.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00017.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00017.html"
},
{
"name": "RHSA-2012:1308",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1308.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00018.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00018.html"
},
{
"name": "RHSA-2012:1307",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1307.html"
"url": "http://marc.info/?l=bugtraq&m=132750648501816&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=bugtraq&m=132750648501816&w=2"
},
{
"name": "http://support.apple.com/kb/HT5784",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5784"
"url": "http://marc.info/?l=bugtraq&m=133951357207000&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=bugtraq&m=133951357207000&w=2"
},
{
"name": "APPLE-SA-2013-06-04-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
"url": "http://marc.info/?l=bugtraq&m=134039053214295&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=bugtraq&m=134039053214295&w=2"
},
{
"name": "VU#737740",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/737740"
"url": "http://rhn.redhat.com/errata/RHSA-2012-1306.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-1306.html"
},
{
"name": "HPSBUX02734",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=132750648501816&w=2"
"url": "http://rhn.redhat.com/errata/RHSA-2012-1307.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-1307.html"
},
{
"name": "MDVSA-2012:007",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:007"
"url": "http://rhn.redhat.com/errata/RHSA-2012-1308.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-1308.html"
},
{
"name": "RHSA-2012:1306",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1306.html"
"url": "http://secunia.com/advisories/48528",
"refsource": "MISC",
"name": "http://secunia.com/advisories/48528"
},
{
"name": "HPSBOV02793",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=134039053214295&w=2"
"url": "http://www.debian.org/security/2012/dsa-2390",
"refsource": "MISC",
"name": "http://www.debian.org/security/2012/dsa-2390"
},
{
"name": "57353",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/57353"
"url": "http://www.kb.cert.org/vuls/id/737740",
"refsource": "MISC",
"name": "http://www.kb.cert.org/vuls/id/737740"
},
{
"name": "HPSBUX02782",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133728068926468&w=2"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:006",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:006"
},
{
"name": "SSRT100891",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=134039053214295&w=2"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:007",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:007"
},
{
"name": "SSRT100852",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133951357207000&w=2"
"url": "http://www.openssl.org/news/secadv_20120104.txt",
"refsource": "MISC",
"name": "http://www.openssl.org/news/secadv_20120104.txt"
},
{
"name": "SSRT100729",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=132750648501816&w=2"
},
{
"name": "SSRT100877",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
},
{
"name": "DSA-2390",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2390"
},
{
"name": "HPSBMU02776",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133951357207000&w=2"
},
{
"name": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc",
"refsource": "CONFIRM",
"url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc"
},
{
"name": "SSRT100844",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133728068926468&w=2"
"url": "http://marc.info/?l=bugtraq&m=133728068926468&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=bugtraq&m=133728068926468&w=2"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4620",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,47 +27,71 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "51340",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51340"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00013.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00013.html"
},
{
"name": "47297",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/47297"
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00015.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00015.html"
},
{
"name": "18258",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/18258/"
"url": "http://openwall.com/lists/oss-security/2011/12/21/2",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/12/21/2"
},
{
"name": "GLSA-201606-16",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201606-16"
"url": "http://osvdb.org/77973",
"refsource": "MISC",
"name": "http://osvdb.org/77973"
},
{
"name": "77973",
"refsource": "OSVDB",
"url": "http://osvdb.org/77973"
"url": "http://secunia.com/advisories/47297",
"refsource": "MISC",
"name": "http://secunia.com/advisories/47297"
},
{
"name": "openSUSE-SU-2012:1506",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00013.html"
"url": "http://secunia.com/advisories/51340",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51340"
},
{
"name": "[oss-security] 20111221 plib ulSetError() buffer overflow - CVE-2011-4620",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/12/21/2"
"url": "http://www.exploit-db.com/exploits/18258/",
"refsource": "MISC",
"name": "http://www.exploit-db.com/exploits/18258/"
},
{
"name": "openSUSE-SU-2013:0146",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00015.html"
"url": "https://security.gentoo.org/glsa/201606-16",
"refsource": "MISC",
"name": "https://security.gentoo.org/glsa/201606-16"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4621",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,32 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://github.com/torvalds/linux/commit/f26f9aff6aaf67e9a430d16c266f91b13a5bff64",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/f26f9aff6aaf67e9a430d16c266f91b13a5bff64"
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37",
"refsource": "MISC",
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37"
},
{
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37",
"refsource": "CONFIRM",
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f26f9aff6aaf67e9a430d16c266f91b13a5bff64",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f26f9aff6aaf67e9a430d16c266f91b13a5bff64"
},
{
"name": "[oss-security] 20111221 Re: CVE Request -- kernel: tight loop and no preemption can cause system stall",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/12/21/6"
"url": "http://www.openwall.com/lists/oss-security/2011/12/21/6",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/12/21/6"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=769711",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=769711"
"url": "https://github.com/torvalds/linux/commit/f26f9aff6aaf67e9a430d16c266f91b13a5bff64",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/f26f9aff6aaf67e9a430d16c266f91b13a5bff64"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f26f9aff6aaf67e9a430d16c266f91b13a5bff64",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f26f9aff6aaf67e9a430d16c266f91b13a5bff64"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=769711",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=769711"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4930",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,47 +27,71 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://research.cs.wisc.edu/htcondor/security/vulnerabilities/CONDOR-2012-0001.html",
"refsource": "CONFIRM",
"url": "http://research.cs.wisc.edu/htcondor/security/vulnerabilities/CONDOR-2012-0001.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=759548",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=759548"
},
{
"name": "https://htcondor-wiki.cs.wisc.edu/index.cgi/chngview?cn=28429",
"refsource": "CONFIRM",
"url": "https://htcondor-wiki.cs.wisc.edu/index.cgi/chngview?cn=28429"
},
{
"name": "RHSA-2012:0099",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0099.html"
},
{
"name": "https://htcondor-git.cs.wisc.edu/?p=condor.git;a=commitdiff;h=5e5571d1a431eb3c61977b6dd6ec90186ef79867",
"url": "http://research.cs.wisc.edu/htcondor/security/vulnerabilities/CONDOR-2012-0001.html",
"refsource": "MISC",
"url": "https://htcondor-git.cs.wisc.edu/?p=condor.git;a=commitdiff;h=5e5571d1a431eb3c61977b6dd6ec90186ef79867"
"name": "http://research.cs.wisc.edu/htcondor/security/vulnerabilities/CONDOR-2012-0001.html"
},
{
"name": "https://htcondor-wiki.cs.wisc.edu/index.cgi/tktview?tn=2660",
"refsource": "CONFIRM",
"url": "https://htcondor-wiki.cs.wisc.edu/index.cgi/tktview?tn=2660"
},
{
"name": "https://htcondor-wiki.cs.wisc.edu/index.cgi/chngview?cn=28264",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0099.html",
"refsource": "MISC",
"url": "https://htcondor-wiki.cs.wisc.edu/index.cgi/chngview?cn=28264"
"name": "http://rhn.redhat.com/errata/RHSA-2012-0099.html"
},
{
"name": "RHSA-2012:0100",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0100.html"
"url": "http://rhn.redhat.com/errata/RHSA-2012-0100.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-0100.html"
},
{
"url": "https://htcondor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=5e5571d1a431eb3c61977b6dd6ec90186ef79867",
"refsource": "MISC",
"name": "https://htcondor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=5e5571d1a431eb3c61977b6dd6ec90186ef79867"
},
{
"url": "https://htcondor-wiki.cs.wisc.edu/index.cgi/chngview?cn=28264",
"refsource": "MISC",
"name": "https://htcondor-wiki.cs.wisc.edu/index.cgi/chngview?cn=28264"
},
{
"url": "https://htcondor-wiki.cs.wisc.edu/index.cgi/chngview?cn=28429",
"refsource": "MISC",
"name": "https://htcondor-wiki.cs.wisc.edu/index.cgi/chngview?cn=28429"
},
{
"url": "https://htcondor-wiki.cs.wisc.edu/index.cgi/tktview?tn=2660",
"refsource": "MISC",
"name": "https://htcondor-wiki.cs.wisc.edu/index.cgi/tktview?tn=2660"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=759548",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=759548"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4939",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,37 +27,61 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "oval:org.mitre.oval:def:18406",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18406"
"url": "http://developer.pidgin.im/ticket/14392",
"refsource": "MISC",
"name": "http://developer.pidgin.im/ticket/14392"
},
{
"name": "MDVSA-2012:029",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:029"
"url": "http://developer.pidgin.im/viewmtn/revision/diff/10ead4688e3af4132d454fa3bc241480500651c9/with/d1d77da56217f3a083e1d459bef054db9f1d5699/pidgin/gtkconv.c",
"refsource": "MISC",
"name": "http://developer.pidgin.im/viewmtn/revision/diff/10ead4688e3af4132d454fa3bc241480500651c9/with/d1d77da56217f3a083e1d459bef054db9f1d5699/pidgin/gtkconv.c"
},
{
"name": "http://developer.pidgin.im/ticket/14392",
"refsource": "CONFIRM",
"url": "http://developer.pidgin.im/ticket/14392"
"url": "http://developer.pidgin.im/viewmtn/revision/info/d1d77da56217f3a083e1d459bef054db9f1d5699",
"refsource": "MISC",
"name": "http://developer.pidgin.im/viewmtn/revision/info/d1d77da56217f3a083e1d459bef054db9f1d5699"
},
{
"name": "http://developer.pidgin.im/viewmtn/revision/diff/10ead4688e3af4132d454fa3bc241480500651c9/with/d1d77da56217f3a083e1d459bef054db9f1d5699/pidgin/gtkconv.c",
"refsource": "CONFIRM",
"url": "http://developer.pidgin.im/viewmtn/revision/diff/10ead4688e3af4132d454fa3bc241480500651c9/with/d1d77da56217f3a083e1d459bef054db9f1d5699/pidgin/gtkconv.c"
"url": "http://pidgin.im/news/security/?id=60",
"refsource": "MISC",
"name": "http://pidgin.im/news/security/?id=60"
},
{
"name": "http://pidgin.im/news/security/?id=60",
"refsource": "CONFIRM",
"url": "http://pidgin.im/news/security/?id=60"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:029",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:029"
},
{
"name": "http://developer.pidgin.im/viewmtn/revision/info/d1d77da56217f3a083e1d459bef054db9f1d5699",
"refsource": "CONFIRM",
"url": "http://developer.pidgin.im/viewmtn/revision/info/d1d77da56217f3a083e1d459bef054db9f1d5699"
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18406",
"refsource": "MISC",
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18406"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2011-4940 python: potential XSS in SimpleHTTPServer's list_directory()"
"value": "The list_directory function in Lib/SimpleHTTPServer.py in SimpleHTTPServer in Python before 2.5.6c1, 2.6.x before 2.6.7 rc2, and 2.7.x before 2.7.2 does not place a charset parameter in the Content-Type HTTP header, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks against Internet Explorer 7 via UTF-7 encoding."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
"cweId": "CWE-79"
"value": "n/a"
}
]
}
@ -32,27 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:2.4.3-46.el5_8.2",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:2.6.6-29.el6_2.2",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -120,51 +108,11 @@
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1592-1"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:0744",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:0744"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:0745",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:0745"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2011-4940",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2011-4940"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=803500",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=803500"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 2.6,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
}
]
}
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4968",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "nginx",
"product": {
"product_data": [
{
"product_name": "nginx",
"version": {
"version_data": [
{
"version_value": "through 1.6.2"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,12 +27,46 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "nginx",
"product": {
"product_data": [
{
"product_name": "nginx",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "through 1.6.2"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://security-tracker.debian.org/tracker/CVE-2011-4968",
"url": "http://www.openwall.com/lists/oss-security/2013/01/03/8",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2011-4968"
"name": "http://www.openwall.com/lists/oss-security/2013/01/03/8"
},
{
"url": "http://www.securityfocus.com/bid/57139",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/57139"
},
{
"url": "https://access.redhat.com/security/cve/cve-2011-4968",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2011-4968"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4968",
@ -68,24 +79,14 @@
"name": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2011-4968"
},
{
"url": "https://access.redhat.com/security/cve/cve-2011-4968",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80952",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2011-4968"
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80952"
},
{
"url": "https://security-tracker.debian.org/tracker/CVE-2011-4968",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/01/03/8",
"url": "http://www.openwall.com/lists/oss-security/2013/01/03/8"
},
{
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/57139",
"url": "http://www.securityfocus.com/bid/57139"
},
{
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80952",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80952"
"name": "https://security-tracker.debian.org/tracker/CVE-2011-4968"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4971",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,47 +27,71 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://insecurety.net/?p=872",
"url": "http://insecurety.net/?p=872",
"refsource": "MISC",
"url": "http://insecurety.net/?p=872"
"name": "http://insecurety.net/?p=872"
},
{
"name": "MDVSA-2013:280",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:280"
},
{
"name": "https://code.google.com/p/memcached/issues/detail?id=192",
"url": "http://secunia.com/advisories/56183",
"refsource": "MISC",
"url": "https://code.google.com/p/memcached/issues/detail?id=192"
"name": "http://secunia.com/advisories/56183"
},
{
"name": "USN-2080-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2080-1"
"url": "http://www.debian.org/security/2014/dsa-2832",
"refsource": "MISC",
"name": "http://www.debian.org/security/2014/dsa-2832"
},
{
"name": "59567",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/59567"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:280",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:280"
},
{
"name": "https://puppet.com/security/cve/cve-2011-4971",
"refsource": "CONFIRM",
"url": "https://puppet.com/security/cve/cve-2011-4971"
"url": "http://www.securityfocus.com/bid/59567",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/59567"
},
{
"name": "DSA-2832",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2832"
"url": "http://www.ubuntu.com/usn/USN-2080-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2080-1"
},
{
"name": "56183",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56183"
"url": "https://code.google.com/p/memcached/issues/detail?id=192",
"refsource": "MISC",
"name": "https://code.google.com/p/memcached/issues/detail?id=192"
},
{
"url": "https://puppet.com/security/cve/cve-2011-4971",
"refsource": "MISC",
"name": "https://puppet.com/security/cve/cve-2011-4971"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-5321",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,37 +27,61 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20150313 Re: CVE request: Linux kernel: tty: kobject reference leakage in tty_open",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/03/13/17"
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c290f8358acaeffd8e0c551ddcc24d1206143376",
"refsource": "MISC",
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c290f8358acaeffd8e0c551ddcc24d1206143376"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c290f8358acaeffd8e0c551ddcc24d1206143376",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c290f8358acaeffd8e0c551ddcc24d1206143376"
"url": "http://rhn.redhat.com/errata/RHSA-2015-1221.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2015-1221.html"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1.1",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1.1"
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1.1",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1.1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1201887",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201887"
"url": "http://www.openwall.com/lists/oss-security/2015/03/13/17",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2015/03/13/17"
},
{
"name": "https://github.com/torvalds/linux/commit/c290f8358acaeffd8e0c551ddcc24d1206143376",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/c290f8358acaeffd8e0c551ddcc24d1206143376"
"url": "https://github.com/torvalds/linux/commit/c290f8358acaeffd8e0c551ddcc24d1206143376",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/c290f8358acaeffd8e0c551ddcc24d1206143376"
},
{
"name": "RHSA-2015:1221",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1221.html"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201887",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1201887"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-0027",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,47 +27,66 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "HPSBMU02786",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
"url": "http://secunia.com/advisories/57353",
"refsource": "MISC",
"name": "http://secunia.com/advisories/57353"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564"
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564",
"refsource": "MISC",
"name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564"
},
{
"name": "openSUSE-SU-2012:0083",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00017.html"
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041",
"refsource": "MISC",
"name": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
},
{
"name": "http://www.openssl.org/news/secadv_20120104.txt",
"refsource": "CONFIRM",
"url": "http://www.openssl.org/news/secadv_20120104.txt"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00017.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00017.html"
},
{
"name": "MDVSA-2012:007",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:007"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:007",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:007"
},
{
"name": "57353",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/57353"
"url": "http://www.openssl.org/news/secadv_20120104.txt",
"refsource": "MISC",
"name": "http://www.openssl.org/news/secadv_20120104.txt"
},
{
"name": "SSRT100877",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
},
{
"name": "78191",
"refsource": "OSVDB",
"url": "http://osvdb.org/78191"
"url": "http://osvdb.org/78191",
"refsource": "MISC",
"name": "http://osvdb.org/78191"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3457",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,37 +27,61 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683879",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683879",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683879"
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683879"
},
{
"name": "54863",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/54863"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/086161.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/086161.html"
},
{
"name": "[oss-security] 20120806 Re: CVE ASSIGN: pnp4nagios: process_perfdata.cfg world readable",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/06/8"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/086387.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/086387.html"
},
{
"name": "FEDORA-2012-13215",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/086387.html"
"url": "http://www.openwall.com/lists/oss-security/2012/08/06/7",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/08/06/7"
},
{
"name": "[oss-security] 20120806 CVE ASSIGN: pnp4nagios: process_perfdata.cfg world readable",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/06/7"
"url": "http://www.openwall.com/lists/oss-security/2012/08/06/8",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/08/06/8"
},
{
"name": "FEDORA-2012-13244",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/086161.html"
"url": "http://www.securityfocus.com/bid/54863",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/54863"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3458",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,37 +27,61 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://github.com/bbangert/beaker/commit/91becae76101cf87ce8cbfabe3af2622fc328fe5",
"refsource": "CONFIRM",
"url": "https://github.com/bbangert/beaker/commit/91becae76101cf87ce8cbfabe3af2622fc328fe5"
},
{
"name": "50226",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50226"
},
{
"name": "50520",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50520"
},
{
"name": "[oss-security] 20120813 ANN: Beaker 1.6.4 released with important security update",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/13/10"
},
{
"name": "DSA-2541",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2541"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=809267",
"url": "http://secunia.com/advisories/50226",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=809267"
"name": "http://secunia.com/advisories/50226"
},
{
"url": "http://secunia.com/advisories/50520",
"refsource": "MISC",
"name": "http://secunia.com/advisories/50520"
},
{
"url": "http://www.debian.org/security/2012/dsa-2541",
"refsource": "MISC",
"name": "http://www.debian.org/security/2012/dsa-2541"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/08/13/10",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/08/13/10"
},
{
"url": "https://github.com/bbangert/beaker/commit/91becae76101cf87ce8cbfabe3af2622fc328fe5",
"refsource": "MISC",
"name": "https://github.com/bbangert/beaker/commit/91becae76101cf87ce8cbfabe3af2622fc328fe5"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=809267",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=809267"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3460",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "cumin",
"version": {
"version_data": [
{
"version_value": "through 2012-08-08"
}
]
}
}
]
},
"vendor_name": "cumin"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,17 +27,41 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "cumin",
"product": {
"product_data": [
{
"product_name": "cumin",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "through 2012-08-08"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3460",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3460"
},
{
"url": "https://access.redhat.com/security/cve/cve-2012-3460",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2012-3460"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3460",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3460"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2012-3480 glibc: Integer overflows, leading to stack-based buffer overflows in strto* related routines"
"value": "Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4) strtod_l, and other unspecified \"related functions\" in stdlib in GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Stack-based Buffer Overflow",
"cweId": "CWE-121"
"value": "n/a"
}
]
}
@ -32,38 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:2.5-81.el5_8.7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:2.12-1.80.el6_3.5",
"version_affected": "!"
}
]
}
},
{
"product_name": "RHEV 3.X Hypervisor and Agents for RHEL-6",
"version": {
"version_data": [
{
"version_value": "0:6.3-20120926.0.el6_3",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -96,16 +73,6 @@
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-1325.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:1262",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:1262"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:1325",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:1325"
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085190.html",
"refsource": "MISC",
@ -165,51 +132,6 @@
"url": "http://www.securitytracker.com/id?1027374",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1027374"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:1207",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:1207"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:1208",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:1208"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2012-3480",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2012-3480"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=847715",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=847715"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.4,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}