"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-02-13 03:00:37 +00:00
parent bac141448a
commit 9c570d9205
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
47 changed files with 2091 additions and 2814 deletions

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "CVE-2010-2483 libtiff: out-of-bounds read crash on images with invalid SamplesPerPixel values" "value": "The TIFFRGBAImageGet function in LibTIFF 3.9.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a TIFF file with an invalid combination of SamplesPerPixel and Photometric values."
} }
] ]
}, },
@ -21,8 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "Out-of-bounds Read", "value": "n/a"
"cweId": "CWE-125"
} }
] ]
} }
@ -32,27 +31,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "n/a",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "Red Hat Enterprise Linux 4", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "0:3.6.1-12.el4_8.5", "version_affected": "=",
"version_affected": "!" "version_value": "n/a"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5",
"version": {
"version_data": [
{
"version_value": "0:3.8.2-7.el5_5.5",
"version_affected": "!"
} }
] ]
} }
@ -125,21 +113,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/1761" "name": "http://www.vupen.com/english/advisories/2010/1761"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2010:0519",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0519"
},
{ {
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2216", "url": "http://bugzilla.maptools.org/show_bug.cgi?id=2216",
"refsource": "MISC", "refsource": "MISC",
"name": "http://bugzilla.maptools.org/show_bug.cgi?id=2216" "name": "http://bugzilla.maptools.org/show_bug.cgi?id=2216"
}, },
{
"url": "https://access.redhat.com/security/cve/CVE-2010-2483",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-2483"
},
{ {
"url": "https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/591605", "url": "https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/591605",
"refsource": "MISC", "refsource": "MISC",
@ -149,36 +127,6 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=603081", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=603081",
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=603081" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=603081"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=611900",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=611900"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.3,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2484", "ID": "CVE-2010-2484",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,52 +27,71 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "http://support.apple.com/kb/HT4435", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "http://support.apple.com/kb/HT4435" "product_data": [
},
{ {
"name": "HPSBOV02763", "product_name": "n/a",
"refsource": "HP", "version": {
"url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2" "version_data": [
},
{ {
"name": "http://www.php.net/releases/5_2_14.php", "version_affected": "=",
"refsource": "CONFIRM", "version_value": "n/a"
"url": "http://www.php.net/releases/5_2_14.php" }
}, ]
{ }
"name": "APPLE-SA-2010-11-10-1", }
"refsource": "APPLE", ]
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }
}, }
{ ]
"name": "APPLE-SA-2010-08-24-1", }
"refsource": "APPLE", },
"url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html" "references": {
}, "reference_data": [
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=619324", "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=619324" "name": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
}, },
{ {
"name": "SSRT100826", "url": "http://support.apple.com/kb/HT4435",
"refsource": "HP", "refsource": "MISC",
"url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2" "name": "http://support.apple.com/kb/HT4435"
}, },
{ {
"name": "http://support.apple.com/kb/HT4312", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://support.apple.com/kb/HT4312" "name": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html"
}, },
{ {
"name": "SUSE-SR:2010:018", "url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html" "name": "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
},
{
"url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html"
},
{
"url": "http://support.apple.com/kb/HT4312",
"refsource": "MISC",
"name": "http://support.apple.com/kb/HT4312"
},
{
"url": "http://www.php.net/releases/5_2_14.php",
"refsource": "MISC",
"name": "http://www.php.net/releases/5_2_14.php"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=619324",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=619324"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2487", "ID": "CVE-2010-2487",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,92 +27,116 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "http://hg.moinmo.in/moin/1.8/rev/4238b0c90871", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "http://hg.moinmo.in/moin/1.8/rev/4238b0c90871" "product_data": [
},
{ {
"name": "ADV-2010-1981", "product_name": "n/a",
"refsource": "VUPEN", "version": {
"url": "http://www.vupen.com/english/advisories/2010/1981" "version_data": [
},
{ {
"name": "http://moinmo.in/MoinMoinRelease1.9", "version_affected": "=",
"refsource": "CONFIRM", "version_value": "n/a"
"url": "http://moinmo.in/MoinMoinRelease1.9" }
}, ]
{ }
"name": "http://moinmo.in/SecurityFixes", }
"refsource": "CONFIRM", ]
"url": "http://moinmo.in/SecurityFixes" }
}, }
{ ]
"name": "40549", }
"refsource": "BID", },
"url": "http://www.securityfocus.com/bid/40549" "references": {
}, "reference_data": [
{ {
"name": "http://hg.moinmo.in/moin/1.9/rev/68ba3cc79513", "url": "http://moinmo.in/SecurityFixes",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://hg.moinmo.in/moin/1.9/rev/68ba3cc79513" "name": "http://moinmo.in/SecurityFixes"
}, },
{ {
"name": "DSA-2083", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584809",
"refsource": "DEBIAN", "refsource": "MISC",
"url": "http://www.debian.org/security/2010/dsa-2083" "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584809"
}, },
{ {
"name": "http://hg.moinmo.in/moin/1.9/rev/e50b087c4572", "url": "http://hg.moinmo.in/moin/1.7/rev/37306fba2189",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://hg.moinmo.in/moin/1.9/rev/e50b087c4572" "name": "http://hg.moinmo.in/moin/1.7/rev/37306fba2189"
}, },
{ {
"name": "http://moinmo.in/MoinMoinRelease1.8", "url": "http://hg.moinmo.in/moin/1.8/raw-file/1.8.8/docs/CHANGES",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://moinmo.in/MoinMoinRelease1.8" "name": "http://hg.moinmo.in/moin/1.8/raw-file/1.8.8/docs/CHANGES"
}, },
{ {
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584809", "url": "http://hg.moinmo.in/moin/1.8/rev/4238b0c90871",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584809" "name": "http://hg.moinmo.in/moin/1.8/rev/4238b0c90871"
}, },
{ {
"name": "[oss-security] 20100701 CVE request: moin multiple XSS", "url": "http://hg.moinmo.in/moin/1.9/raw-file/1.9.3/docs/CHANGES",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://marc.info/?l=oss-security&m=127799369406968&w=2" "name": "http://hg.moinmo.in/moin/1.9/raw-file/1.9.3/docs/CHANGES"
}, },
{ {
"name": "[oss-security] 20100702 Re: CVE request: moin multiple XSS", "url": "http://hg.moinmo.in/moin/1.9/rev/68ba3cc79513",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://marc.info/?l=oss-security&m=127809682420259&w=2" "name": "http://hg.moinmo.in/moin/1.9/rev/68ba3cc79513"
}, },
{ {
"name": "http://hg.moinmo.in/moin/1.8/raw-file/1.8.8/docs/CHANGES", "url": "http://hg.moinmo.in/moin/1.9/rev/e50b087c4572",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://hg.moinmo.in/moin/1.8/raw-file/1.8.8/docs/CHANGES" "name": "http://hg.moinmo.in/moin/1.9/rev/e50b087c4572"
}, },
{ {
"name": "http://hg.moinmo.in/moin/1.9/raw-file/1.9.3/docs/CHANGES", "url": "http://marc.info/?l=oss-security&m=127799369406968&w=2",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://hg.moinmo.in/moin/1.9/raw-file/1.9.3/docs/CHANGES" "name": "http://marc.info/?l=oss-security&m=127799369406968&w=2"
}, },
{ {
"name": "http://hg.moinmo.in/moin/1.7/rev/37306fba2189", "url": "http://marc.info/?l=oss-security&m=127809682420259&w=2",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://hg.moinmo.in/moin/1.7/rev/37306fba2189" "name": "http://marc.info/?l=oss-security&m=127809682420259&w=2"
}, },
{ {
"name": "40836", "url": "http://moinmo.in/MoinMoinBugs/1.9.2UnescapedInputForThemeAddMsg",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/40836" "name": "http://moinmo.in/MoinMoinBugs/1.9.2UnescapedInputForThemeAddMsg"
}, },
{ {
"name": "http://moinmo.in/MoinMoinBugs/1.9.2UnescapedInputForThemeAddMsg", "url": "http://moinmo.in/MoinMoinRelease1.8",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://moinmo.in/MoinMoinBugs/1.9.2UnescapedInputForThemeAddMsg" "name": "http://moinmo.in/MoinMoinRelease1.8"
},
{
"url": "http://moinmo.in/MoinMoinRelease1.9",
"refsource": "MISC",
"name": "http://moinmo.in/MoinMoinRelease1.9"
},
{
"url": "http://secunia.com/advisories/40836",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40836"
},
{
"url": "http://www.debian.org/security/2010/dsa-2083",
"refsource": "MISC",
"name": "http://www.debian.org/security/2010/dsa-2083"
},
{
"url": "http://www.securityfocus.com/bid/40549",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/40549"
},
{
"url": "http://www.vupen.com/english/advisories/2010/1981",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/1981"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2490", "ID": "CVE-2010-2490",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "1.2.2"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,12 +27,36 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.2.2"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://security-tracker.debian.org/tracker/CVE-2010-2490", "url": "https://access.redhat.com/security/cve/cve-2010-2490",
"refsource": "MISC", "refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2010-2490" "name": "https://access.redhat.com/security/cve/cve-2010-2490"
}, },
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2490", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2490",
@ -63,9 +64,9 @@
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2490" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2490"
}, },
{ {
"url": "https://access.redhat.com/security/cve/cve-2010-2490", "url": "https://security-tracker.debian.org/tracker/CVE-2010-2490",
"refsource": "MISC", "refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2010-2490" "name": "https://security-tracker.debian.org/tracker/CVE-2010-2490"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2491", "ID": "CVE-2010-2491",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,77 +27,101 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "FEDORA-2010-12290", "vendor_name": "n/a",
"refsource": "FEDORA", "product": {
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048221.html" "product_data": [
},
{ {
"name": "[roundup-devel] 20100701 Roundup Issue Tracker 1.4.14 released", "product_name": "n/a",
"refsource": "MLIST", "version": {
"url": "http://sourceforge.net/mailarchive/message.php?msg_name=AANLkTimIYtyRzTAReGmTSCEqPYBvwkkxrP6YKrdVm_nU%40mail.gmail.com" "version_data": [
},
{ {
"name": "http://bugs.gentoo.org/show_bug.cgi?id=326395", "version_affected": "=",
"refsource": "CONFIRM", "version_value": "n/a"
"url": "http://bugs.gentoo.org/show_bug.cgi?id=326395" }
}, ]
{ }
"name": "41585", }
"refsource": "SECUNIA", ]
"url": "http://secunia.com/advisories/41585" }
}, }
{ ]
"name": "FEDORA-2010-12261", }
"refsource": "FEDORA", },
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048061.html" "references": {
}, "reference_data": [
{ {
"name": "http://issues.roundup-tracker.org/issue2550654", "url": "http://bugs.gentoo.org/show_bug.cgi?id=326395",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://issues.roundup-tracker.org/issue2550654" "name": "http://bugs.gentoo.org/show_bug.cgi?id=326395"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=610861", "url": "http://issues.roundup-tracker.org/issue2550654",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=610861" "name": "http://issues.roundup-tracker.org/issue2550654"
}, },
{ {
"name": "[oss-security] 20100702 CVE Request -- Roundup: XSS by processing PageTemplate template for a named page", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048018.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2010/07/02/3" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048018.html"
}, },
{ {
"name": "40433", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048061.html",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/40433" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048061.html"
}, },
{ {
"name": "41326", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048221.html",
"refsource": "BID", "refsource": "MISC",
"url": "http://www.securityfocus.com/bid/41326" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048221.html"
}, },
{ {
"name": "[oss-security] 20100702 Re: CVE Request -- Roundup: XSS by processing PageTemplate template for a named page", "url": "http://roundup.svn.sourceforge.net/viewvc/roundup/roundup/trunk/roundup/cgi/client.py?r1=4486&r2=4485&pathrev=4486",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2010/07/02/12" "name": "http://roundup.svn.sourceforge.net/viewvc/roundup/roundup/trunk/roundup/cgi/client.py?r1=4486&r2=4485&pathrev=4486"
}, },
{ {
"name": "http://roundup.svn.sourceforge.net/viewvc/roundup/roundup/trunk/roundup/cgi/client.py?r1=4486&r2=4485&pathrev=4486", "url": "http://roundup.svn.sourceforge.net/viewvc/roundup?view=revision&revision=4486",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://roundup.svn.sourceforge.net/viewvc/roundup/roundup/trunk/roundup/cgi/client.py?r1=4486&r2=4485&pathrev=4486" "name": "http://roundup.svn.sourceforge.net/viewvc/roundup?view=revision&revision=4486"
}, },
{ {
"name": "http://roundup.svn.sourceforge.net/viewvc/roundup?view=revision&revision=4486", "url": "http://secunia.com/advisories/40433",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://roundup.svn.sourceforge.net/viewvc/roundup?view=revision&revision=4486" "name": "http://secunia.com/advisories/40433"
}, },
{ {
"name": "FEDORA-2010-12269", "url": "http://secunia.com/advisories/41585",
"refsource": "FEDORA", "refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048018.html" "name": "http://secunia.com/advisories/41585"
},
{
"url": "http://sourceforge.net/mailarchive/message.php?msg_name=AANLkTimIYtyRzTAReGmTSCEqPYBvwkkxrP6YKrdVm_nU%40mail.gmail.com",
"refsource": "MISC",
"name": "http://sourceforge.net/mailarchive/message.php?msg_name=AANLkTimIYtyRzTAReGmTSCEqPYBvwkkxrP6YKrdVm_nU%40mail.gmail.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/07/02/12",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/07/02/12"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/07/02/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/07/02/3"
},
{
"url": "http://www.securityfocus.com/bid/41326",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/41326"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=610861",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=610861"
} }
] ]
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "CVE-2010-2492 kernel: ecryptfs_uid_hash() buffer overflow" "value": "Buffer overflow in the ecryptfs_uid_hash macro in fs/ecryptfs/messaging.c in the eCryptfs subsystem in the Linux kernel before 2.6.35 might allow local users to gain privileges or cause a denial of service (system crash) via unspecified vectors."
} }
] ]
}, },
@ -21,8 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "value": "n/a"
"cweId": "CWE-119"
} }
] ]
} }
@ -32,27 +31,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "n/a",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "Red Hat Enterprise Linux 5", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "0:2.6.18-194.17.1.el5", "version_affected": "=",
"version_affected": "!" "version_value": "n/a"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:2.6.32-71.14.1.el6",
"version_affected": "!"
} }
] ]
} }
@ -85,11 +73,6 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0007.html" "name": "http://www.redhat.com/support/errata/RHSA-2011-0007.html"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2011:0007",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0007"
},
{ {
"url": "http://secunia.com/advisories/46397", "url": "http://secunia.com/advisories/46397",
"refsource": "MISC", "refsource": "MISC",
@ -125,46 +108,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0723.html" "name": "http://www.redhat.com/support/errata/RHSA-2010-0723.html"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2010:0723",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0723"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-2492",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-2492"
},
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=611385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=611385",
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=611385" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=611385"
} }
] ]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 7.2,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "COMPLETE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "COMPLETE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
]
} }
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2493", "ID": "CVE-2010-2493",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,27 +27,51 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=614774", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=614774" "product_data": [
},
{ {
"name": "https://jira.jboss.org/browse/SOA-2105", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "https://jira.jboss.org/browse/SOA-2105" "version_data": [
},
{ {
"name": "40681", "version_affected": "=",
"refsource": "SECUNIA", "version_value": "n/a"
"url": "http://secunia.com/advisories/40681" }
}, ]
{ }
"name": "http://www.redhat.com/docs/en-US/JBoss_SOA_Platform/5.0.2/html/5.0.2_Release_Notes/index.html", }
"refsource": "CONFIRM", ]
"url": "http://www.redhat.com/docs/en-US/JBoss_SOA_Platform/5.0.2/html/5.0.2_Release_Notes/index.html" }
}
]
}
},
"references": {
"reference_data": [
{
"url": "http://secunia.com/advisories/40681",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40681"
},
{
"url": "http://www.redhat.com/docs/en-US/JBoss_SOA_Platform/5.0.2/html/5.0.2_Release_Notes/index.html",
"refsource": "MISC",
"name": "http://www.redhat.com/docs/en-US/JBoss_SOA_Platform/5.0.2/html/5.0.2_Release_Notes/index.html"
},
{
"url": "https://jira.jboss.org/browse/SOA-2105",
"refsource": "MISC",
"name": "https://jira.jboss.org/browse/SOA-2105"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=614774",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=614774"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2494", "ID": "CVE-2010-2494",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,107 +27,131 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "FEDORA-2010-13139", "vendor_name": "n/a",
"refsource": "FEDORA", "product": {
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046558.html" "product_data": [
},
{ {
"name": "[oss-security] 20100706 REPOST: CVE request for bogofilter", "product_name": "n/a",
"refsource": "MLIST", "version": {
"url": "http://marc.info/?l=oss-security&m=127840569013531&w=2" "version_data": [
},
{ {
"name": "40427", "version_affected": "=",
"refsource": "SECUNIA", "version_value": "n/a"
"url": "http://secunia.com/advisories/40427" }
}, ]
{ }
"name": "http://bogofilter.sourceforge.net/security/bogofilter-SA-2010-01", }
"refsource": "CONFIRM", ]
"url": "http://bogofilter.sourceforge.net/security/bogofilter-SA-2010-01" }
}, }
{ ]
"name": "41239", }
"refsource": "SECUNIA", },
"url": "http://secunia.com/advisories/41239" "references": {
}, "reference_data": [
{ {
"name": "http://bogofilter.svn.sourceforge.net/viewvc/bogofilter/trunk/bogofilter/doc/bogofilter-SA-2010-01?revision=6909&pathrev=6909", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://bogofilter.svn.sourceforge.net/viewvc/bogofilter/trunk/bogofilter/doc/bogofilter-SA-2010-01?revision=6909&pathrev=6909" "name": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
}, },
{ {
"name": "66002", "url": "http://bogofilter.sourceforge.net/security/bogofilter-SA-2010-01",
"refsource": "OSVDB", "refsource": "MISC",
"url": "http://www.osvdb.org/66002" "name": "http://bogofilter.sourceforge.net/security/bogofilter-SA-2010-01"
}, },
{ {
"name": "openSUSE-SU-2012:1650", "url": "http://bogofilter.svn.sourceforge.net/viewvc/bogofilter/trunk/bogofilter/doc/bogofilter-SA-2010-01?revision=6909&pathrev=6909",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00016.html" "name": "http://bogofilter.svn.sourceforge.net/viewvc/bogofilter/trunk/bogofilter/doc/bogofilter-SA-2010-01?revision=6909&pathrev=6909"
}, },
{ {
"name": "openSUSE-SU-2012:1648", "url": "http://bogofilter.svn.sourceforge.net/viewvc/bogofilter/trunk/bogofilter/src/base64.c?view=patch&r1=6906&r2=6903",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00015.html" "name": "http://bogofilter.svn.sourceforge.net/viewvc/bogofilter/trunk/bogofilter/src/base64.c?view=patch&r1=6906&r2=6903"
}, },
{ {
"name": "[oss-security] 20100706 Re: Request CVE ID for bogofilter base64 decoder", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046558.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://marc.info/?l=oss-security&m=127844323105405&w=2" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046558.html"
}, },
{ {
"name": "openSUSE-SU-2013:0166", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046590.html",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00021.html" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046590.html"
}, },
{ {
"name": "http://bogofilter.svn.sourceforge.net/viewvc/bogofilter/trunk/bogofilter/src/base64.c?view=patch&r1=6906&r2=6903", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00015.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://bogofilter.svn.sourceforge.net/viewvc/bogofilter/trunk/bogofilter/src/base64.c?view=patch&r1=6906&r2=6903" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00015.html"
}, },
{ {
"name": "ADV-2010-2233", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00016.html",
"refsource": "VUPEN", "refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2010/2233" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00016.html"
}, },
{ {
"name": "41339", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00021.html",
"refsource": "BID", "refsource": "MISC",
"url": "http://www.securityfocus.com/bid/41339" "name": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00021.html"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=611551", "url": "http://marc.info/?l=oss-security&m=127814747231102&w=2",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=611551" "name": "http://marc.info/?l=oss-security&m=127814747231102&w=2"
}, },
{ {
"name": "SUSE-SR:2010:014", "url": "http://marc.info/?l=oss-security&m=127831760712436&w=2",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" "name": "http://marc.info/?l=oss-security&m=127831760712436&w=2"
}, },
{ {
"name": "FEDORA-2010-13154", "url": "http://marc.info/?l=oss-security&m=127840569013531&w=2",
"refsource": "FEDORA", "refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046590.html" "name": "http://marc.info/?l=oss-security&m=127840569013531&w=2"
}, },
{ {
"name": "[oss-security] 20100705 Request CVE ID for bogofilter base64 decoder", "url": "http://marc.info/?l=oss-security&m=127844323105405&w=2",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://marc.info/?l=oss-security&m=127814747231102&w=2" "name": "http://marc.info/?l=oss-security&m=127844323105405&w=2"
}, },
{ {
"name": "USN-980-1", "url": "http://secunia.com/advisories/40427",
"refsource": "UBUNTU", "refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-980-1" "name": "http://secunia.com/advisories/40427"
}, },
{ {
"name": "[oss-security] 20100705 Re: Request CVE ID for bogofilter base64 decoder", "url": "http://secunia.com/advisories/41239",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://marc.info/?l=oss-security&m=127831760712436&w=2" "name": "http://secunia.com/advisories/41239"
},
{
"url": "http://www.osvdb.org/66002",
"refsource": "MISC",
"name": "http://www.osvdb.org/66002"
},
{
"url": "http://www.securityfocus.com/bid/41339",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/41339"
},
{
"url": "http://www.ubuntu.com/usn/USN-980-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-980-1"
},
{
"url": "http://www.vupen.com/english/advisories/2010/2233",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/2233"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=611551",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=611551"
} }
] ]
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "CVE-2010-2495 kernel: l2tp: Fix oops in pppol2tp_xmit" "value": "The pppol2tp_xmit function in drivers/net/pppol2tp.c in the L2TP implementation in the Linux kernel before 2.6.34 does not properly validate certain values associated with an interface, which allows attackers to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via vectors related to a routing change."
} }
] ]
}, },
@ -21,8 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "NULL Pointer Dereference", "value": "n/a"
"cweId": "CWE-476"
} }
] ]
} }
@ -40,8 +39,8 @@
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "n/a", "version_affected": "=",
"version_affected": "=" "version_value": "n/a"
} }
] ]
} }
@ -94,41 +93,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/07/06/11" "name": "http://www.openwall.com/lists/oss-security/2010/07/06/11"
}, },
{
"url": "https://access.redhat.com/security/cve/CVE-2010-2495",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-2495"
},
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=607054", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=607054",
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=607054" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=607054"
} }
] ]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 7.8,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
}
]
} }
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2497", "ID": "CVE-2010-2497",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,67 +27,91 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "https://savannah.nongnu.org/bugs/?30082", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "https://savannah.nongnu.org/bugs/?30082" "product_data": [
},
{ {
"name": "http://support.apple.com/kb/HT4435", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "http://support.apple.com/kb/HT4435" "version_data": [
},
{ {
"name": "[freetype] 20100712 FreeType 2.4.0 has been released", "version_affected": "=",
"refsource": "MLIST", "version_value": "n/a"
"url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html" }
}, ]
{ }
"name": "APPLE-SA-2010-11-10-1", }
"refsource": "APPLE", ]
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }
}, }
{ ]
"name": "[oss-security] 20100714 Re: Multiple bugs in freetype", }
"refsource": "MLIST", },
"url": "http://marc.info/?l=oss-security&m=127909326909362&w=2" "references": {
}, "reference_data": [
{ {
"name": "DSA-2070", "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html",
"refsource": "DEBIAN", "refsource": "MISC",
"url": "http://www.debian.org/security/2010/dsa-2070" "name": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
}, },
{ {
"name": "[oss-security] 20100713 Multiple bugs in freetype", "url": "http://support.apple.com/kb/HT4435",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://marc.info/?l=oss-security&m=127905701201340&w=2" "name": "http://support.apple.com/kb/HT4435"
}, },
{ {
"name": "MDVSA-2010:137", "url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html",
"refsource": "MANDRIVA", "refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137" "name": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=613154", "url": "http://marc.info/?l=oss-security&m=127905701201340&w=2",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=613154" "name": "http://marc.info/?l=oss-security&m=127905701201340&w=2"
}, },
{ {
"name": "https://savannah.nongnu.org/bugs/?30083", "url": "http://marc.info/?l=oss-security&m=127909326909362&w=2",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://savannah.nongnu.org/bugs/?30083" "name": "http://marc.info/?l=oss-security&m=127909326909362&w=2"
}, },
{ {
"name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc", "url": "http://secunia.com/advisories/48951",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc" "name": "http://secunia.com/advisories/48951"
}, },
{ {
"name": "48951", "url": "http://www.debian.org/security/2010/dsa-2070",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/48951" "name": "http://www.debian.org/security/2010/dsa-2070"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"
},
{
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc",
"refsource": "MISC",
"name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc"
},
{
"url": "https://savannah.nongnu.org/bugs/?30082",
"refsource": "MISC",
"name": "https://savannah.nongnu.org/bugs/?30082"
},
{
"url": "https://savannah.nongnu.org/bugs/?30083",
"refsource": "MISC",
"name": "https://savannah.nongnu.org/bugs/?30083"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=613154",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=613154"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2498", "ID": "CVE-2010-2498",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,77 +27,101 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "USN-963-1", "vendor_name": "n/a",
"refsource": "UBUNTU", "product": {
"url": "http://www.ubuntu.com/usn/USN-963-1" "product_data": [
},
{ {
"name": "http://support.apple.com/kb/HT4435", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "http://support.apple.com/kb/HT4435" "version_data": [
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=613160", "version_affected": "=",
"refsource": "CONFIRM", "version_value": "n/a"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=613160" }
}, ]
{ }
"name": "https://savannah.nongnu.org/bugs/?30106", }
"refsource": "CONFIRM", ]
"url": "https://savannah.nongnu.org/bugs/?30106" }
}, }
{ ]
"name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2", }
"refsource": "CONFIRM", },
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2" "references": {
}, "reference_data": [
{ {
"name": "[freetype] 20100712 FreeType 2.4.0 has been released", "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html" "name": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
}, },
{ {
"name": "APPLE-SA-2010-11-10-1", "url": "http://support.apple.com/kb/HT4435",
"refsource": "APPLE", "refsource": "MISC",
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" "name": "http://support.apple.com/kb/HT4435"
}, },
{ {
"name": "[oss-security] 20100714 Re: Multiple bugs in freetype", "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://marc.info/?l=oss-security&m=127909326909362&w=2" "name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2"
}, },
{ {
"name": "DSA-2070", "url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html",
"refsource": "DEBIAN", "refsource": "MISC",
"url": "http://www.debian.org/security/2010/dsa-2070" "name": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"
}, },
{ {
"name": "[oss-security] 20100713 Multiple bugs in freetype", "url": "http://marc.info/?l=oss-security&m=127905701201340&w=2",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://marc.info/?l=oss-security&m=127905701201340&w=2" "name": "http://marc.info/?l=oss-security&m=127905701201340&w=2"
}, },
{ {
"name": "1024266", "url": "http://marc.info/?l=oss-security&m=127909326909362&w=2",
"refsource": "SECTRACK", "refsource": "MISC",
"url": "http://securitytracker.com/id?1024266" "name": "http://marc.info/?l=oss-security&m=127909326909362&w=2"
}, },
{ {
"name": "RHSA-2010:0578", "url": "http://secunia.com/advisories/48951",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html" "name": "http://secunia.com/advisories/48951"
}, },
{ {
"name": "MDVSA-2010:137", "url": "http://securitytracker.com/id?1024266",
"refsource": "MANDRIVA", "refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137" "name": "http://securitytracker.com/id?1024266"
}, },
{ {
"name": "48951", "url": "http://www.debian.org/security/2010/dsa-2070",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/48951" "name": "http://www.debian.org/security/2010/dsa-2070"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0578.html"
},
{
"url": "http://www.ubuntu.com/usn/USN-963-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-963-1"
},
{
"url": "https://savannah.nongnu.org/bugs/?30106",
"refsource": "MISC",
"name": "https://savannah.nongnu.org/bugs/?30106"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=613160",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=613160"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2499", "ID": "CVE-2010-2499",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,87 +27,111 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c69891a1345640096fbf396e8dd567fe879ce233", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c69891a1345640096fbf396e8dd567fe879ce233" "product_data": [
},
{ {
"name": "https://savannah.nongnu.org/bugs/?30248", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "https://savannah.nongnu.org/bugs/?30248" "version_data": [
},
{ {
"name": "USN-963-1", "version_affected": "=",
"refsource": "UBUNTU", "version_value": "n/a"
"url": "http://www.ubuntu.com/usn/USN-963-1" }
}, ]
{ }
"name": "http://support.apple.com/kb/HT4435", }
"refsource": "CONFIRM", ]
"url": "http://support.apple.com/kb/HT4435" }
}, }
{ ]
"name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f29f741efbba0a5ce2f16464f648fb8d026ed4c8", }
"refsource": "CONFIRM", },
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f29f741efbba0a5ce2f16464f648fb8d026ed4c8" "references": {
}, "reference_data": [
{ {
"name": "[freetype] 20100712 FreeType 2.4.0 has been released", "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html" "name": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
}, },
{ {
"name": "APPLE-SA-2010-11-10-1", "url": "http://support.apple.com/kb/HT4435",
"refsource": "APPLE", "refsource": "MISC",
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" "name": "http://support.apple.com/kb/HT4435"
}, },
{ {
"name": "[oss-security] 20100714 Re: Multiple bugs in freetype", "url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://marc.info/?l=oss-security&m=127909326909362&w=2" "name": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"
}, },
{ {
"name": "DSA-2070", "url": "http://marc.info/?l=oss-security&m=127905701201340&w=2",
"refsource": "DEBIAN", "refsource": "MISC",
"url": "http://www.debian.org/security/2010/dsa-2070" "name": "http://marc.info/?l=oss-security&m=127905701201340&w=2"
}, },
{ {
"name": "[oss-security] 20100713 Multiple bugs in freetype", "url": "http://marc.info/?l=oss-security&m=127909326909362&w=2",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://marc.info/?l=oss-security&m=127905701201340&w=2" "name": "http://marc.info/?l=oss-security&m=127909326909362&w=2"
}, },
{ {
"name": "1024266", "url": "http://secunia.com/advisories/48951",
"refsource": "SECTRACK", "refsource": "MISC",
"url": "http://securitytracker.com/id?1024266" "name": "http://secunia.com/advisories/48951"
}, },
{ {
"name": "https://savannah.nongnu.org/bugs/?30249", "url": "http://securitytracker.com/id?1024266",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://savannah.nongnu.org/bugs/?30249" "name": "http://securitytracker.com/id?1024266"
}, },
{ {
"name": "RHSA-2010:0578", "url": "http://www.debian.org/security/2010/dsa-2070",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html" "name": "http://www.debian.org/security/2010/dsa-2070"
}, },
{ {
"name": "MDVSA-2010:137", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137",
"refsource": "MANDRIVA", "refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137" "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=613162", "url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=613162" "name": "http://www.redhat.com/support/errata/RHSA-2010-0578.html"
}, },
{ {
"name": "48951", "url": "http://www.ubuntu.com/usn/USN-963-1",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/48951" "name": "http://www.ubuntu.com/usn/USN-963-1"
},
{
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c69891a1345640096fbf396e8dd567fe879ce233",
"refsource": "MISC",
"name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c69891a1345640096fbf396e8dd567fe879ce233"
},
{
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f29f741efbba0a5ce2f16464f648fb8d026ed4c8",
"refsource": "MISC",
"name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f29f741efbba0a5ce2f16464f648fb8d026ed4c8"
},
{
"url": "https://savannah.nongnu.org/bugs/?30248",
"refsource": "MISC",
"name": "https://savannah.nongnu.org/bugs/?30248"
},
{
"url": "https://savannah.nongnu.org/bugs/?30249",
"refsource": "MISC",
"name": "https://savannah.nongnu.org/bugs/?30249"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=613162",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=613162"
} }
] ]
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "CVE-2010-2500 freetype: integer overflow vulnerability in smooth/ftgrays.c" "value": "Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file."
} }
] ]
}, },
@ -21,8 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "Integer Overflow or Wraparound", "value": "n/a"
"cweId": "CWE-190"
} }
] ]
} }
@ -32,38 +31,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "n/a",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "Red Hat Enterprise Linux 3", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "0:2.1.4-15.el3", "version_affected": "=",
"version_affected": "!" "version_value": "n/a"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 4",
"version": {
"version_data": [
{
"version_value": "0:2.1.9-14.el4.8",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5",
"version": {
"version_data": [
{
"version_value": "0:2.2.1-25.el5_5",
"version_affected": "!"
} }
] ]
} }
@ -131,11 +108,6 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-963-1" "name": "http://www.ubuntu.com/usn/USN-963-1"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2010:0578",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0578"
},
{ {
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee", "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee",
"refsource": "MISC", "refsource": "MISC",
@ -147,49 +119,14 @@
"name": "http://www.redhat.com/support/errata/RHSA-2010-0577.html" "name": "http://www.redhat.com/support/errata/RHSA-2010-0577.html"
}, },
{ {
"url": "https://access.redhat.com/errata/RHSA-2010:0577", "url": "https://savannah.nongnu.org/bugs/?30263",
"refsource": "MISC", "refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0577" "name": "https://savannah.nongnu.org/bugs/?30263"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-2500",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-2500"
}, },
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=613167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=613167",
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=613167" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=613167"
},
{
"url": "https://savannah.nongnu.org/bugs/?30263",
"refsource": "MISC",
"name": "https://savannah.nongnu.org/bugs/?30263"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.8,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
} }
] ]
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "CVE-2010-4530 CCID: Integer overflow, leading to array index error when processing crafted serial number of certain cards" "value": "Signedness error in ccid_serial.c in libccid in the USB Chip/Smart Card Interface Devices (CCID) driver, as used in pcscd in PCSC-Lite 1.5.3 and possibly other products, allows physically proximate attackers to execute arbitrary code via a smart card with a crafted serial number that causes a negative value to be used in a memcpy operation, which triggers a buffer overflow. NOTE: some sources refer to this issue as an integer overflow."
} }
] ]
}, },
@ -21,8 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "Integer Overflow or Wraparound", "value": "n/a"
"cweId": "CWE-190"
} }
] ]
} }
@ -32,27 +31,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "n/a",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "Red Hat Enterprise Linux 5", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "0:1.3.8-2.el5", "version_affected": "=",
"version_affected": "!" "version_value": "n/a"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:1.3.9-6.el6",
"version_affected": "!"
} }
] ]
} }
@ -121,54 +109,14 @@
"name": "http://www.vupen.com/english/advisories/2011/0179" "name": "http://www.vupen.com/english/advisories/2011/0179"
}, },
{ {
"url": "https://access.redhat.com/errata/RHSA-2013:0523", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64961",
"refsource": "MISC", "refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:0523" "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64961"
},
{
"url": "https://access.redhat.com/errata/RHSA-2013:1323",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:1323"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-4530",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-4530"
}, },
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=664986", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=664986",
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=664986" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=664986"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64961",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64961"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.6,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
} }
] ]
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "CVE-2010-4531 pcsc-lite: Stack-based buffer overflow in Answer-to-Reset (ATR) decoder" "value": "Stack-based buffer overflow in the ATRDecodeAtr function in the Answer-to-Reset (ATR) Handler (atrhandler.c) for pcscd in PCSC-Lite 1.5.3, and possibly other 1.5.x and 1.6.x versions, allows physically proximate attackers to cause a denial of service (crash) and possibly execute arbitrary code via a smart card with an ATR message containing a long attribute value."
} }
] ]
}, },
@ -21,8 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "Stack-based Buffer Overflow", "value": "n/a"
"cweId": "CWE-121"
} }
] ]
} }
@ -32,16 +31,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "n/a",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "Red Hat Enterprise Linux 6", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "0:1.5.2-11.el6", "version_affected": "=",
"version_affected": "!" "version_value": "n/a"
} }
] ]
} }
@ -134,51 +133,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0256" "name": "http://www.vupen.com/english/advisories/2011/0256"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2013:0525",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:0525"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-4531",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-4531"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=664999",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=664999"
},
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4531", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4531",
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4531" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4531"
} }
] ]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.6,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
} }
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4532", "ID": "CVE-2010-4532",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "offlineimap",
"product": {
"product_data": [
{
"product_name": "offlineimap",
"version": {
"version_data": [
{
"version_value": "before 6.3.2"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,12 +27,41 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "offlineimap",
"product": {
"product_data": [
{
"product_name": "offlineimap",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "before 6.3.2"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://security-tracker.debian.org/tracker/CVE-2010-4532", "url": "https://access.redhat.com/security/cve/cve-2010-4532",
"refsource": "MISC", "refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2010-4532" "name": "https://access.redhat.com/security/cve/cve-2010-4532"
},
{
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603450",
"refsource": "MISC",
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603450"
}, },
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4532",
@ -63,19 +69,14 @@
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4532" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4532"
}, },
{ {
"url": "https://access.redhat.com/security/cve/cve-2010-4532", "url": "https://security-tracker.debian.org/tracker/CVE-2010-4532",
"refsource": "MISC", "refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2010-4532" "name": "https://security-tracker.debian.org/tracker/CVE-2010-4532"
}, },
{ {
"url": "https://www.openwall.com/lists/oss-security/2010/12/23/2",
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603450", "name": "https://www.openwall.com/lists/oss-security/2010/12/23/2"
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603450"
},
{
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2010/12/23/2",
"url": "https://www.openwall.com/lists/oss-security/2010/12/23/2"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4533", "ID": "CVE-2010-4533",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "offlineimap",
"product": {
"product_data": [
{
"product_name": "offlineimap",
"version": {
"version_data": [
{
"version_value": "before 6.3.4"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,17 +27,36 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "offlineimap",
"product": {
"product_data": [
{
"product_name": "offlineimap",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "before 6.3.4"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://security-tracker.debian.org/tracker/CVE-2010-4533", "url": "https://www.openwall.com/lists/oss-security/2010/12/23/2",
"refsource": "MISC", "refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2010-4533" "name": "https://www.openwall.com/lists/oss-security/2010/12/23/2"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4533",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4533"
}, },
{ {
"url": "https://access.redhat.com/security/cve/cve-2010-4533", "url": "https://access.redhat.com/security/cve/cve-2010-4533",
@ -68,14 +64,19 @@
"name": "https://access.redhat.com/security/cve/cve-2010-4533" "name": "https://access.redhat.com/security/cve/cve-2010-4533"
}, },
{ {
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606962",
"refsource": "MISC", "refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2010/12/23/2", "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606962"
"url": "https://www.openwall.com/lists/oss-security/2010/12/23/2"
}, },
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4533",
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606962", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4533"
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606962" },
{
"url": "https://security-tracker.debian.org/tracker/CVE-2010-4533",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2010-4533"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4534", "ID": "CVE-2010-4534",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,97 +27,121 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "45562", "vendor_name": "n/a",
"refsource": "BID", "product": {
"url": "http://www.securityfocus.com/bid/45562" "product_data": [
},
{ {
"name": "http://ngenuity-is.com/advisories/2010/dec/22/information-leakage-in-django-administrative-inter/", "product_name": "n/a",
"refsource": "MISC", "version": {
"url": "http://ngenuity-is.com/advisories/2010/dec/22/information-leakage-in-django-administrative-inter/" "version_data": [
},
{ {
"name": "[oss-security] 20101223 CVE Request -- Django 1.2.4, Django 1.1.3 and Django 1.3 beta 1 -- addressing two security flaws", "version_affected": "=",
"refsource": "MLIST", "version_value": "n/a"
"url": "http://www.openwall.com/lists/oss-security/2010/12/23/4" }
}, ]
{ }
"name": "20101223 Django admin list filter data extraction / leakage", }
"refsource": "BUGTRAQ", ]
"url": "http://www.securityfocus.com/archive/1/515446" }
}, }
{ ]
"name": "USN-1040-1", }
"refsource": "UBUNTU", },
"url": "http://www.ubuntu.com/usn/USN-1040-1" "references": {
}, "reference_data": [
{ {
"name": "[oss-security] 20110103 Re: CVE Request -- Django 1.2.4, Django 1.1.3 and Django 1.3 beta 1 -- addressing two security flaws", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0580.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2011/01/03/5" "name": "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0580.html"
}, },
{ {
"name": "42913", "url": "http://code.djangoproject.com/changeset/15031",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/42913" "name": "http://code.djangoproject.com/changeset/15031"
}, },
{ {
"name": "http://evilpacket.net/2010/dec/22/information-leakage-django-administrative-interfac/", "url": "http://evilpacket.net/2010/dec/22/information-leakage-django-administrative-interfac/",
"refsource": "MISC", "refsource": "MISC",
"url": "http://evilpacket.net/2010/dec/22/information-leakage-django-administrative-interfac/" "name": "http://evilpacket.net/2010/dec/22/information-leakage-django-administrative-interfac/"
}, },
{ {
"name": "http://code.djangoproject.com/changeset/15031", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://code.djangoproject.com/changeset/15031" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html"
}, },
{ {
"name": "ADV-2011-0048", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html",
"refsource": "VUPEN", "refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0048" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html"
}, },
{ {
"name": "ADV-2011-0098", "url": "http://ngenuity-is.com/advisories/2010/dec/22/information-leakage-in-django-administrative-inter/",
"refsource": "VUPEN", "refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0098" "name": "http://ngenuity-is.com/advisories/2010/dec/22/information-leakage-in-django-administrative-inter/"
}, },
{ {
"name": "http://www.djangoproject.com/weblog/2010/dec/22/security/", "url": "http://secunia.com/advisories/42715",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.djangoproject.com/weblog/2010/dec/22/security/" "name": "http://secunia.com/advisories/42715"
}, },
{ {
"name": "FEDORA-2011-0096", "url": "http://secunia.com/advisories/42827",
"refsource": "FEDORA", "refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html" "name": "http://secunia.com/advisories/42827"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=665373", "url": "http://secunia.com/advisories/42913",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=665373" "name": "http://secunia.com/advisories/42913"
}, },
{ {
"name": "20101223 Django admin list filter data extraction / leakage", "url": "http://www.djangoproject.com/weblog/2010/dec/22/security/",
"refsource": "FULLDISC", "refsource": "MISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0580.html" "name": "http://www.djangoproject.com/weblog/2010/dec/22/security/"
}, },
{ {
"name": "42715", "url": "http://www.openwall.com/lists/oss-security/2010/12/23/4",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/42715" "name": "http://www.openwall.com/lists/oss-security/2010/12/23/4"
}, },
{ {
"name": "FEDORA-2011-0120", "url": "http://www.openwall.com/lists/oss-security/2011/01/03/5",
"refsource": "FEDORA", "refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html" "name": "http://www.openwall.com/lists/oss-security/2011/01/03/5"
}, },
{ {
"name": "42827", "url": "http://www.securityfocus.com/archive/1/515446",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/42827" "name": "http://www.securityfocus.com/archive/1/515446"
},
{
"url": "http://www.securityfocus.com/bid/45562",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45562"
},
{
"url": "http://www.ubuntu.com/usn/USN-1040-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1040-1"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0048",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0048"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0098",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0098"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=665373",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=665373"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4535", "ID": "CVE-2010-4535",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,77 +27,101 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "http://code.djangoproject.com/changeset/15032", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "http://code.djangoproject.com/changeset/15032" "product_data": [
},
{ {
"name": "[oss-security] 20101223 CVE Request -- Django 1.2.4, Django 1.1.3 and Django 1.3 beta 1 -- addressing two security flaws", "product_name": "n/a",
"refsource": "MLIST", "version": {
"url": "http://www.openwall.com/lists/oss-security/2010/12/23/4" "version_data": [
},
{ {
"name": "USN-1040-1", "version_affected": "=",
"refsource": "UBUNTU", "version_value": "n/a"
"url": "http://www.ubuntu.com/usn/USN-1040-1" }
}, ]
{ }
"name": "45563", }
"refsource": "BID", ]
"url": "http://www.securityfocus.com/bid/45563" }
}, }
{ ]
"name": "[oss-security] 20110103 Re: CVE Request -- Django 1.2.4, Django 1.1.3 and Django 1.3 beta 1 -- addressing two security flaws", }
"refsource": "MLIST", },
"url": "http://www.openwall.com/lists/oss-security/2011/01/03/5" "references": {
}, "reference_data": [
{ {
"name": "42913", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/42913" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html"
}, },
{ {
"name": "ADV-2011-0048", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html",
"refsource": "VUPEN", "refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0048" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html"
}, },
{ {
"name": "ADV-2011-0098", "url": "http://secunia.com/advisories/42715",
"refsource": "VUPEN", "refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0098" "name": "http://secunia.com/advisories/42715"
}, },
{ {
"name": "http://www.djangoproject.com/weblog/2010/dec/22/security/", "url": "http://secunia.com/advisories/42827",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.djangoproject.com/weblog/2010/dec/22/security/" "name": "http://secunia.com/advisories/42827"
}, },
{ {
"name": "FEDORA-2011-0096", "url": "http://secunia.com/advisories/42913",
"refsource": "FEDORA", "refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html" "name": "http://secunia.com/advisories/42913"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=665373", "url": "http://www.djangoproject.com/weblog/2010/dec/22/security/",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=665373" "name": "http://www.djangoproject.com/weblog/2010/dec/22/security/"
}, },
{ {
"name": "42715", "url": "http://www.openwall.com/lists/oss-security/2010/12/23/4",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/42715" "name": "http://www.openwall.com/lists/oss-security/2010/12/23/4"
}, },
{ {
"name": "FEDORA-2011-0120", "url": "http://www.openwall.com/lists/oss-security/2011/01/03/5",
"refsource": "FEDORA", "refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html" "name": "http://www.openwall.com/lists/oss-security/2011/01/03/5"
}, },
{ {
"name": "42827", "url": "http://www.ubuntu.com/usn/USN-1040-1",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/42827" "name": "http://www.ubuntu.com/usn/USN-1040-1"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0048",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0048"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0098",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0098"
},
{
"url": "http://code.djangoproject.com/changeset/15032",
"refsource": "MISC",
"name": "http://code.djangoproject.com/changeset/15032"
},
{
"url": "http://www.securityfocus.com/bid/45563",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45563"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=665373",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=665373"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4536", "ID": "CVE-2010-4536",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,57 +27,81 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "42755", "vendor_name": "n/a",
"refsource": "SECUNIA", "product": {
"url": "http://secunia.com/advisories/42755" "product_data": [
},
{ {
"name": "[oss-security] 20101230 CVE request: wordpress before 3.0.4 XSS", "product_name": "n/a",
"refsource": "MLIST", "version": {
"url": "http://www.openwall.com/lists/oss-security/2010/12/30/1" "version_data": [
},
{ {
"name": "FEDORA-2011-0306", "version_affected": "=",
"refsource": "FEDORA", "version_value": "n/a"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053293.html" }
}, ]
{ }
"name": "http://core.trac.wordpress.org/changeset/17172/branches/3.0", }
"refsource": "CONFIRM", ]
"url": "http://core.trac.wordpress.org/changeset/17172/branches/3.0" }
}, }
{ ]
"name": "http://wordpress.org/news/2010/12/3-0-4-update/", }
"refsource": "CONFIRM", },
"url": "http://wordpress.org/news/2010/12/3-0-4-update/" "references": {
}, "reference_data": [
{ {
"name": "ADV-2011-0167", "url": "http://core.trac.wordpress.org/changeset/17172/branches/3.0",
"refsource": "VUPEN", "refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0167" "name": "http://core.trac.wordpress.org/changeset/17172/branches/3.0"
}, },
{ {
"name": "ADV-2010-3335", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053289.html",
"refsource": "VUPEN", "refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2010/3335" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053289.html"
}, },
{ {
"name": "45620", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053293.html",
"refsource": "BID", "refsource": "MISC",
"url": "http://www.securityfocus.com/bid/45620" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053293.html"
}, },
{ {
"name": "43000", "url": "http://secunia.com/advisories/42755",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/43000" "name": "http://secunia.com/advisories/42755"
}, },
{ {
"name": "FEDORA-2011-0315", "url": "http://secunia.com/advisories/43000",
"refsource": "FEDORA", "refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053289.html" "name": "http://secunia.com/advisories/43000"
},
{
"url": "http://wordpress.org/news/2010/12/3-0-4-update/",
"refsource": "MISC",
"name": "http://wordpress.org/news/2010/12/3-0-4-update/"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/12/30/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/12/30/1"
},
{
"url": "http://www.securityfocus.com/bid/45620",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45620"
},
{
"url": "http://www.vupen.com/english/advisories/2010/3335",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/3335"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0167",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0167"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4538", "ID": "CVE-2010-4538",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,117 +27,141 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "ADV-2011-0053", "vendor_name": "n/a",
"refsource": "VUPEN", "product": {
"url": "http://www.vupen.com/english/advisories/2011/0053" "product_data": [
},
{ {
"name": "[oss-security] 20101231 CVE Request: Wireshark", "product_name": "n/a",
"refsource": "MLIST", "version": {
"url": "http://openwall.com/lists/oss-security/2010/12/31/7" "version_data": [
},
{ {
"name": "FEDORA-2011-0167", "version_affected": "=",
"refsource": "FEDORA", "version_value": "n/a"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053061.html" }
}, ]
{ }
"name": "FEDORA-2011-0128", }
"refsource": "FEDORA", ]
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053042.html" }
}, }
{ ]
"name": "ADV-2011-0110", }
"refsource": "VUPEN", },
"url": "http://www.vupen.com/english/advisories/2011/0110" "references": {
}, "reference_data": [
{ {
"name": "MDVSA-2011:002", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053042.html",
"refsource": "MANDRIVA", "refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:002" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053042.html"
}, },
{ {
"name": "1024930", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053061.html",
"refsource": "SECTRACK", "refsource": "MISC",
"url": "http://www.securitytracker.com/id?1024930" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053061.html"
}, },
{ {
"name": "42853", "url": "http://openwall.com/lists/oss-security/2010/12/31/7",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/42853" "name": "http://openwall.com/lists/oss-security/2010/12/31/7"
}, },
{ {
"name": "42910", "url": "http://openwall.com/lists/oss-security/2011/01/03/8",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/42910" "name": "http://openwall.com/lists/oss-security/2011/01/03/8"
}, },
{ {
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5539", "url": "http://osvdb.org/70244",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5539" "name": "http://osvdb.org/70244"
}, },
{ {
"name": "ADV-2011-0008", "url": "http://secunia.com/advisories/42767",
"refsource": "VUPEN", "refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0008" "name": "http://secunia.com/advisories/42767"
}, },
{ {
"name": "[oss-security] 20110103 Re: CVE Request: Wireshark", "url": "http://secunia.com/advisories/42853",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/01/03/8" "name": "http://secunia.com/advisories/42853"
}, },
{ {
"name": "45634", "url": "http://secunia.com/advisories/42910",
"refsource": "BID", "refsource": "MISC",
"url": "http://www.securityfocus.com/bid/45634" "name": "http://secunia.com/advisories/42910"
}, },
{ {
"name": "70244", "url": "http://secunia.com/advisories/42914",
"refsource": "OSVDB", "refsource": "MISC",
"url": "http://osvdb.org/70244" "name": "http://secunia.com/advisories/42914"
}, },
{ {
"name": "oval:org.mitre.oval:def:14937", "url": "http://www.debian.org/security/2011/dsa-2144",
"refsource": "OVAL", "refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14937" "name": "http://www.debian.org/security/2011/dsa-2144"
}, },
{ {
"name": "42767", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:002",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/42767" "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:002"
}, },
{ {
"name": "ADV-2011-0079", "url": "http://www.redhat.com/support/errata/RHSA-2011-0013.html",
"refsource": "VUPEN", "refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0079" "name": "http://www.redhat.com/support/errata/RHSA-2011-0013.html"
}, },
{ {
"name": "RHSA-2011:0013", "url": "http://www.securityfocus.com/bid/45634",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0013.html" "name": "http://www.securityfocus.com/bid/45634"
}, },
{ {
"name": "ADV-2011-0069", "url": "http://www.securitytracker.com/id?1024930",
"refsource": "VUPEN", "refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0069" "name": "http://www.securitytracker.com/id?1024930"
}, },
{ {
"name": "DSA-2144", "url": "http://www.vupen.com/english/advisories/2011/0008",
"refsource": "DEBIAN", "refsource": "MISC",
"url": "http://www.debian.org/security/2011/dsa-2144" "name": "http://www.vupen.com/english/advisories/2011/0008"
}, },
{ {
"name": "ADV-2011-0099", "url": "http://www.vupen.com/english/advisories/2011/0053",
"refsource": "VUPEN", "refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0099" "name": "http://www.vupen.com/english/advisories/2011/0053"
}, },
{ {
"name": "42914", "url": "http://www.vupen.com/english/advisories/2011/0069",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/42914" "name": "http://www.vupen.com/english/advisories/2011/0069"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0079",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0079"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0099",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0099"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0110",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0110"
},
{
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5539",
"refsource": "MISC",
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5539"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14937",
"refsource": "MISC",
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14937"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4539", "ID": "CVE-2010-4539",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,147 +27,171 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "subversion-walk-dos(64472)", "vendor_name": "n/a",
"refsource": "XF", "product": {
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64472" "product_data": [
},
{ {
"name": "[oss-security] 20110104 Re: CVE request for subversion", "product_name": "n/a",
"refsource": "MLIST", "version": {
"url": "http://openwall.com/lists/oss-security/2011/01/04/8" "version_data": [
},
{ {
"name": "ADV-2011-0103", "version_affected": "=",
"refsource": "VUPEN", "version_value": "n/a"
"url": "http://www.vupen.com/english/advisories/2011/0103" }
}, ]
{ }
"name": "42969", }
"refsource": "SECUNIA", ]
"url": "http://secunia.com/advisories/42969" }
}, }
{ ]
"name": "ADV-2011-0264", }
"refsource": "VUPEN", },
"url": "http://www.vupen.com/english/advisories/2011/0264" "references": {
}, "reference_data": [
{ {
"name": "42780", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/42780" "name": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
}, },
{ {
"name": "http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053230.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053230.html"
}, },
{ {
"name": "[oss-security] 20110105 Re: CVE request for subversion", "url": "http://mail-archives.apache.org/mod_mbox/www-announce/201011.mbox/%3CAANLkTi=5+NOi-Cp=fKCx6mAW-TofFVW=ikEQkXgQB8Bt%40mail.gmail.com%3E",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/01/05/4" "name": "http://mail-archives.apache.org/mod_mbox/www-announce/201011.mbox/%3CAANLkTi=5+NOi-Cp=fKCx6mAW-TofFVW=ikEQkXgQB8Bt%40mail.gmail.com%3E"
}, },
{ {
"name": "[oss-security] 20110103 Re: CVE request for subversion", "url": "http://openwall.com/lists/oss-security/2011/01/02/1",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/01/03/9" "name": "http://openwall.com/lists/oss-security/2011/01/02/1"
}, },
{ {
"name": "SUSE-SR:2011:005", "url": "http://openwall.com/lists/oss-security/2011/01/04/10",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" "name": "http://openwall.com/lists/oss-security/2011/01/04/10"
}, },
{ {
"name": "43346", "url": "http://openwall.com/lists/oss-security/2011/01/04/8",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/43346" "name": "http://openwall.com/lists/oss-security/2011/01/04/8"
}, },
{ {
"name": "1024934", "url": "http://openwall.com/lists/oss-security/2011/01/05/4",
"refsource": "SECTRACK", "refsource": "MISC",
"url": "http://www.securitytracker.com/id?1024934" "name": "http://openwall.com/lists/oss-security/2011/01/05/4"
}, },
{ {
"name": "43115", "url": "http://secunia.com/advisories/42780",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/43115" "name": "http://secunia.com/advisories/42780"
}, },
{ {
"name": "FEDORA-2011-0099", "url": "http://secunia.com/advisories/42969",
"refsource": "FEDORA", "refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053230.html" "name": "http://secunia.com/advisories/42969"
}, },
{ {
"name": "ADV-2011-0015", "url": "http://secunia.com/advisories/43115",
"refsource": "VUPEN", "refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0015" "name": "http://secunia.com/advisories/43115"
}, },
{ {
"name": "[oss-security] 20110102 CVE request for subversion", "url": "http://secunia.com/advisories/43139",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/01/02/1" "name": "http://secunia.com/advisories/43139"
}, },
{ {
"name": "[www-announce] 20101124 Apache Subversion 1.6.15 Released", "url": "http://secunia.com/advisories/43346",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://mail-archives.apache.org/mod_mbox/www-announce/201011.mbox/%3CAANLkTi=5+NOi-Cp=fKCx6mAW-TofFVW=ikEQkXgQB8Bt@mail.gmail.com%3E" "name": "http://secunia.com/advisories/43346"
}, },
{ {
"name": "RHSA-2011:0258", "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0258.html" "name": "http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES"
}, },
{ {
"name": "RHSA-2011:0257", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:006",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0257.html" "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:006"
}, },
{ {
"name": "MDVSA-2011:006", "url": "http://www.redhat.com/support/errata/RHSA-2011-0257.html",
"refsource": "MANDRIVA", "refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:006" "name": "http://www.redhat.com/support/errata/RHSA-2011-0257.html"
}, },
{ {
"name": "[oss-security] 20110104 Re: CVE request for subversion", "url": "http://www.redhat.com/support/errata/RHSA-2011-0258.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/01/04/10" "name": "http://www.redhat.com/support/errata/RHSA-2011-0258.html"
}, },
{ {
"name": "USN-1053-1", "url": "http://www.securityfocus.com/bid/45655",
"refsource": "UBUNTU", "refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-1053-1" "name": "http://www.securityfocus.com/bid/45655"
}, },
{ {
"name": "http://svn.apache.org/viewvc?view=revision&revision=1033166", "url": "http://www.ubuntu.com/usn/USN-1053-1",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1033166" "name": "http://www.ubuntu.com/usn/USN-1053-1"
}, },
{ {
"name": "45655", "url": "http://www.vupen.com/english/advisories/2011/0015",
"refsource": "BID", "refsource": "MISC",
"url": "http://www.securityfocus.com/bid/45655" "name": "http://www.vupen.com/english/advisories/2011/0015"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=667407", "url": "http://www.vupen.com/english/advisories/2011/0103",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=667407" "name": "http://www.vupen.com/english/advisories/2011/0103"
}, },
{ {
"name": "43139", "url": "http://www.vupen.com/english/advisories/2011/0162",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/43139" "name": "http://www.vupen.com/english/advisories/2011/0162"
}, },
{ {
"name": "[subversion-users] 20101104 apache coredump in mod_dav_svn", "url": "http://www.vupen.com/english/advisories/2011/0264",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://mail-archives.apache.org/mod_mbox/subversion-users/201011.mbox/%3C3923B919-C2BE-41AD-84ED-7207837FAD1A@ncsa.illinois.edu%3E" "name": "http://www.vupen.com/english/advisories/2011/0264"
}, },
{ {
"name": "ADV-2011-0162", "url": "http://mail-archives.apache.org/mod_mbox/subversion-users/201011.mbox/%3C3923B919-C2BE-41AD-84ED-7207837FAD1A%40ncsa.illinois.edu%3E",
"refsource": "VUPEN", "refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0162" "name": "http://mail-archives.apache.org/mod_mbox/subversion-users/201011.mbox/%3C3923B919-C2BE-41AD-84ED-7207837FAD1A%40ncsa.illinois.edu%3E"
},
{
"url": "http://openwall.com/lists/oss-security/2011/01/03/9",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/01/03/9"
},
{
"url": "http://svn.apache.org/viewvc?view=revision&revision=1033166",
"refsource": "MISC",
"name": "http://svn.apache.org/viewvc?view=revision&revision=1033166"
},
{
"url": "http://www.securitytracker.com/id?1024934",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1024934"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64472",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64472"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=667407",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=667407"
} }
] ]
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "CVE-2010-4540 Gimp: Stack-based buffer overflow in Lighting plug-in" "value": "Stack-based buffer overflow in the load_preset_response function in plug-ins/lighting/lighting-ui.c in the \"LIGHTING EFFECTS > LIGHT\" plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Position field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information."
} }
] ]
}, },
@ -21,8 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "Stack-based Buffer Overflow", "value": "n/a"
"cweId": "CWE-121"
} }
] ]
} }
@ -32,27 +31,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "n/a",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "Red Hat Enterprise Linux 5", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "2:2.2.13-2.0.7.el5_6.2", "version_affected": "=",
"version_affected": "!" "version_value": "n/a"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "2:2.6.9-4.el6_1.1",
"version_affected": "!"
} }
] ]
} }
@ -141,54 +129,14 @@
"name": "http://www.vupen.com/english/advisories/2011/0016" "name": "http://www.vupen.com/english/advisories/2011/0016"
}, },
{ {
"url": "https://access.redhat.com/errata/RHSA-2011:0838", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64582",
"refsource": "MISC", "refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0838" "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64582"
},
{
"url": "https://access.redhat.com/errata/RHSA-2011:0839",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0839"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-4540",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-4540"
}, },
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=666793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=666793",
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=666793" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=666793"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64582",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64582"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.1,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
} }
] ]
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "CVE-2010-4541 Gimp: Stack-based buffer overflow in SphereDesigner plug-in" "value": "Stack-based buffer overflow in the loadit function in plug-ins/common/sphere-designer.c in the SPHERE DESIGNER plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long \"Number of lights\" field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself."
} }
] ]
}, },
@ -21,8 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "Stack-based Buffer Overflow", "value": "n/a"
"cweId": "CWE-121"
} }
] ]
} }
@ -32,38 +31,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "n/a",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "Red Hat Enterprise Linux 4", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "1:2.0.5-7.0.7.el4.1", "version_affected": "=",
"version_affected": "!" "version_value": "n/a"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5",
"version": {
"version_data": [
{
"version_value": "2:2.2.13-2.0.7.el5_6.2",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "2:2.6.9-4.el6_1.1",
"version_affected": "!"
} }
] ]
} }
@ -146,16 +123,6 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0016" "name": "http://www.vupen.com/english/advisories/2011/0016"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2011:0838",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0838"
},
{
"url": "https://access.redhat.com/errata/RHSA-2011:0839",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0839"
},
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=666793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=666793",
"refsource": "MISC", "refsource": "MISC",
@ -171,51 +138,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0837.html" "name": "http://www.redhat.com/support/errata/RHSA-2011-0837.html"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2011:0837",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0837"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-4541",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-4541"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=703403",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=703403"
},
{ {
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64581", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64581",
"refsource": "MISC", "refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64581" "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64581"
} }
] ]
},
"impact": {
"cvss": [
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.1,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
} }
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "CVE-2010-4542 Gimp: Stack-based buffer overflow in Gfig plug-in" "value": "Stack-based buffer overflow in the gfig_read_parameter_gimp_rgb function in plug-ins/gfig/gfig-style.c in the GFIG plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Foreground field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information."
} }
] ]
}, },
@ -21,8 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "Stack-based Buffer Overflow", "value": "n/a"
"cweId": "CWE-121"
} }
] ]
} }
@ -32,27 +31,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "n/a",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "Red Hat Enterprise Linux 5", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "2:2.2.13-2.0.7.el5_6.2", "version_affected": "=",
"version_affected": "!" "version_value": "n/a"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "2:2.6.9-4.el6_1.1",
"version_affected": "!"
} }
] ]
} }
@ -135,60 +123,15 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0016" "name": "http://www.vupen.com/english/advisories/2011/0016"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2011:0838",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0838"
},
{
"url": "https://access.redhat.com/errata/RHSA-2011:0839",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0839"
},
{ {
"url": "http://osvdb.org/70283", "url": "http://osvdb.org/70283",
"refsource": "MISC", "refsource": "MISC",
"name": "http://osvdb.org/70283" "name": "http://osvdb.org/70283"
}, },
{
"url": "https://access.redhat.com/security/cve/CVE-2010-4542",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-4542"
},
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=666793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=666793",
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=666793" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=666793"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=703405",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=703405"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.1,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
} }
] ]
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "CVE-2010-4543 Gimp: Heap-based buffer overflow in Paint Shop Pro (PSP) plug-in" "value": "Heap-based buffer overflow in the read_channel_data function in file-psp.c in the Paint Shop Pro (PSP) plugin in GIMP 2.6.11 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a PSP_COMP_RLE (aka RLE compression) image file that begins a long run count at the end of the image. NOTE: some of these details are obtained from third party information."
} }
] ]
}, },
@ -21,8 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "Heap-based Buffer Overflow", "value": "n/a"
"cweId": "CWE-122"
} }
] ]
} }
@ -32,38 +31,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "n/a",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "Red Hat Enterprise Linux 4", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "1:2.0.5-7.0.7.el4.1", "version_affected": "=",
"version_affected": "!" "version_value": "n/a"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5",
"version": {
"version_data": [
{
"version_value": "2:2.2.13-2.0.7.el5_6.2",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "2:2.6.9-4.el6_1.1",
"version_affected": "!"
} }
] ]
} }
@ -146,16 +123,6 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0016" "name": "http://www.vupen.com/english/advisories/2011/0016"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2011:0838",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0838"
},
{
"url": "https://access.redhat.com/errata/RHSA-2011:0839",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0839"
},
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=666793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=666793",
"refsource": "MISC", "refsource": "MISC",
@ -166,50 +133,10 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0837.html" "name": "http://www.redhat.com/support/errata/RHSA-2011-0837.html"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2011:0837",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0837"
},
{ {
"url": "http://osvdb.org/70284", "url": "http://osvdb.org/70284",
"refsource": "MISC", "refsource": "MISC",
"name": "http://osvdb.org/70284" "name": "http://osvdb.org/70284"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-4543",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-4543"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=703407",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=703407"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.8,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4360", "ID": "CVE-2011-4360",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,37 +27,61 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "[mediawiki-announce] 20111128 MediaWiki security release 1.17.1", "vendor_name": "n/a",
"refsource": "MLIST", "product": {
"url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-November/000104.html" "product_data": [
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=758171", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=758171" "version_data": [
},
{ {
"name": "[oss-security] 20111129 CVE request: mediawiki before 1.17.1", "version_affected": "=",
"refsource": "MLIST", "version_value": "n/a"
"url": "http://openwall.com/lists/oss-security/2011/11/29/6" }
}, ]
{ }
"name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=32276", }
"refsource": "CONFIRM", ]
"url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=32276" }
}, }
{ ]
"name": "[oss-security] 20111129 Re: CVE request: mediawiki before 1.17.1", }
"refsource": "MLIST", },
"url": "http://openwall.com/lists/oss-security/2011/11/29/12" "references": {
}, "reference_data": [
{ {
"name": "DSA-2366", "url": "http://www.debian.org/security/2011/dsa-2366",
"refsource": "DEBIAN", "refsource": "MISC",
"url": "http://www.debian.org/security/2011/dsa-2366" "name": "http://www.debian.org/security/2011/dsa-2366"
},
{
"url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-November/000104.html",
"refsource": "MISC",
"name": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-November/000104.html"
},
{
"url": "http://openwall.com/lists/oss-security/2011/11/29/12",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/11/29/12"
},
{
"url": "http://openwall.com/lists/oss-security/2011/11/29/6",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/11/29/6"
},
{
"url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=32276",
"refsource": "MISC",
"name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=32276"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=758171",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=758171"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4361", "ID": "CVE-2011-4361",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,37 +27,61 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "[mediawiki-announce] 20111128 MediaWiki security release 1.17.1", "vendor_name": "n/a",
"refsource": "MLIST", "product": {
"url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-November/000104.html" "product_data": [
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=758171", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=758171" "version_data": [
},
{ {
"name": "[oss-security] 20111129 CVE request: mediawiki before 1.17.1", "version_affected": "=",
"refsource": "MLIST", "version_value": "n/a"
"url": "http://openwall.com/lists/oss-security/2011/11/29/6" }
}, ]
{ }
"name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=32616", }
"refsource": "CONFIRM", ]
"url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=32616" }
}, }
{ ]
"name": "[oss-security] 20111129 Re: CVE request: mediawiki before 1.17.1", }
"refsource": "MLIST", },
"url": "http://openwall.com/lists/oss-security/2011/11/29/12" "references": {
}, "reference_data": [
{ {
"name": "DSA-2366", "url": "http://www.debian.org/security/2011/dsa-2366",
"refsource": "DEBIAN", "refsource": "MISC",
"url": "http://www.debian.org/security/2011/dsa-2366" "name": "http://www.debian.org/security/2011/dsa-2366"
},
{
"url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-November/000104.html",
"refsource": "MISC",
"name": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-November/000104.html"
},
{
"url": "http://openwall.com/lists/oss-security/2011/11/29/12",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/11/29/12"
},
{
"url": "http://openwall.com/lists/oss-security/2011/11/29/6",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/11/29/6"
},
{
"url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=32616",
"refsource": "MISC",
"name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=32616"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=758171",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=758171"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4578", "ID": "CVE-2011-4578",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,32 +27,56 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=760984", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=760984" "product_data": [
},
{ {
"name": "http://sourceforge.net/u/tedfelix/acpid2/ci/02d0bf29207f17996936ab652717855b15873901/tree/Changelog?force=True", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "http://sourceforge.net/u/tedfelix/acpid2/ci/02d0bf29207f17996936ab652717855b15873901/tree/Changelog?force=True" "version_data": [
},
{ {
"name": "MDVSA-2012:138", "version_affected": "=",
"refsource": "MANDRIVA", "version_value": "n/a"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:138" }
}, ]
{ }
"name": "[oss-security] 20111206 Re: CVE request: acpid", }
"refsource": "MLIST", ]
"url": "http://www.openwall.com/lists/oss-security/2011/12/06/3" }
}, }
{ ]
"name": "https://bugs.launchpad.net/ubuntu/+source/acpid/+bug/893821", }
"refsource": "CONFIRM", },
"url": "https://bugs.launchpad.net/ubuntu/+source/acpid/+bug/893821" "references": {
"reference_data": [
{
"url": "http://sourceforge.net/u/tedfelix/acpid2/ci/02d0bf29207f17996936ab652717855b15873901/tree/Changelog?force=True",
"refsource": "MISC",
"name": "http://sourceforge.net/u/tedfelix/acpid2/ci/02d0bf29207f17996936ab652717855b15873901/tree/Changelog?force=True"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:138",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:138"
},
{
"url": "http://www.openwall.com/lists/oss-security/2011/12/06/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/12/06/3"
},
{
"url": "https://bugs.launchpad.net/ubuntu/+source/acpid/+bug/893821",
"refsource": "MISC",
"name": "https://bugs.launchpad.net/ubuntu/+source/acpid/+bug/893821"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=760984",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=760984"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4580", "ID": "CVE-2011-4580",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,12 +27,36 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "RHSA-2011:1822", "vendor_name": "n/a",
"refsource": "REDHAT", "product": {
"url": "http://rhn.redhat.com/errata/RHSA-2011-1822.html" "product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "http://rhn.redhat.com/errata/RHSA-2011-1822.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2011-1822.html"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4581", "ID": "CVE-2011-4581",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,22 +27,46 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=140af2a0f0a4598bf568b9ae182cb81eb583edeb", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=140af2a0f0a4598bf568b9ae182cb81eb583edeb" "product_data": [
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=761248", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761248" "version_data": [
},
{ {
"name": "http://moodle.org/mod/forum/discuss.php?d=191747", "version_affected": "=",
"refsource": "CONFIRM", "version_value": "n/a"
"url": "http://moodle.org/mod/forum/discuss.php?d=191747" }
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=140af2a0f0a4598bf568b9ae182cb81eb583edeb",
"refsource": "MISC",
"name": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=140af2a0f0a4598bf568b9ae182cb81eb583edeb"
},
{
"url": "http://moodle.org/mod/forum/discuss.php?d=191747",
"refsource": "MISC",
"name": "http://moodle.org/mod/forum/discuss.php?d=191747"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761248",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=761248"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4588", "ID": "CVE-2011-4588",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,27 +27,51 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=761248", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761248" "product_data": [
},
{ {
"name": "DSA-2421", "product_name": "n/a",
"refsource": "DEBIAN", "version": {
"url": "http://www.debian.org/security/2012/dsa-2421" "version_data": [
},
{ {
"name": "http://moodle.org/mod/forum/discuss.php?d=191756", "version_affected": "=",
"refsource": "CONFIRM", "version_value": "n/a"
"url": "http://moodle.org/mod/forum/discuss.php?d=191756" }
}, ]
{ }
"name": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=3ab2851d2a59721445945d0706c58092e07e861e", }
"refsource": "CONFIRM", ]
"url": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=3ab2851d2a59721445945d0706c58092e07e861e" }
}
]
}
},
"references": {
"reference_data": [
{
"url": "http://www.debian.org/security/2012/dsa-2421",
"refsource": "MISC",
"name": "http://www.debian.org/security/2012/dsa-2421"
},
{
"url": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=3ab2851d2a59721445945d0706c58092e07e861e",
"refsource": "MISC",
"name": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=3ab2851d2a59721445945d0706c58092e07e861e"
},
{
"url": "http://moodle.org/mod/forum/discuss.php?d=191756",
"refsource": "MISC",
"name": "http://moodle.org/mod/forum/discuss.php?d=191756"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761248",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=761248"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4589", "ID": "CVE-2011-4589",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,22 +27,46 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=761248", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761248" "product_data": [
},
{ {
"name": "http://moodle.org/mod/forum/discuss.php?d=191758", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "http://moodle.org/mod/forum/discuss.php?d=191758" "version_data": [
},
{ {
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-29591", "version_affected": "=",
"refsource": "CONFIRM", "version_value": "n/a"
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-29591" }
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-29591",
"refsource": "MISC",
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-29591"
},
{
"url": "http://moodle.org/mod/forum/discuss.php?d=191758",
"refsource": "MISC",
"name": "http://moodle.org/mod/forum/discuss.php?d=191758"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761248",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=761248"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4590", "ID": "CVE-2011-4590",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,22 +27,46 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=761248", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761248" "product_data": [
},
{ {
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-28629", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-28629" "version_data": [
},
{ {
"name": "http://moodle.org/mod/forum/discuss.php?d=191759", "version_affected": "=",
"refsource": "CONFIRM", "version_value": "n/a"
"url": "http://moodle.org/mod/forum/discuss.php?d=191759" }
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-28629",
"refsource": "MISC",
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-28629"
},
{
"url": "http://moodle.org/mod/forum/discuss.php?d=191759",
"refsource": "MISC",
"name": "http://moodle.org/mod/forum/discuss.php?d=191759"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761248",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=761248"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4591", "ID": "CVE-2011-4591",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,22 +27,46 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=761248", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761248" "product_data": [
},
{ {
"name": "http://moodle.org/mod/forum/discuss.php?d=191760", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "http://moodle.org/mod/forum/discuss.php?d=191760" "version_data": [
},
{ {
"name": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=187672608ec96659e07f2461b3b83634debd16cb", "version_affected": "=",
"refsource": "CONFIRM", "version_value": "n/a"
"url": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=187672608ec96659e07f2461b3b83634debd16cb" }
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=187672608ec96659e07f2461b3b83634debd16cb",
"refsource": "MISC",
"name": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=187672608ec96659e07f2461b3b83634debd16cb"
},
{
"url": "http://moodle.org/mod/forum/discuss.php?d=191760",
"refsource": "MISC",
"name": "http://moodle.org/mod/forum/discuss.php?d=191760"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761248",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=761248"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4598", "ID": "CVE-2011-4598",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,37 +27,61 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "[oss-security] 20111209 Re: CVE Request -- Asterisk -- AST-2011-013 and AST-2011-014", "vendor_name": "n/a",
"refsource": "MLIST", "product": {
"url": "http://openwall.com/lists/oss-security/2011/12/09/4" "product_data": [
},
{ {
"name": "[oss-security] 20111209 CVE Request -- Asterisk -- AST-2011-013 and AST-2011-014", "product_name": "n/a",
"refsource": "MLIST", "version": {
"url": "http://openwall.com/lists/oss-security/2011/12/09/3" "version_data": [
},
{ {
"name": "47273", "version_affected": "=",
"refsource": "SECUNIA", "version_value": "n/a"
"url": "http://secunia.com/advisories/47273" }
}, ]
{ }
"name": "77598", }
"refsource": "OSVDB", ]
"url": "http://osvdb.org/77598" }
}, }
{ ]
"name": "http://downloads.asterisk.org/pub/security/AST-2011-014.html", }
"refsource": "CONFIRM", },
"url": "http://downloads.asterisk.org/pub/security/AST-2011-014.html" "references": {
}, "reference_data": [
{ {
"name": "DSA-2367", "url": "http://openwall.com/lists/oss-security/2011/12/09/3",
"refsource": "DEBIAN", "refsource": "MISC",
"url": "http://www.debian.org/security/2011/dsa-2367" "name": "http://openwall.com/lists/oss-security/2011/12/09/3"
},
{
"url": "http://openwall.com/lists/oss-security/2011/12/09/4",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/12/09/4"
},
{
"url": "http://secunia.com/advisories/47273",
"refsource": "MISC",
"name": "http://secunia.com/advisories/47273"
},
{
"url": "http://www.debian.org/security/2011/dsa-2367",
"refsource": "MISC",
"name": "http://www.debian.org/security/2011/dsa-2367"
},
{
"url": "http://downloads.asterisk.org/pub/security/AST-2011-014.html",
"refsource": "MISC",
"name": "http://downloads.asterisk.org/pub/security/AST-2011-014.html"
},
{
"url": "http://osvdb.org/77598",
"refsource": "MISC",
"name": "http://osvdb.org/77598"
} }
] ]
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "CVE-2011-4599 icu: Stack-based buffer overflow by canonicalizing the given localeID" "value": "Stack-based buffer overflow in the _canonicalize function in common/uloc.c in International Components for Unicode (ICU) before 49.1 allows remote attackers to execute arbitrary code via a crafted locale ID that is not properly handled during variant canonicalization."
} }
] ]
}, },
@ -21,8 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "Stack-based Buffer Overflow", "value": "n/a"
"cweId": "CWE-121"
} }
] ]
} }
@ -32,27 +31,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "n/a",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "Red Hat Enterprise Linux 5", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "0:3.6-5.16.1", "version_affected": "=",
"version_affected": "!" "version_value": "n/a"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:4.2.1-9.1.el6_2",
"version_affected": "!"
} }
] ]
} }
@ -165,51 +153,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.securityfocus.com/bid/51006" "name": "http://www.securityfocus.com/bid/51006"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2011:1815",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:1815"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2011-4599",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2011-4599"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=765812",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=765812"
},
{ {
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71726", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71726",
"refsource": "MISC", "refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71726" "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71726"
} }
] ]
},
"impact": {
"cvss": [
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.1,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
} }
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4600", "ID": "CVE-2011-4600",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,27 +27,51 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "http://libvirt.org/news-2012.html", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "http://libvirt.org/news-2012.html" "product_data": [
},
{ {
"name": "http://libvirt.org/git/?p=libvirt.git;a=commitdiff;h=ae1232b298323dd7bef909426e2ebafa6bca9157", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "http://libvirt.org/git/?p=libvirt.git;a=commitdiff;h=ae1232b298323dd7bef909426e2ebafa6bca9157" "version_data": [
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=760442", "version_affected": "=",
"refsource": "CONFIRM", "version_value": "n/a"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=760442" }
}, ]
{ }
"name": "USN-2867-1", }
"refsource": "UBUNTU", ]
"url": "http://www.ubuntu.com/usn/USN-2867-1" }
}
]
}
},
"references": {
"reference_data": [
{
"url": "http://www.ubuntu.com/usn/USN-2867-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2867-1"
},
{
"url": "http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=ae1232b298323dd7bef909426e2ebafa6bca9157",
"refsource": "MISC",
"name": "http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=ae1232b298323dd7bef909426e2ebafa6bca9157"
},
{
"url": "http://libvirt.org/news-2012.html",
"refsource": "MISC",
"name": "http://libvirt.org/news-2012.html"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=760442",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=760442"
} }
] ]
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "CVE-2011-4608 mod_cluster: malicious worker nodes can register on any vhost" "value": "mod_cluster in JBoss Enterprise Application Platform 5.1.2 for Red Hat Linux allows worker nodes to register with arbitrary virtual hosts, which allows remote attackers to bypass intended access restrictions and provide malicious content, hijack sessions, and steal credentials by registering from an external vhost that does not enforce security constraints."
} }
] ]
}, },
@ -21,8 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "Incorrect Authorization", "value": "n/a"
"cweId": "CWE-863"
} }
] ]
} }
@ -32,105 +31,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "n/a",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "JBEWP 5 for RHEL 5", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "0:1.0.10-4.1.GA_CP02.ep5.el5", "version_affected": "=",
"version_affected": "!" "version_value": "n/a"
}
]
}
},
{
"product_name": "JBEWP 5 for RHEL 6",
"version": {
"version_data": [
{
"version_value": "0:1.0.10-4.1.1.GA_CP02.ep5.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "JBEWS 1.0 for RHEL 4",
"version": {
"version_data": [
{
"version_value": "0:1.0.10-3.GA_CP02.ep5.el4",
"version_affected": "!"
},
{
"version_value": "0:1.0.10-4.GA_CP02.ep5.el4",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 4",
"version": {
"version_data": [
{
"version_value": "0:1.0.10-4.GA_CP02.ep5.el4",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 5",
"version": {
"version_data": [
{
"version_value": "0:1.0.10-4.1.GA_CP02.ep5.el5",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 6",
"version": {
"version_data": [
{
"version_value": "0:1.0.10-4.1.1.GA_CP02.ep5.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5",
"version": {
"version_data": [
{
"version_value": "0:1.0.10-3.1.GA_CP02.ep5.el5",
"version_affected": "!"
},
{
"version_value": "0:1.0.10-4.1.GA_CP02.ep5.el5",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 6",
"version": {
"version_data": [
{
"version_value": "0:1.0.10-3.2.GA_CP02.ep5.el6",
"version_affected": "!"
},
{
"version_value": "0:1.0.10-4.1.1.GA_CP02.ep5.el6",
"version_affected": "!"
} }
] ]
} }
@ -184,74 +94,14 @@
"name": "http://www.securitytracker.com/id?1026545" "name": "http://www.securitytracker.com/id?1026545"
}, },
{ {
"url": "https://access.redhat.com/errata/RHSA-2012:0035", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72460",
"refsource": "MISC", "refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:0035" "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72460"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:0036",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:0036"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:0037",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:0037"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:0038",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:0038"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:0039",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:0039"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:0040",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:0040"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2011-4608",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2011-4608"
}, },
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=767020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=767020",
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=767020" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=767020"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72460",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72460"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 7.5,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3444", "ID": "CVE-2012-3444",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,37 +27,61 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "[oss-security] 20120730 CVE Request: Django 1.3.1 and 1.4.0 security issues", "vendor_name": "n/a",
"refsource": "MLIST", "product": {
"url": "http://www.openwall.com/lists/oss-security/2012/07/31/1" "product_data": [
},
{ {
"name": "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/" "version_data": [
},
{ {
"name": "MDVSA-2012:143", "version_affected": "=",
"refsource": "MANDRIVA", "version_value": "n/a"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143" }
}, ]
{ }
"name": "USN-1560-1", }
"refsource": "UBUNTU", ]
"url": "http://www.ubuntu.com/usn/USN-1560-1" }
}, }
{ ]
"name": "[oss-security] 20120730 Re: CVE Request: Django 1.3.1 and 1.4.0 security issues", }
"refsource": "MLIST", },
"url": "http://www.openwall.com/lists/oss-security/2012/07/31/2" "references": {
}, "reference_data": [
{ {
"name": "DSA-2529", "url": "http://www.debian.org/security/2012/dsa-2529",
"refsource": "DEBIAN", "refsource": "MISC",
"url": "http://www.debian.org/security/2012/dsa-2529" "name": "http://www.debian.org/security/2012/dsa-2529"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/07/31/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/07/31/1"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/07/31/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/07/31/2"
},
{
"url": "http://www.ubuntu.com/usn/USN-1560-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1560-1"
},
{
"url": "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/",
"refsource": "MISC",
"name": "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3445", "ID": "CVE-2012-3445",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,57 +27,81 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "50118", "vendor_name": "n/a",
"refsource": "SECUNIA", "product": {
"url": "http://secunia.com/advisories/50118" "product_data": [
},
{ {
"name": "54748", "product_name": "n/a",
"refsource": "BID", "version": {
"url": "http://www.securityfocus.com/bid/54748" "version_data": [
},
{ {
"name": "[libvirt] 20120730 [PATCH] daemon: Fix crash in virTypedParameterArrayClear", "version_affected": "=",
"refsource": "MLIST", "version_value": "n/a"
"url": "https://www.redhat.com/archives/libvir-list/2012-July/msg01650.html" }
}, ]
{ }
"name": "[oss-security] 20120731 CVE Request -- libvirt: crash in virTypedParameterArrayClear", }
"refsource": "MLIST", ]
"url": "http://www.openwall.com/lists/oss-security/2012/07/31/4" }
}, }
{ ]
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=844734", }
"refsource": "MISC", },
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=844734" "references": {
}, "reference_data": [
{ {
"name": "RHSA-2012:1202", "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00023.html",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1202.html" "name": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00023.html"
}, },
{ {
"name": "50299", "url": "http://rhn.redhat.com/errata/RHSA-2012-1202.html",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/50299" "name": "http://rhn.redhat.com/errata/RHSA-2012-1202.html"
}, },
{ {
"name": "50372", "url": "http://secunia.com/advisories/50118",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/50372" "name": "http://secunia.com/advisories/50118"
}, },
{ {
"name": "[oss-security] 20120731 Re: CVE Request -- libvirt: crash in virTypedParameterArrayClear", "url": "http://secunia.com/advisories/50299",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2012/07/31/7" "name": "http://secunia.com/advisories/50299"
}, },
{ {
"name": "openSUSE-SU-2012:0991", "url": "http://secunia.com/advisories/50372",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00023.html" "name": "http://secunia.com/advisories/50372"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/07/31/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/07/31/4"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/07/31/7",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/07/31/7"
},
{
"url": "http://www.securityfocus.com/bid/54748",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/54748"
},
{
"url": "https://www.redhat.com/archives/libvir-list/2012-July/msg01650.html",
"refsource": "MISC",
"name": "https://www.redhat.com/archives/libvir-list/2012-July/msg01650.html"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=844734",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=844734"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3446", "ID": "CVE-2012-3446",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,17 +27,41 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "https://svn.apache.org/repos/asf/libcloud/trunk/CHANGES", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "https://svn.apache.org/repos/asf/libcloud/trunk/CHANGES" "product_data": [
},
{ {
"name": "http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf", "product_name": "n/a",
"refsource": "MISC", "version": {
"url": "http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf" "version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf",
"refsource": "MISC",
"name": "http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf"
},
{
"url": "https://svn.apache.org/repos/asf/libcloud/trunk/CHANGES",
"refsource": "MISC",
"name": "https://svn.apache.org/repos/asf/libcloud/trunk/CHANGES"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3447", "ID": "CVE-2012-3447",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,47 +27,71 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "https://github.com/openstack/nova/commit/ce4b2e27be45a85b310237615c47eb53f37bb5f3", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "https://github.com/openstack/nova/commit/ce4b2e27be45a85b310237615c47eb53f37bb5f3" "product_data": [
},
{ {
"name": "[oss-security] 20120807 [OSSA 2012-011] Compute node filesystem injection/corruption (CVE-2012-3447)", "product_name": "n/a",
"refsource": "MLIST", "version": {
"url": "http://www.openwall.com/lists/oss-security/2012/08/07/1" "version_data": [
},
{ {
"name": "54869", "version_affected": "=",
"refsource": "BID", "version_value": "n/a"
"url": "http://www.securityfocus.com/bid/54869" }
}, ]
{ }
"name": "openstack-nova-code-execution(77539)", }
"refsource": "XF", ]
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77539" }
}, }
{ ]
"name": "https://review.openstack.org/#/c/10953/", }
"refsource": "CONFIRM", },
"url": "https://review.openstack.org/#/c/10953/" "references": {
}, "reference_data": [
{ {
"name": "https://bugs.launchpad.net/nova/+bug/1031311", "url": "http://www.openwall.com/lists/oss-security/2012/08/07/1",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugs.launchpad.net/nova/+bug/1031311" "name": "http://www.openwall.com/lists/oss-security/2012/08/07/1"
}, },
{ {
"name": "https://github.com/openstack/nova/commit/d9577ce9f266166a297488445b5b0c93c1ddb368", "url": "http://www.securityfocus.com/bid/54869",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://github.com/openstack/nova/commit/d9577ce9f266166a297488445b5b0c93c1ddb368" "name": "http://www.securityfocus.com/bid/54869"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=845106", "url": "https://bugs.launchpad.net/nova/+bug/1031311",
"refsource": "MISC", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=845106" "name": "https://bugs.launchpad.net/nova/+bug/1031311"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77539",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77539"
},
{
"url": "https://github.com/openstack/nova/commit/ce4b2e27be45a85b310237615c47eb53f37bb5f3",
"refsource": "MISC",
"name": "https://github.com/openstack/nova/commit/ce4b2e27be45a85b310237615c47eb53f37bb5f3"
},
{
"url": "https://github.com/openstack/nova/commit/d9577ce9f266166a297488445b5b0c93c1ddb368",
"refsource": "MISC",
"name": "https://github.com/openstack/nova/commit/d9577ce9f266166a297488445b5b0c93c1ddb368"
},
{
"url": "https://review.openstack.org/#/c/10953/",
"refsource": "MISC",
"name": "https://review.openstack.org/#/c/10953/"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=845106",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=845106"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3448", "ID": "CVE-2012-3448",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,62 +27,86 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "54699", "vendor_name": "n/a",
"refsource": "BID", "product": {
"url": "http://www.securityfocus.com/bid/54699" "product_data": [
},
{ {
"name": "FEDORA-2012-10727", "product_name": "n/a",
"refsource": "FEDORA", "version": {
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/084196.html" "version_data": [
},
{ {
"name": "38030", "version_affected": "=",
"refsource": "EXPLOIT-DB", "version_value": "n/a"
"url": "https://www.exploit-db.com/exploits/38030/" }
}, ]
{ }
"name": "FEDORA-2012-10699", }
"refsource": "FEDORA", ]
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/084202.html" }
}, }
{ ]
"name": "[oss-security] 20120801 Re: CVE request: Ganglia Web 3.5.1", }
"refsource": "MLIST", },
"url": "http://www.openwall.com/lists/oss-security/2012/08/02/1" "references": {
}, "reference_data": [
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=845124", "url": "http://ganglia.info/?p=549",
"refsource": "MISC", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=845124" "name": "http://ganglia.info/?p=549"
}, },
{ {
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00136.html", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/084196.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00136.html" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/084196.html"
}, },
{ {
"name": "DSA-2610", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/084202.html",
"refsource": "DEBIAN", "refsource": "MISC",
"url": "http://www.debian.org/security/2013/dsa-2610" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/084202.html"
}, },
{ {
"name": "50047", "url": "http://secunia.com/advisories/50047",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/50047" "name": "http://secunia.com/advisories/50047"
}, },
{ {
"name": "https://bugs.gentoo.org/show_bug.cgi?id=428776", "url": "http://www.debian.org/security/2013/dsa-2610",
"refsource": "MISC", "refsource": "MISC",
"url": "https://bugs.gentoo.org/show_bug.cgi?id=428776" "name": "http://www.debian.org/security/2013/dsa-2610"
}, },
{ {
"name": "http://ganglia.info/?p=549", "url": "http://www.openwall.com/lists/oss-security/2012/08/02/1",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://ganglia.info/?p=549" "name": "http://www.openwall.com/lists/oss-security/2012/08/02/1"
},
{
"url": "http://www.securityfocus.com/bid/54699",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/54699"
},
{
"url": "https://bugs.gentoo.org/show_bug.cgi?id=428776",
"refsource": "MISC",
"name": "https://bugs.gentoo.org/show_bug.cgi?id=428776"
},
{
"url": "https://www.exploit-db.com/exploits/38030/",
"refsource": "MISC",
"name": "https://www.exploit-db.com/exploits/38030/"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00136.html",
"refsource": "MISC",
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00136.html"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=845124",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=845124"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3450", "ID": "CVE-2012-3450",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,57 +27,81 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "[oss-security] 20120802 Re: CVE Request: php5 pdo array overread/crash", "vendor_name": "n/a",
"refsource": "MLIST", "product": {
"url": "http://www.openwall.com/lists/oss-security/2012/08/02/7" "product_data": [
},
{ {
"name": "DSA-2527", "product_name": "n/a",
"refsource": "DEBIAN", "version": {
"url": "http://www.debian.org/security/2012/dsa-2527" "version_data": [
},
{ {
"name": "http://www.php.net/ChangeLog-5.php", "version_affected": "=",
"refsource": "CONFIRM", "version_value": "n/a"
"url": "http://www.php.net/ChangeLog-5.php" }
}, ]
{ }
"name": "[oss-security] 20120802 CVE Request: php5 pdo array overread/crash", }
"refsource": "MLIST", ]
"url": "http://www.openwall.com/lists/oss-security/2012/08/02/3" }
}, }
{ ]
"name": "https://bugs.php.net/bug.php?id=61755", }
"refsource": "CONFIRM", },
"url": "https://bugs.php.net/bug.php?id=61755" "references": {
}, "reference_data": [
{ {
"name": "20120610 [php<=5.4.3] Parsing Bug in PHP PDO prepared statements may lead to access violation", "url": "http://www.php.net/ChangeLog-5.php",
"refsource": "BUGTRAQ", "refsource": "MISC",
"url": "http://seclists.org/bugtraq/2012/Jun/60" "name": "http://www.php.net/ChangeLog-5.php"
}, },
{ {
"name": "MDVSA-2012:108", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00021.html",
"refsource": "MANDRIVA", "refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:108" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00021.html"
}, },
{ {
"name": "USN-1569-1", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:108",
"refsource": "UBUNTU", "refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-1569-1" "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:108"
}, },
{ {
"name": "https://bugzilla.novell.com/show_bug.cgi?id=769785", "url": "http://seclists.org/bugtraq/2012/Jun/60",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=769785" "name": "http://seclists.org/bugtraq/2012/Jun/60"
}, },
{ {
"name": "SUSE-SU-2012:1033", "url": "http://www.debian.org/security/2012/dsa-2527",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00021.html" "name": "http://www.debian.org/security/2012/dsa-2527"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/08/02/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/08/02/3"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/08/02/7",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/08/02/7"
},
{
"url": "http://www.ubuntu.com/usn/USN-1569-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1569-1"
},
{
"url": "https://bugs.php.net/bug.php?id=61755",
"refsource": "MISC",
"name": "https://bugs.php.net/bug.php?id=61755"
},
{
"url": "https://bugzilla.novell.com/show_bug.cgi?id=769785",
"refsource": "MISC",
"name": "https://bugzilla.novell.com/show_bug.cgi?id=769785"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3455", "ID": "CVE-2012-3455",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,67 +27,91 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "50199", "vendor_name": "n/a",
"refsource": "SECUNIA", "product": {
"url": "http://secunia.com/advisories/50199" "product_data": [
},
{ {
"name": "[oss-security] 20120810 Re: CVE request for Calligra", "product_name": "n/a",
"refsource": "MLIST", "version": {
"url": "http://www.openwall.com/lists/oss-security/2012/08/10/1" "version_data": [
},
{ {
"name": "[oss-security] 20120806 Re: CVE request for Calligra", "version_affected": "=",
"refsource": "MLIST", "version_value": "n/a"
"url": "http://www.openwall.com/lists/oss-security/2012/08/06/6" }
}, ]
{ }
"name": "[oss-security] 20120805 Re: CVE request for Calligra", }
"refsource": "MLIST", ]
"url": "http://www.openwall.com/lists/oss-security/2012/08/06/1" }
}, }
{ ]
"name": "[oss-security] 20120804 Re: CVE request for Calligra", }
"refsource": "MLIST", },
"url": "http://www.openwall.com/lists/oss-security/2012/08/04/5" "references": {
}, "reference_data": [
{ {
"name": "koffice-kword-odf-bo(77483)", "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00040.html",
"refsource": "XF", "refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77483" "name": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00040.html"
}, },
{ {
"name": "http://media.blackhat.com/bh-us-12/Briefings/C_Miller/BH_US_12_Miller_NFC_attack_surface_WP.pdf", "url": "http://media.blackhat.com/bh-us-12/Briefings/C_Miller/BH_US_12_Miller_NFC_attack_surface_WP.pdf",
"refsource": "MISC", "refsource": "MISC",
"url": "http://media.blackhat.com/bh-us-12/Briefings/C_Miller/BH_US_12_Miller_NFC_attack_surface_WP.pdf" "name": "http://media.blackhat.com/bh-us-12/Briefings/C_Miller/BH_US_12_Miller_NFC_attack_surface_WP.pdf"
}, },
{ {
"name": "[oss-security] 20120804 CVE request for Calligra", "url": "http://secunia.com/advisories/50199",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2012/08/04/1" "name": "http://secunia.com/advisories/50199"
}, },
{ {
"name": "USN-1526-1", "url": "http://www.kde.org/info/security/advisory-20120810-1.txt",
"refsource": "UBUNTU", "refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-1526-1" "name": "http://www.kde.org/info/security/advisory-20120810-1.txt"
}, },
{ {
"name": "http://www.kde.org/info/security/advisory-20120810-1.txt", "url": "http://www.openwall.com/lists/oss-security/2012/08/04/1",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.kde.org/info/security/advisory-20120810-1.txt" "name": "http://www.openwall.com/lists/oss-security/2012/08/04/1"
}, },
{ {
"name": "54816", "url": "http://www.openwall.com/lists/oss-security/2012/08/04/5",
"refsource": "BID", "refsource": "MISC",
"url": "http://www.securityfocus.com/bid/54816" "name": "http://www.openwall.com/lists/oss-security/2012/08/04/5"
}, },
{ {
"name": "openSUSE-SU-2012:1060", "url": "http://www.openwall.com/lists/oss-security/2012/08/06/1",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00040.html" "name": "http://www.openwall.com/lists/oss-security/2012/08/06/1"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/08/06/6",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/08/06/6"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/08/10/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/08/10/1"
},
{
"url": "http://www.securityfocus.com/bid/54816",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/54816"
},
{
"url": "http://www.ubuntu.com/usn/USN-1526-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1526-1"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77483",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77483"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3456", "ID": "CVE-2012-3456",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,77 +27,96 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "calligra-styles-bo(77482)", "vendor_name": "n/a",
"refsource": "XF", "product": {
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77482" "product_data": [
},
{ {
"name": "[oss-security] 20120810 Re: CVE request for Calligra", "product_name": "n/a",
"refsource": "MLIST", "version": {
"url": "http://www.openwall.com/lists/oss-security/2012/08/10/1" "version_data": [
},
{ {
"name": "[oss-security] 20120806 Re: CVE request for Calligra", "version_affected": "=",
"refsource": "MLIST", "version_value": "n/a"
"url": "http://www.openwall.com/lists/oss-security/2012/08/06/6" }
}, ]
{ }
"name": "openSUSE-SU-2012:1061", }
"refsource": "SUSE", ]
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00026.html" }
}, }
{ ]
"name": "[oss-security] 20120805 Re: CVE request for Calligra", }
"refsource": "MLIST", },
"url": "http://www.openwall.com/lists/oss-security/2012/08/06/1" "references": {
}, "reference_data": [
{ {
"name": "[oss-security] 20120804 Re: CVE request for Calligra", "url": "http://media.blackhat.com/bh-us-12/Briefings/C_Miller/BH_US_12_Miller_NFC_attack_surface_WP.pdf",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2012/08/04/5" "name": "http://media.blackhat.com/bh-us-12/Briefings/C_Miller/BH_US_12_Miller_NFC_attack_surface_WP.pdf"
}, },
{ {
"name": "SSRT101182", "url": "http://www.kde.org/info/security/advisory-20120810-1.txt",
"refsource": "HP", "refsource": "MISC",
"url": "http://marc.info/?l=bugtraq&m=136733075705494&w=2" "name": "http://www.kde.org/info/security/advisory-20120810-1.txt"
}, },
{ {
"name": "http://media.blackhat.com/bh-us-12/Briefings/C_Miller/BH_US_12_Miller_NFC_attack_surface_WP.pdf", "url": "http://www.openwall.com/lists/oss-security/2012/08/04/1",
"refsource": "MISC", "refsource": "MISC",
"url": "http://media.blackhat.com/bh-us-12/Briefings/C_Miller/BH_US_12_Miller_NFC_attack_surface_WP.pdf" "name": "http://www.openwall.com/lists/oss-security/2012/08/04/1"
}, },
{ {
"name": "[oss-security] 20120804 CVE request for Calligra", "url": "http://www.openwall.com/lists/oss-security/2012/08/04/5",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2012/08/04/1" "name": "http://www.openwall.com/lists/oss-security/2012/08/04/5"
}, },
{ {
"name": "USN-1525-1", "url": "http://www.openwall.com/lists/oss-security/2012/08/06/1",
"refsource": "UBUNTU", "refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-1525-1" "name": "http://www.openwall.com/lists/oss-security/2012/08/06/1"
}, },
{ {
"name": "http://www.kde.org/info/security/advisory-20120810-1.txt", "url": "http://www.openwall.com/lists/oss-security/2012/08/06/6",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.kde.org/info/security/advisory-20120810-1.txt" "name": "http://www.openwall.com/lists/oss-security/2012/08/06/6"
}, },
{ {
"name": "50050", "url": "http://www.openwall.com/lists/oss-security/2012/08/10/1",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/50050" "name": "http://www.openwall.com/lists/oss-security/2012/08/10/1"
}, },
{ {
"name": "HPSBMU02873", "url": "http://www.securityfocus.com/bid/54816",
"refsource": "HP", "refsource": "MISC",
"url": "http://marc.info/?l=bugtraq&m=136733075705494&w=2" "name": "http://www.securityfocus.com/bid/54816"
}, },
{ {
"name": "54816", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00026.html",
"refsource": "BID", "refsource": "MISC",
"url": "http://www.securityfocus.com/bid/54816" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00026.html"
},
{
"url": "http://marc.info/?l=bugtraq&m=136733075705494&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=bugtraq&m=136733075705494&w=2"
},
{
"url": "http://secunia.com/advisories/50050",
"refsource": "MISC",
"name": "http://secunia.com/advisories/50050"
},
{
"url": "http://www.ubuntu.com/usn/USN-1525-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1525-1"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77482",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77482"
} }
] ]
} }