"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-02-13 03:00:37 +00:00
parent bac141448a
commit 9c570d9205
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
47 changed files with 2091 additions and 2814 deletions

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-2483 libtiff: out-of-bounds read crash on images with invalid SamplesPerPixel values"
"value": "The TIFFRGBAImageGet function in LibTIFF 3.9.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a TIFF file with an invalid combination of SamplesPerPixel and Photometric values."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Out-of-bounds Read",
"cweId": "CWE-125"
"value": "n/a"
}
]
}
@ -32,27 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 4",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:3.6.1-12.el4_8.5",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5",
"version": {
"version_data": [
{
"version_value": "0:3.8.2-7.el5_5.5",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -125,21 +113,11 @@
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/1761"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0519",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0519"
},
{
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2216",
"refsource": "MISC",
"name": "http://bugzilla.maptools.org/show_bug.cgi?id=2216"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-2483",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-2483"
},
{
"url": "https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/591605",
"refsource": "MISC",
@ -149,36 +127,6 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=603081",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=603081"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=611900",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=611900"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.3,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2484",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,52 +27,71 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://support.apple.com/kb/HT4435",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4435"
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
},
{
"name": "HPSBOV02763",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
"url": "http://support.apple.com/kb/HT4435",
"refsource": "MISC",
"name": "http://support.apple.com/kb/HT4435"
},
{
"name": "http://www.php.net/releases/5_2_14.php",
"refsource": "CONFIRM",
"url": "http://www.php.net/releases/5_2_14.php"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html"
},
{
"name": "APPLE-SA-2010-11-10-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
"url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
},
{
"name": "APPLE-SA-2010-08-24-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html"
"url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=619324",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=619324"
"url": "http://support.apple.com/kb/HT4312",
"refsource": "MISC",
"name": "http://support.apple.com/kb/HT4312"
},
{
"name": "SSRT100826",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
"url": "http://www.php.net/releases/5_2_14.php",
"refsource": "MISC",
"name": "http://www.php.net/releases/5_2_14.php"
},
{
"name": "http://support.apple.com/kb/HT4312",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4312"
},
{
"name": "SUSE-SR:2010:018",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=619324",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=619324"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2487",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,92 +27,116 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://hg.moinmo.in/moin/1.8/rev/4238b0c90871",
"refsource": "CONFIRM",
"url": "http://hg.moinmo.in/moin/1.8/rev/4238b0c90871"
"url": "http://moinmo.in/SecurityFixes",
"refsource": "MISC",
"name": "http://moinmo.in/SecurityFixes"
},
{
"name": "ADV-2010-1981",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1981"
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584809",
"refsource": "MISC",
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584809"
},
{
"name": "http://moinmo.in/MoinMoinRelease1.9",
"refsource": "CONFIRM",
"url": "http://moinmo.in/MoinMoinRelease1.9"
"url": "http://hg.moinmo.in/moin/1.7/rev/37306fba2189",
"refsource": "MISC",
"name": "http://hg.moinmo.in/moin/1.7/rev/37306fba2189"
},
{
"name": "http://moinmo.in/SecurityFixes",
"refsource": "CONFIRM",
"url": "http://moinmo.in/SecurityFixes"
"url": "http://hg.moinmo.in/moin/1.8/raw-file/1.8.8/docs/CHANGES",
"refsource": "MISC",
"name": "http://hg.moinmo.in/moin/1.8/raw-file/1.8.8/docs/CHANGES"
},
{
"name": "40549",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/40549"
"url": "http://hg.moinmo.in/moin/1.8/rev/4238b0c90871",
"refsource": "MISC",
"name": "http://hg.moinmo.in/moin/1.8/rev/4238b0c90871"
},
{
"name": "http://hg.moinmo.in/moin/1.9/rev/68ba3cc79513",
"refsource": "CONFIRM",
"url": "http://hg.moinmo.in/moin/1.9/rev/68ba3cc79513"
"url": "http://hg.moinmo.in/moin/1.9/raw-file/1.9.3/docs/CHANGES",
"refsource": "MISC",
"name": "http://hg.moinmo.in/moin/1.9/raw-file/1.9.3/docs/CHANGES"
},
{
"name": "DSA-2083",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2083"
"url": "http://hg.moinmo.in/moin/1.9/rev/68ba3cc79513",
"refsource": "MISC",
"name": "http://hg.moinmo.in/moin/1.9/rev/68ba3cc79513"
},
{
"name": "http://hg.moinmo.in/moin/1.9/rev/e50b087c4572",
"refsource": "CONFIRM",
"url": "http://hg.moinmo.in/moin/1.9/rev/e50b087c4572"
"url": "http://hg.moinmo.in/moin/1.9/rev/e50b087c4572",
"refsource": "MISC",
"name": "http://hg.moinmo.in/moin/1.9/rev/e50b087c4572"
},
{
"name": "http://moinmo.in/MoinMoinRelease1.8",
"refsource": "CONFIRM",
"url": "http://moinmo.in/MoinMoinRelease1.8"
"url": "http://marc.info/?l=oss-security&m=127799369406968&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=127799369406968&w=2"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584809",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584809"
"url": "http://marc.info/?l=oss-security&m=127809682420259&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=127809682420259&w=2"
},
{
"name": "[oss-security] 20100701 CVE request: moin multiple XSS",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127799369406968&w=2"
"url": "http://moinmo.in/MoinMoinBugs/1.9.2UnescapedInputForThemeAddMsg",
"refsource": "MISC",
"name": "http://moinmo.in/MoinMoinBugs/1.9.2UnescapedInputForThemeAddMsg"
},
{
"name": "[oss-security] 20100702 Re: CVE request: moin multiple XSS",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127809682420259&w=2"
"url": "http://moinmo.in/MoinMoinRelease1.8",
"refsource": "MISC",
"name": "http://moinmo.in/MoinMoinRelease1.8"
},
{
"name": "http://hg.moinmo.in/moin/1.8/raw-file/1.8.8/docs/CHANGES",
"refsource": "CONFIRM",
"url": "http://hg.moinmo.in/moin/1.8/raw-file/1.8.8/docs/CHANGES"
"url": "http://moinmo.in/MoinMoinRelease1.9",
"refsource": "MISC",
"name": "http://moinmo.in/MoinMoinRelease1.9"
},
{
"name": "http://hg.moinmo.in/moin/1.9/raw-file/1.9.3/docs/CHANGES",
"refsource": "CONFIRM",
"url": "http://hg.moinmo.in/moin/1.9/raw-file/1.9.3/docs/CHANGES"
"url": "http://secunia.com/advisories/40836",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40836"
},
{
"name": "http://hg.moinmo.in/moin/1.7/rev/37306fba2189",
"refsource": "CONFIRM",
"url": "http://hg.moinmo.in/moin/1.7/rev/37306fba2189"
"url": "http://www.debian.org/security/2010/dsa-2083",
"refsource": "MISC",
"name": "http://www.debian.org/security/2010/dsa-2083"
},
{
"name": "40836",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40836"
"url": "http://www.securityfocus.com/bid/40549",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/40549"
},
{
"name": "http://moinmo.in/MoinMoinBugs/1.9.2UnescapedInputForThemeAddMsg",
"refsource": "CONFIRM",
"url": "http://moinmo.in/MoinMoinBugs/1.9.2UnescapedInputForThemeAddMsg"
"url": "http://www.vupen.com/english/advisories/2010/1981",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/1981"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2490",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "1.2.2"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,12 +27,36 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.2.2"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://security-tracker.debian.org/tracker/CVE-2010-2490",
"url": "https://access.redhat.com/security/cve/cve-2010-2490",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2010-2490"
"name": "https://access.redhat.com/security/cve/cve-2010-2490"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2490",
@ -63,9 +64,9 @@
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2490"
},
{
"url": "https://access.redhat.com/security/cve/cve-2010-2490",
"url": "https://security-tracker.debian.org/tracker/CVE-2010-2490",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2010-2490"
"name": "https://security-tracker.debian.org/tracker/CVE-2010-2490"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2491",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,77 +27,101 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "FEDORA-2010-12290",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048221.html"
"url": "http://bugs.gentoo.org/show_bug.cgi?id=326395",
"refsource": "MISC",
"name": "http://bugs.gentoo.org/show_bug.cgi?id=326395"
},
{
"name": "[roundup-devel] 20100701 Roundup Issue Tracker 1.4.14 released",
"refsource": "MLIST",
"url": "http://sourceforge.net/mailarchive/message.php?msg_name=AANLkTimIYtyRzTAReGmTSCEqPYBvwkkxrP6YKrdVm_nU%40mail.gmail.com"
"url": "http://issues.roundup-tracker.org/issue2550654",
"refsource": "MISC",
"name": "http://issues.roundup-tracker.org/issue2550654"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=326395",
"refsource": "CONFIRM",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=326395"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048018.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048018.html"
},
{
"name": "41585",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41585"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048061.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048061.html"
},
{
"name": "FEDORA-2010-12261",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048061.html"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048221.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048221.html"
},
{
"name": "http://issues.roundup-tracker.org/issue2550654",
"refsource": "CONFIRM",
"url": "http://issues.roundup-tracker.org/issue2550654"
"url": "http://roundup.svn.sourceforge.net/viewvc/roundup/roundup/trunk/roundup/cgi/client.py?r1=4486&r2=4485&pathrev=4486",
"refsource": "MISC",
"name": "http://roundup.svn.sourceforge.net/viewvc/roundup/roundup/trunk/roundup/cgi/client.py?r1=4486&r2=4485&pathrev=4486"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=610861",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=610861"
"url": "http://roundup.svn.sourceforge.net/viewvc/roundup?view=revision&revision=4486",
"refsource": "MISC",
"name": "http://roundup.svn.sourceforge.net/viewvc/roundup?view=revision&revision=4486"
},
{
"name": "[oss-security] 20100702 CVE Request -- Roundup: XSS by processing PageTemplate template for a named page",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/07/02/3"
"url": "http://secunia.com/advisories/40433",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40433"
},
{
"name": "40433",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40433"
"url": "http://secunia.com/advisories/41585",
"refsource": "MISC",
"name": "http://secunia.com/advisories/41585"
},
{
"name": "41326",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/41326"
"url": "http://sourceforge.net/mailarchive/message.php?msg_name=AANLkTimIYtyRzTAReGmTSCEqPYBvwkkxrP6YKrdVm_nU%40mail.gmail.com",
"refsource": "MISC",
"name": "http://sourceforge.net/mailarchive/message.php?msg_name=AANLkTimIYtyRzTAReGmTSCEqPYBvwkkxrP6YKrdVm_nU%40mail.gmail.com"
},
{
"name": "[oss-security] 20100702 Re: CVE Request -- Roundup: XSS by processing PageTemplate template for a named page",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/07/02/12"
"url": "http://www.openwall.com/lists/oss-security/2010/07/02/12",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/07/02/12"
},
{
"name": "http://roundup.svn.sourceforge.net/viewvc/roundup/roundup/trunk/roundup/cgi/client.py?r1=4486&r2=4485&pathrev=4486",
"refsource": "CONFIRM",
"url": "http://roundup.svn.sourceforge.net/viewvc/roundup/roundup/trunk/roundup/cgi/client.py?r1=4486&r2=4485&pathrev=4486"
"url": "http://www.openwall.com/lists/oss-security/2010/07/02/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/07/02/3"
},
{
"name": "http://roundup.svn.sourceforge.net/viewvc/roundup?view=revision&revision=4486",
"refsource": "CONFIRM",
"url": "http://roundup.svn.sourceforge.net/viewvc/roundup?view=revision&revision=4486"
"url": "http://www.securityfocus.com/bid/41326",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/41326"
},
{
"name": "FEDORA-2010-12269",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048018.html"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=610861",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=610861"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-2492 kernel: ecryptfs_uid_hash() buffer overflow"
"value": "Buffer overflow in the ecryptfs_uid_hash macro in fs/ecryptfs/messaging.c in the eCryptfs subsystem in the Linux kernel before 2.6.35 might allow local users to gain privileges or cause a denial of service (system crash) via unspecified vectors."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"cweId": "CWE-119"
"value": "n/a"
}
]
}
@ -32,27 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:2.6.18-194.17.1.el5",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:2.6.32-71.14.1.el6",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -85,11 +73,6 @@
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0007.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2011:0007",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0007"
},
{
"url": "http://secunia.com/advisories/46397",
"refsource": "MISC",
@ -125,46 +108,11 @@
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0723.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0723",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0723"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-2492",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-2492"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=611385",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=611385"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 7.2,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "COMPLETE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "COMPLETE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
]
}
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2493",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=614774",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=614774"
"url": "http://secunia.com/advisories/40681",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40681"
},
{
"name": "https://jira.jboss.org/browse/SOA-2105",
"refsource": "CONFIRM",
"url": "https://jira.jboss.org/browse/SOA-2105"
"url": "http://www.redhat.com/docs/en-US/JBoss_SOA_Platform/5.0.2/html/5.0.2_Release_Notes/index.html",
"refsource": "MISC",
"name": "http://www.redhat.com/docs/en-US/JBoss_SOA_Platform/5.0.2/html/5.0.2_Release_Notes/index.html"
},
{
"name": "40681",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40681"
"url": "https://jira.jboss.org/browse/SOA-2105",
"refsource": "MISC",
"name": "https://jira.jboss.org/browse/SOA-2105"
},
{
"name": "http://www.redhat.com/docs/en-US/JBoss_SOA_Platform/5.0.2/html/5.0.2_Release_Notes/index.html",
"refsource": "CONFIRM",
"url": "http://www.redhat.com/docs/en-US/JBoss_SOA_Platform/5.0.2/html/5.0.2_Release_Notes/index.html"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=614774",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=614774"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2494",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,107 +27,131 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "FEDORA-2010-13139",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046558.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
},
{
"name": "[oss-security] 20100706 REPOST: CVE request for bogofilter",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127840569013531&w=2"
"url": "http://bogofilter.sourceforge.net/security/bogofilter-SA-2010-01",
"refsource": "MISC",
"name": "http://bogofilter.sourceforge.net/security/bogofilter-SA-2010-01"
},
{
"name": "40427",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40427"
"url": "http://bogofilter.svn.sourceforge.net/viewvc/bogofilter/trunk/bogofilter/doc/bogofilter-SA-2010-01?revision=6909&pathrev=6909",
"refsource": "MISC",
"name": "http://bogofilter.svn.sourceforge.net/viewvc/bogofilter/trunk/bogofilter/doc/bogofilter-SA-2010-01?revision=6909&pathrev=6909"
},
{
"name": "http://bogofilter.sourceforge.net/security/bogofilter-SA-2010-01",
"refsource": "CONFIRM",
"url": "http://bogofilter.sourceforge.net/security/bogofilter-SA-2010-01"
"url": "http://bogofilter.svn.sourceforge.net/viewvc/bogofilter/trunk/bogofilter/src/base64.c?view=patch&r1=6906&r2=6903",
"refsource": "MISC",
"name": "http://bogofilter.svn.sourceforge.net/viewvc/bogofilter/trunk/bogofilter/src/base64.c?view=patch&r1=6906&r2=6903"
},
{
"name": "41239",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41239"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046558.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046558.html"
},
{
"name": "http://bogofilter.svn.sourceforge.net/viewvc/bogofilter/trunk/bogofilter/doc/bogofilter-SA-2010-01?revision=6909&pathrev=6909",
"refsource": "CONFIRM",
"url": "http://bogofilter.svn.sourceforge.net/viewvc/bogofilter/trunk/bogofilter/doc/bogofilter-SA-2010-01?revision=6909&pathrev=6909"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046590.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046590.html"
},
{
"name": "66002",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/66002"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00015.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00015.html"
},
{
"name": "openSUSE-SU-2012:1650",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00016.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00016.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00016.html"
},
{
"name": "openSUSE-SU-2012:1648",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00015.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00021.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00021.html"
},
{
"name": "[oss-security] 20100706 Re: Request CVE ID for bogofilter base64 decoder",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127844323105405&w=2"
"url": "http://marc.info/?l=oss-security&m=127814747231102&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=127814747231102&w=2"
},
{
"name": "openSUSE-SU-2013:0166",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00021.html"
"url": "http://marc.info/?l=oss-security&m=127831760712436&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=127831760712436&w=2"
},
{
"name": "http://bogofilter.svn.sourceforge.net/viewvc/bogofilter/trunk/bogofilter/src/base64.c?view=patch&r1=6906&r2=6903",
"refsource": "CONFIRM",
"url": "http://bogofilter.svn.sourceforge.net/viewvc/bogofilter/trunk/bogofilter/src/base64.c?view=patch&r1=6906&r2=6903"
"url": "http://marc.info/?l=oss-security&m=127840569013531&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=127840569013531&w=2"
},
{
"name": "ADV-2010-2233",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2233"
"url": "http://marc.info/?l=oss-security&m=127844323105405&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=127844323105405&w=2"
},
{
"name": "41339",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/41339"
"url": "http://secunia.com/advisories/40427",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40427"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=611551",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=611551"
"url": "http://secunia.com/advisories/41239",
"refsource": "MISC",
"name": "http://secunia.com/advisories/41239"
},
{
"name": "SUSE-SR:2010:014",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
"url": "http://www.osvdb.org/66002",
"refsource": "MISC",
"name": "http://www.osvdb.org/66002"
},
{
"name": "FEDORA-2010-13154",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046590.html"
"url": "http://www.securityfocus.com/bid/41339",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/41339"
},
{
"name": "[oss-security] 20100705 Request CVE ID for bogofilter base64 decoder",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127814747231102&w=2"
"url": "http://www.ubuntu.com/usn/USN-980-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-980-1"
},
{
"name": "USN-980-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-980-1"
"url": "http://www.vupen.com/english/advisories/2010/2233",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/2233"
},
{
"name": "[oss-security] 20100705 Re: Request CVE ID for bogofilter base64 decoder",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127831760712436&w=2"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=611551",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=611551"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-2495 kernel: l2tp: Fix oops in pppol2tp_xmit"
"value": "The pppol2tp_xmit function in drivers/net/pppol2tp.c in the L2TP implementation in the Linux kernel before 2.6.34 does not properly validate certain values associated with an interface, which allows attackers to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via vectors related to a routing change."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "NULL Pointer Dereference",
"cweId": "CWE-476"
"value": "n/a"
}
]
}
@ -40,8 +39,8 @@
"version": {
"version_data": [
{
"version_value": "n/a",
"version_affected": "="
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -94,41 +93,11 @@
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/07/06/11"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-2495",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-2495"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=607054",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=607054"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 7.8,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
}
]
}
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2497",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,67 +27,91 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://savannah.nongnu.org/bugs/?30082",
"refsource": "CONFIRM",
"url": "https://savannah.nongnu.org/bugs/?30082"
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
},
{
"name": "http://support.apple.com/kb/HT4435",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4435"
"url": "http://support.apple.com/kb/HT4435",
"refsource": "MISC",
"name": "http://support.apple.com/kb/HT4435"
},
{
"name": "[freetype] 20100712 FreeType 2.4.0 has been released",
"refsource": "MLIST",
"url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"
"url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html",
"refsource": "MISC",
"name": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"
},
{
"name": "APPLE-SA-2010-11-10-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
"url": "http://marc.info/?l=oss-security&m=127905701201340&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=127905701201340&w=2"
},
{
"name": "[oss-security] 20100714 Re: Multiple bugs in freetype",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127909326909362&w=2"
"url": "http://marc.info/?l=oss-security&m=127909326909362&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=127909326909362&w=2"
},
{
"name": "DSA-2070",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2070"
"url": "http://secunia.com/advisories/48951",
"refsource": "MISC",
"name": "http://secunia.com/advisories/48951"
},
{
"name": "[oss-security] 20100713 Multiple bugs in freetype",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127905701201340&w=2"
"url": "http://www.debian.org/security/2010/dsa-2070",
"refsource": "MISC",
"name": "http://www.debian.org/security/2010/dsa-2070"
},
{
"name": "MDVSA-2010:137",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=613154",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=613154"
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc",
"refsource": "MISC",
"name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc"
},
{
"name": "https://savannah.nongnu.org/bugs/?30083",
"refsource": "CONFIRM",
"url": "https://savannah.nongnu.org/bugs/?30083"
"url": "https://savannah.nongnu.org/bugs/?30082",
"refsource": "MISC",
"name": "https://savannah.nongnu.org/bugs/?30082"
},
{
"name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc",
"refsource": "CONFIRM",
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc"
"url": "https://savannah.nongnu.org/bugs/?30083",
"refsource": "MISC",
"name": "https://savannah.nongnu.org/bugs/?30083"
},
{
"name": "48951",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48951"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=613154",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=613154"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2498",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,77 +27,101 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "USN-963-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-963-1"
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
},
{
"name": "http://support.apple.com/kb/HT4435",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4435"
"url": "http://support.apple.com/kb/HT4435",
"refsource": "MISC",
"name": "http://support.apple.com/kb/HT4435"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=613160",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=613160"
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2",
"refsource": "MISC",
"name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2"
},
{
"name": "https://savannah.nongnu.org/bugs/?30106",
"refsource": "CONFIRM",
"url": "https://savannah.nongnu.org/bugs/?30106"
"url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html",
"refsource": "MISC",
"name": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"
},
{
"name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2",
"refsource": "CONFIRM",
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2"
"url": "http://marc.info/?l=oss-security&m=127905701201340&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=127905701201340&w=2"
},
{
"name": "[freetype] 20100712 FreeType 2.4.0 has been released",
"refsource": "MLIST",
"url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"
"url": "http://marc.info/?l=oss-security&m=127909326909362&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=127909326909362&w=2"
},
{
"name": "APPLE-SA-2010-11-10-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
"url": "http://secunia.com/advisories/48951",
"refsource": "MISC",
"name": "http://secunia.com/advisories/48951"
},
{
"name": "[oss-security] 20100714 Re: Multiple bugs in freetype",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127909326909362&w=2"
"url": "http://securitytracker.com/id?1024266",
"refsource": "MISC",
"name": "http://securitytracker.com/id?1024266"
},
{
"name": "DSA-2070",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2070"
"url": "http://www.debian.org/security/2010/dsa-2070",
"refsource": "MISC",
"name": "http://www.debian.org/security/2010/dsa-2070"
},
{
"name": "[oss-security] 20100713 Multiple bugs in freetype",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127905701201340&w=2"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"
},
{
"name": "1024266",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1024266"
"url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0578.html"
},
{
"name": "RHSA-2010:0578",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html"
"url": "http://www.ubuntu.com/usn/USN-963-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-963-1"
},
{
"name": "MDVSA-2010:137",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"
"url": "https://savannah.nongnu.org/bugs/?30106",
"refsource": "MISC",
"name": "https://savannah.nongnu.org/bugs/?30106"
},
{
"name": "48951",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48951"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=613160",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=613160"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2499",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,87 +27,111 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c69891a1345640096fbf396e8dd567fe879ce233",
"refsource": "CONFIRM",
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c69891a1345640096fbf396e8dd567fe879ce233"
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
},
{
"name": "https://savannah.nongnu.org/bugs/?30248",
"refsource": "CONFIRM",
"url": "https://savannah.nongnu.org/bugs/?30248"
"url": "http://support.apple.com/kb/HT4435",
"refsource": "MISC",
"name": "http://support.apple.com/kb/HT4435"
},
{
"name": "USN-963-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-963-1"
"url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html",
"refsource": "MISC",
"name": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"
},
{
"name": "http://support.apple.com/kb/HT4435",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4435"
"url": "http://marc.info/?l=oss-security&m=127905701201340&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=127905701201340&w=2"
},
{
"name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f29f741efbba0a5ce2f16464f648fb8d026ed4c8",
"refsource": "CONFIRM",
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f29f741efbba0a5ce2f16464f648fb8d026ed4c8"
"url": "http://marc.info/?l=oss-security&m=127909326909362&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=127909326909362&w=2"
},
{
"name": "[freetype] 20100712 FreeType 2.4.0 has been released",
"refsource": "MLIST",
"url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"
"url": "http://secunia.com/advisories/48951",
"refsource": "MISC",
"name": "http://secunia.com/advisories/48951"
},
{
"name": "APPLE-SA-2010-11-10-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
"url": "http://securitytracker.com/id?1024266",
"refsource": "MISC",
"name": "http://securitytracker.com/id?1024266"
},
{
"name": "[oss-security] 20100714 Re: Multiple bugs in freetype",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127909326909362&w=2"
"url": "http://www.debian.org/security/2010/dsa-2070",
"refsource": "MISC",
"name": "http://www.debian.org/security/2010/dsa-2070"
},
{
"name": "DSA-2070",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2070"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"
},
{
"name": "[oss-security] 20100713 Multiple bugs in freetype",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127905701201340&w=2"
"url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0578.html"
},
{
"name": "1024266",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1024266"
"url": "http://www.ubuntu.com/usn/USN-963-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-963-1"
},
{
"name": "https://savannah.nongnu.org/bugs/?30249",
"refsource": "CONFIRM",
"url": "https://savannah.nongnu.org/bugs/?30249"
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c69891a1345640096fbf396e8dd567fe879ce233",
"refsource": "MISC",
"name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c69891a1345640096fbf396e8dd567fe879ce233"
},
{
"name": "RHSA-2010:0578",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html"
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f29f741efbba0a5ce2f16464f648fb8d026ed4c8",
"refsource": "MISC",
"name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f29f741efbba0a5ce2f16464f648fb8d026ed4c8"
},
{
"name": "MDVSA-2010:137",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"
"url": "https://savannah.nongnu.org/bugs/?30248",
"refsource": "MISC",
"name": "https://savannah.nongnu.org/bugs/?30248"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=613162",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=613162"
"url": "https://savannah.nongnu.org/bugs/?30249",
"refsource": "MISC",
"name": "https://savannah.nongnu.org/bugs/?30249"
},
{
"name": "48951",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48951"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=613162",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=613162"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-2500 freetype: integer overflow vulnerability in smooth/ftgrays.c"
"value": "Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Integer Overflow or Wraparound",
"cweId": "CWE-190"
"value": "n/a"
}
]
}
@ -32,38 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 3",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:2.1.4-15.el3",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 4",
"version": {
"version_data": [
{
"version_value": "0:2.1.9-14.el4.8",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5",
"version": {
"version_data": [
{
"version_value": "0:2.2.1-25.el5_5",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -131,11 +108,6 @@
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-963-1"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0578",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0578"
},
{
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee",
"refsource": "MISC",
@ -147,49 +119,14 @@
"name": "http://www.redhat.com/support/errata/RHSA-2010-0577.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0577",
"url": "https://savannah.nongnu.org/bugs/?30263",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0577"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-2500",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-2500"
"name": "https://savannah.nongnu.org/bugs/?30263"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=613167",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=613167"
},
{
"url": "https://savannah.nongnu.org/bugs/?30263",
"refsource": "MISC",
"name": "https://savannah.nongnu.org/bugs/?30263"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.8,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-4530 CCID: Integer overflow, leading to array index error when processing crafted serial number of certain cards"
"value": "Signedness error in ccid_serial.c in libccid in the USB Chip/Smart Card Interface Devices (CCID) driver, as used in pcscd in PCSC-Lite 1.5.3 and possibly other products, allows physically proximate attackers to execute arbitrary code via a smart card with a crafted serial number that causes a negative value to be used in a memcpy operation, which triggers a buffer overflow. NOTE: some sources refer to this issue as an integer overflow."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Integer Overflow or Wraparound",
"cweId": "CWE-190"
"value": "n/a"
}
]
}
@ -32,27 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:1.3.8-2.el5",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:1.3.9-6.el6",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -121,54 +109,14 @@
"name": "http://www.vupen.com/english/advisories/2011/0179"
},
{
"url": "https://access.redhat.com/errata/RHSA-2013:0523",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64961",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:0523"
},
{
"url": "https://access.redhat.com/errata/RHSA-2013:1323",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:1323"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-4530",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-4530"
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64961"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=664986",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=664986"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64961",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64961"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.6,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-4531 pcsc-lite: Stack-based buffer overflow in Answer-to-Reset (ATR) decoder"
"value": "Stack-based buffer overflow in the ATRDecodeAtr function in the Answer-to-Reset (ATR) Handler (atrhandler.c) for pcscd in PCSC-Lite 1.5.3, and possibly other 1.5.x and 1.6.x versions, allows physically proximate attackers to cause a denial of service (crash) and possibly execute arbitrary code via a smart card with an ATR message containing a long attribute value."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Stack-based Buffer Overflow",
"cweId": "CWE-121"
"value": "n/a"
}
]
}
@ -32,16 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 6",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:1.5.2-11.el6",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -134,51 +133,11 @@
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0256"
},
{
"url": "https://access.redhat.com/errata/RHSA-2013:0525",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:0525"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-4531",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-4531"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=664999",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=664999"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4531",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4531"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.6,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4532",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "offlineimap",
"product": {
"product_data": [
{
"product_name": "offlineimap",
"version": {
"version_data": [
{
"version_value": "before 6.3.2"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,12 +27,41 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "offlineimap",
"product": {
"product_data": [
{
"product_name": "offlineimap",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "before 6.3.2"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://security-tracker.debian.org/tracker/CVE-2010-4532",
"url": "https://access.redhat.com/security/cve/cve-2010-4532",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2010-4532"
"name": "https://access.redhat.com/security/cve/cve-2010-4532"
},
{
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603450",
"refsource": "MISC",
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603450"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4532",
@ -63,19 +69,14 @@
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4532"
},
{
"url": "https://access.redhat.com/security/cve/cve-2010-4532",
"url": "https://security-tracker.debian.org/tracker/CVE-2010-4532",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2010-4532"
"name": "https://security-tracker.debian.org/tracker/CVE-2010-4532"
},
{
"url": "https://www.openwall.com/lists/oss-security/2010/12/23/2",
"refsource": "MISC",
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603450",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603450"
},
{
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2010/12/23/2",
"url": "https://www.openwall.com/lists/oss-security/2010/12/23/2"
"name": "https://www.openwall.com/lists/oss-security/2010/12/23/2"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4533",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "offlineimap",
"product": {
"product_data": [
{
"product_name": "offlineimap",
"version": {
"version_data": [
{
"version_value": "before 6.3.4"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,17 +27,36 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "offlineimap",
"product": {
"product_data": [
{
"product_name": "offlineimap",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "before 6.3.4"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://security-tracker.debian.org/tracker/CVE-2010-4533",
"url": "https://www.openwall.com/lists/oss-security/2010/12/23/2",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2010-4533"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4533",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4533"
"name": "https://www.openwall.com/lists/oss-security/2010/12/23/2"
},
{
"url": "https://access.redhat.com/security/cve/cve-2010-4533",
@ -68,14 +64,19 @@
"name": "https://access.redhat.com/security/cve/cve-2010-4533"
},
{
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606962",
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2010/12/23/2",
"url": "https://www.openwall.com/lists/oss-security/2010/12/23/2"
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606962"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4533",
"refsource": "MISC",
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606962",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606962"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4533"
},
{
"url": "https://security-tracker.debian.org/tracker/CVE-2010-4533",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2010-4533"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4534",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,97 +27,121 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "45562",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45562"
},
{
"name": "http://ngenuity-is.com/advisories/2010/dec/22/information-leakage-in-django-administrative-inter/",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0580.html",
"refsource": "MISC",
"url": "http://ngenuity-is.com/advisories/2010/dec/22/information-leakage-in-django-administrative-inter/"
"name": "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0580.html"
},
{
"name": "[oss-security] 20101223 CVE Request -- Django 1.2.4, Django 1.1.3 and Django 1.3 beta 1 -- addressing two security flaws",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/12/23/4"
},
{
"name": "20101223 Django admin list filter data extraction / leakage",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/515446"
},
{
"name": "USN-1040-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1040-1"
},
{
"name": "[oss-security] 20110103 Re: CVE Request -- Django 1.2.4, Django 1.1.3 and Django 1.3 beta 1 -- addressing two security flaws",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/01/03/5"
},
{
"name": "42913",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42913"
},
{
"name": "http://evilpacket.net/2010/dec/22/information-leakage-django-administrative-interfac/",
"url": "http://code.djangoproject.com/changeset/15031",
"refsource": "MISC",
"url": "http://evilpacket.net/2010/dec/22/information-leakage-django-administrative-interfac/"
"name": "http://code.djangoproject.com/changeset/15031"
},
{
"name": "http://code.djangoproject.com/changeset/15031",
"refsource": "CONFIRM",
"url": "http://code.djangoproject.com/changeset/15031"
"url": "http://evilpacket.net/2010/dec/22/information-leakage-django-administrative-interfac/",
"refsource": "MISC",
"name": "http://evilpacket.net/2010/dec/22/information-leakage-django-administrative-interfac/"
},
{
"name": "ADV-2011-0048",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0048"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html"
},
{
"name": "ADV-2011-0098",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0098"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html"
},
{
"name": "http://www.djangoproject.com/weblog/2010/dec/22/security/",
"refsource": "CONFIRM",
"url": "http://www.djangoproject.com/weblog/2010/dec/22/security/"
"url": "http://ngenuity-is.com/advisories/2010/dec/22/information-leakage-in-django-administrative-inter/",
"refsource": "MISC",
"name": "http://ngenuity-is.com/advisories/2010/dec/22/information-leakage-in-django-administrative-inter/"
},
{
"name": "FEDORA-2011-0096",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html"
"url": "http://secunia.com/advisories/42715",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42715"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=665373",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=665373"
"url": "http://secunia.com/advisories/42827",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42827"
},
{
"name": "20101223 Django admin list filter data extraction / leakage",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0580.html"
"url": "http://secunia.com/advisories/42913",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42913"
},
{
"name": "42715",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42715"
"url": "http://www.djangoproject.com/weblog/2010/dec/22/security/",
"refsource": "MISC",
"name": "http://www.djangoproject.com/weblog/2010/dec/22/security/"
},
{
"name": "FEDORA-2011-0120",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html"
"url": "http://www.openwall.com/lists/oss-security/2010/12/23/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/12/23/4"
},
{
"name": "42827",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42827"
"url": "http://www.openwall.com/lists/oss-security/2011/01/03/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/01/03/5"
},
{
"url": "http://www.securityfocus.com/archive/1/515446",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/515446"
},
{
"url": "http://www.securityfocus.com/bid/45562",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45562"
},
{
"url": "http://www.ubuntu.com/usn/USN-1040-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1040-1"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0048",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0048"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0098",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0098"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=665373",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=665373"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4535",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,77 +27,101 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://code.djangoproject.com/changeset/15032",
"refsource": "CONFIRM",
"url": "http://code.djangoproject.com/changeset/15032"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html"
},
{
"name": "[oss-security] 20101223 CVE Request -- Django 1.2.4, Django 1.1.3 and Django 1.3 beta 1 -- addressing two security flaws",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/12/23/4"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html"
},
{
"name": "USN-1040-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1040-1"
"url": "http://secunia.com/advisories/42715",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42715"
},
{
"name": "45563",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45563"
"url": "http://secunia.com/advisories/42827",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42827"
},
{
"name": "[oss-security] 20110103 Re: CVE Request -- Django 1.2.4, Django 1.1.3 and Django 1.3 beta 1 -- addressing two security flaws",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/01/03/5"
"url": "http://secunia.com/advisories/42913",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42913"
},
{
"name": "42913",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42913"
"url": "http://www.djangoproject.com/weblog/2010/dec/22/security/",
"refsource": "MISC",
"name": "http://www.djangoproject.com/weblog/2010/dec/22/security/"
},
{
"name": "ADV-2011-0048",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0048"
"url": "http://www.openwall.com/lists/oss-security/2010/12/23/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/12/23/4"
},
{
"name": "ADV-2011-0098",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0098"
"url": "http://www.openwall.com/lists/oss-security/2011/01/03/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/01/03/5"
},
{
"name": "http://www.djangoproject.com/weblog/2010/dec/22/security/",
"refsource": "CONFIRM",
"url": "http://www.djangoproject.com/weblog/2010/dec/22/security/"
"url": "http://www.ubuntu.com/usn/USN-1040-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1040-1"
},
{
"name": "FEDORA-2011-0096",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html"
"url": "http://www.vupen.com/english/advisories/2011/0048",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0048"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=665373",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=665373"
"url": "http://www.vupen.com/english/advisories/2011/0098",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0098"
},
{
"name": "42715",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42715"
"url": "http://code.djangoproject.com/changeset/15032",
"refsource": "MISC",
"name": "http://code.djangoproject.com/changeset/15032"
},
{
"name": "FEDORA-2011-0120",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html"
"url": "http://www.securityfocus.com/bid/45563",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45563"
},
{
"name": "42827",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42827"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=665373",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=665373"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4536",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,57 +27,81 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "42755",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42755"
"url": "http://core.trac.wordpress.org/changeset/17172/branches/3.0",
"refsource": "MISC",
"name": "http://core.trac.wordpress.org/changeset/17172/branches/3.0"
},
{
"name": "[oss-security] 20101230 CVE request: wordpress before 3.0.4 XSS",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/12/30/1"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053289.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053289.html"
},
{
"name": "FEDORA-2011-0306",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053293.html"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053293.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053293.html"
},
{
"name": "http://core.trac.wordpress.org/changeset/17172/branches/3.0",
"refsource": "CONFIRM",
"url": "http://core.trac.wordpress.org/changeset/17172/branches/3.0"
"url": "http://secunia.com/advisories/42755",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42755"
},
{
"name": "http://wordpress.org/news/2010/12/3-0-4-update/",
"refsource": "CONFIRM",
"url": "http://wordpress.org/news/2010/12/3-0-4-update/"
"url": "http://secunia.com/advisories/43000",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43000"
},
{
"name": "ADV-2011-0167",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0167"
"url": "http://wordpress.org/news/2010/12/3-0-4-update/",
"refsource": "MISC",
"name": "http://wordpress.org/news/2010/12/3-0-4-update/"
},
{
"name": "ADV-2010-3335",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3335"
"url": "http://www.openwall.com/lists/oss-security/2010/12/30/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/12/30/1"
},
{
"name": "45620",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45620"
"url": "http://www.securityfocus.com/bid/45620",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45620"
},
{
"name": "43000",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43000"
"url": "http://www.vupen.com/english/advisories/2010/3335",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/3335"
},
{
"name": "FEDORA-2011-0315",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053289.html"
"url": "http://www.vupen.com/english/advisories/2011/0167",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0167"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4538",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,117 +27,141 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "ADV-2011-0053",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0053"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053042.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053042.html"
},
{
"name": "[oss-security] 20101231 CVE Request: Wireshark",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/31/7"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053061.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053061.html"
},
{
"name": "FEDORA-2011-0167",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053061.html"
"url": "http://openwall.com/lists/oss-security/2010/12/31/7",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/12/31/7"
},
{
"name": "FEDORA-2011-0128",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053042.html"
"url": "http://openwall.com/lists/oss-security/2011/01/03/8",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/01/03/8"
},
{
"name": "ADV-2011-0110",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0110"
"url": "http://osvdb.org/70244",
"refsource": "MISC",
"name": "http://osvdb.org/70244"
},
{
"name": "MDVSA-2011:002",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:002"
"url": "http://secunia.com/advisories/42767",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42767"
},
{
"name": "1024930",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024930"
"url": "http://secunia.com/advisories/42853",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42853"
},
{
"name": "42853",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42853"
"url": "http://secunia.com/advisories/42910",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42910"
},
{
"name": "42910",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42910"
"url": "http://secunia.com/advisories/42914",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42914"
},
{
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5539",
"refsource": "CONFIRM",
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5539"
"url": "http://www.debian.org/security/2011/dsa-2144",
"refsource": "MISC",
"name": "http://www.debian.org/security/2011/dsa-2144"
},
{
"name": "ADV-2011-0008",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0008"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:002",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:002"
},
{
"name": "[oss-security] 20110103 Re: CVE Request: Wireshark",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/01/03/8"
"url": "http://www.redhat.com/support/errata/RHSA-2011-0013.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0013.html"
},
{
"name": "45634",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45634"
"url": "http://www.securityfocus.com/bid/45634",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45634"
},
{
"name": "70244",
"refsource": "OSVDB",
"url": "http://osvdb.org/70244"
"url": "http://www.securitytracker.com/id?1024930",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1024930"
},
{
"name": "oval:org.mitre.oval:def:14937",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14937"
"url": "http://www.vupen.com/english/advisories/2011/0008",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0008"
},
{
"name": "42767",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42767"
"url": "http://www.vupen.com/english/advisories/2011/0053",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0053"
},
{
"name": "ADV-2011-0079",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0079"
"url": "http://www.vupen.com/english/advisories/2011/0069",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0069"
},
{
"name": "RHSA-2011:0013",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0013.html"
"url": "http://www.vupen.com/english/advisories/2011/0079",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0079"
},
{
"name": "ADV-2011-0069",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0069"
"url": "http://www.vupen.com/english/advisories/2011/0099",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0099"
},
{
"name": "DSA-2144",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2144"
"url": "http://www.vupen.com/english/advisories/2011/0110",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0110"
},
{
"name": "ADV-2011-0099",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0099"
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5539",
"refsource": "MISC",
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5539"
},
{
"name": "42914",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42914"
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14937",
"refsource": "MISC",
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14937"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4539",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,147 +27,171 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "subversion-walk-dos(64472)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64472"
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
},
{
"name": "[oss-security] 20110104 Re: CVE request for subversion",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/01/04/8"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053230.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053230.html"
},
{
"name": "ADV-2011-0103",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0103"
"url": "http://mail-archives.apache.org/mod_mbox/www-announce/201011.mbox/%3CAANLkTi=5+NOi-Cp=fKCx6mAW-TofFVW=ikEQkXgQB8Bt%40mail.gmail.com%3E",
"refsource": "MISC",
"name": "http://mail-archives.apache.org/mod_mbox/www-announce/201011.mbox/%3CAANLkTi=5+NOi-Cp=fKCx6mAW-TofFVW=ikEQkXgQB8Bt%40mail.gmail.com%3E"
},
{
"name": "42969",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42969"
"url": "http://openwall.com/lists/oss-security/2011/01/02/1",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/01/02/1"
},
{
"name": "ADV-2011-0264",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0264"
"url": "http://openwall.com/lists/oss-security/2011/01/04/10",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/01/04/10"
},
{
"name": "42780",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42780"
"url": "http://openwall.com/lists/oss-security/2011/01/04/8",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/01/04/8"
},
{
"name": "http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES"
"url": "http://openwall.com/lists/oss-security/2011/01/05/4",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/01/05/4"
},
{
"name": "[oss-security] 20110105 Re: CVE request for subversion",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/01/05/4"
"url": "http://secunia.com/advisories/42780",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42780"
},
{
"name": "[oss-security] 20110103 Re: CVE request for subversion",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/01/03/9"
"url": "http://secunia.com/advisories/42969",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42969"
},
{
"name": "SUSE-SR:2011:005",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
"url": "http://secunia.com/advisories/43115",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43115"
},
{
"name": "43346",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43346"
"url": "http://secunia.com/advisories/43139",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43139"
},
{
"name": "1024934",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024934"
"url": "http://secunia.com/advisories/43346",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43346"
},
{
"name": "43115",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43115"
"url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES",
"refsource": "MISC",
"name": "http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES"
},
{
"name": "FEDORA-2011-0099",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053230.html"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:006",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:006"
},
{
"name": "ADV-2011-0015",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0015"
"url": "http://www.redhat.com/support/errata/RHSA-2011-0257.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0257.html"
},
{
"name": "[oss-security] 20110102 CVE request for subversion",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/01/02/1"
"url": "http://www.redhat.com/support/errata/RHSA-2011-0258.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0258.html"
},
{
"name": "[www-announce] 20101124 Apache Subversion 1.6.15 Released",
"refsource": "MLIST",
"url": "http://mail-archives.apache.org/mod_mbox/www-announce/201011.mbox/%3CAANLkTi=5+NOi-Cp=fKCx6mAW-TofFVW=ikEQkXgQB8Bt@mail.gmail.com%3E"
"url": "http://www.securityfocus.com/bid/45655",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45655"
},
{
"name": "RHSA-2011:0258",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0258.html"
"url": "http://www.ubuntu.com/usn/USN-1053-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1053-1"
},
{
"name": "RHSA-2011:0257",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0257.html"
"url": "http://www.vupen.com/english/advisories/2011/0015",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0015"
},
{
"name": "MDVSA-2011:006",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:006"
"url": "http://www.vupen.com/english/advisories/2011/0103",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0103"
},
{
"name": "[oss-security] 20110104 Re: CVE request for subversion",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/01/04/10"
"url": "http://www.vupen.com/english/advisories/2011/0162",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0162"
},
{
"name": "USN-1053-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1053-1"
"url": "http://www.vupen.com/english/advisories/2011/0264",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0264"
},
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=1033166",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1033166"
"url": "http://mail-archives.apache.org/mod_mbox/subversion-users/201011.mbox/%3C3923B919-C2BE-41AD-84ED-7207837FAD1A%40ncsa.illinois.edu%3E",
"refsource": "MISC",
"name": "http://mail-archives.apache.org/mod_mbox/subversion-users/201011.mbox/%3C3923B919-C2BE-41AD-84ED-7207837FAD1A%40ncsa.illinois.edu%3E"
},
{
"name": "45655",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45655"
"url": "http://openwall.com/lists/oss-security/2011/01/03/9",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/01/03/9"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=667407",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=667407"
"url": "http://svn.apache.org/viewvc?view=revision&revision=1033166",
"refsource": "MISC",
"name": "http://svn.apache.org/viewvc?view=revision&revision=1033166"
},
{
"name": "43139",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43139"
"url": "http://www.securitytracker.com/id?1024934",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1024934"
},
{
"name": "[subversion-users] 20101104 apache coredump in mod_dav_svn",
"refsource": "MLIST",
"url": "http://mail-archives.apache.org/mod_mbox/subversion-users/201011.mbox/%3C3923B919-C2BE-41AD-84ED-7207837FAD1A@ncsa.illinois.edu%3E"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64472",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64472"
},
{
"name": "ADV-2011-0162",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0162"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=667407",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=667407"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-4540 Gimp: Stack-based buffer overflow in Lighting plug-in"
"value": "Stack-based buffer overflow in the load_preset_response function in plug-ins/lighting/lighting-ui.c in the \"LIGHTING EFFECTS > LIGHT\" plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Position field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Stack-based Buffer Overflow",
"cweId": "CWE-121"
"value": "n/a"
}
]
}
@ -32,27 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "2:2.2.13-2.0.7.el5_6.2",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "2:2.6.9-4.el6_1.1",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -141,54 +129,14 @@
"name": "http://www.vupen.com/english/advisories/2011/0016"
},
{
"url": "https://access.redhat.com/errata/RHSA-2011:0838",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64582",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0838"
},
{
"url": "https://access.redhat.com/errata/RHSA-2011:0839",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0839"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-4540",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-4540"
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64582"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=666793",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=666793"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64582",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64582"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.1,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-4541 Gimp: Stack-based buffer overflow in SphereDesigner plug-in"
"value": "Stack-based buffer overflow in the loadit function in plug-ins/common/sphere-designer.c in the SPHERE DESIGNER plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long \"Number of lights\" field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Stack-based Buffer Overflow",
"cweId": "CWE-121"
"value": "n/a"
}
]
}
@ -32,38 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 4",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "1:2.0.5-7.0.7.el4.1",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5",
"version": {
"version_data": [
{
"version_value": "2:2.2.13-2.0.7.el5_6.2",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "2:2.6.9-4.el6_1.1",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -146,16 +123,6 @@
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0016"
},
{
"url": "https://access.redhat.com/errata/RHSA-2011:0838",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0838"
},
{
"url": "https://access.redhat.com/errata/RHSA-2011:0839",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0839"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=666793",
"refsource": "MISC",
@ -171,51 +138,11 @@
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0837.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2011:0837",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0837"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-4541",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-4541"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=703403",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=703403"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64581",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64581"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.1,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-4542 Gimp: Stack-based buffer overflow in Gfig plug-in"
"value": "Stack-based buffer overflow in the gfig_read_parameter_gimp_rgb function in plug-ins/gfig/gfig-style.c in the GFIG plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Foreground field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Stack-based Buffer Overflow",
"cweId": "CWE-121"
"value": "n/a"
}
]
}
@ -32,27 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "2:2.2.13-2.0.7.el5_6.2",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "2:2.6.9-4.el6_1.1",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -135,60 +123,15 @@
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0016"
},
{
"url": "https://access.redhat.com/errata/RHSA-2011:0838",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0838"
},
{
"url": "https://access.redhat.com/errata/RHSA-2011:0839",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0839"
},
{
"url": "http://osvdb.org/70283",
"refsource": "MISC",
"name": "http://osvdb.org/70283"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-4542",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-4542"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=666793",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=666793"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=703405",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=703405"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.1,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-4543 Gimp: Heap-based buffer overflow in Paint Shop Pro (PSP) plug-in"
"value": "Heap-based buffer overflow in the read_channel_data function in file-psp.c in the Paint Shop Pro (PSP) plugin in GIMP 2.6.11 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a PSP_COMP_RLE (aka RLE compression) image file that begins a long run count at the end of the image. NOTE: some of these details are obtained from third party information."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Heap-based Buffer Overflow",
"cweId": "CWE-122"
"value": "n/a"
}
]
}
@ -32,38 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 4",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "1:2.0.5-7.0.7.el4.1",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5",
"version": {
"version_data": [
{
"version_value": "2:2.2.13-2.0.7.el5_6.2",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "2:2.6.9-4.el6_1.1",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -146,16 +123,6 @@
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0016"
},
{
"url": "https://access.redhat.com/errata/RHSA-2011:0838",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0838"
},
{
"url": "https://access.redhat.com/errata/RHSA-2011:0839",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0839"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=666793",
"refsource": "MISC",
@ -166,50 +133,10 @@
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0837.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2011:0837",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0837"
},
{
"url": "http://osvdb.org/70284",
"refsource": "MISC",
"name": "http://osvdb.org/70284"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-4543",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-4543"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=703407",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=703407"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.8,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4360",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,37 +27,61 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[mediawiki-announce] 20111128 MediaWiki security release 1.17.1",
"refsource": "MLIST",
"url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-November/000104.html"
"url": "http://www.debian.org/security/2011/dsa-2366",
"refsource": "MISC",
"name": "http://www.debian.org/security/2011/dsa-2366"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=758171",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=758171"
"url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-November/000104.html",
"refsource": "MISC",
"name": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-November/000104.html"
},
{
"name": "[oss-security] 20111129 CVE request: mediawiki before 1.17.1",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/11/29/6"
"url": "http://openwall.com/lists/oss-security/2011/11/29/12",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/11/29/12"
},
{
"name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=32276",
"refsource": "CONFIRM",
"url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=32276"
"url": "http://openwall.com/lists/oss-security/2011/11/29/6",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/11/29/6"
},
{
"name": "[oss-security] 20111129 Re: CVE request: mediawiki before 1.17.1",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/11/29/12"
"url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=32276",
"refsource": "MISC",
"name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=32276"
},
{
"name": "DSA-2366",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2366"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=758171",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=758171"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4361",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,37 +27,61 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[mediawiki-announce] 20111128 MediaWiki security release 1.17.1",
"refsource": "MLIST",
"url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-November/000104.html"
"url": "http://www.debian.org/security/2011/dsa-2366",
"refsource": "MISC",
"name": "http://www.debian.org/security/2011/dsa-2366"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=758171",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=758171"
"url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-November/000104.html",
"refsource": "MISC",
"name": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-November/000104.html"
},
{
"name": "[oss-security] 20111129 CVE request: mediawiki before 1.17.1",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/11/29/6"
"url": "http://openwall.com/lists/oss-security/2011/11/29/12",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/11/29/12"
},
{
"name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=32616",
"refsource": "CONFIRM",
"url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=32616"
"url": "http://openwall.com/lists/oss-security/2011/11/29/6",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/11/29/6"
},
{
"name": "[oss-security] 20111129 Re: CVE request: mediawiki before 1.17.1",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/11/29/12"
"url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=32616",
"refsource": "MISC",
"name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=32616"
},
{
"name": "DSA-2366",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2366"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=758171",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=758171"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4578",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,32 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=760984",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=760984"
"url": "http://sourceforge.net/u/tedfelix/acpid2/ci/02d0bf29207f17996936ab652717855b15873901/tree/Changelog?force=True",
"refsource": "MISC",
"name": "http://sourceforge.net/u/tedfelix/acpid2/ci/02d0bf29207f17996936ab652717855b15873901/tree/Changelog?force=True"
},
{
"name": "http://sourceforge.net/u/tedfelix/acpid2/ci/02d0bf29207f17996936ab652717855b15873901/tree/Changelog?force=True",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/u/tedfelix/acpid2/ci/02d0bf29207f17996936ab652717855b15873901/tree/Changelog?force=True"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:138",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:138"
},
{
"name": "MDVSA-2012:138",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:138"
"url": "http://www.openwall.com/lists/oss-security/2011/12/06/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/12/06/3"
},
{
"name": "[oss-security] 20111206 Re: CVE request: acpid",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/12/06/3"
"url": "https://bugs.launchpad.net/ubuntu/+source/acpid/+bug/893821",
"refsource": "MISC",
"name": "https://bugs.launchpad.net/ubuntu/+source/acpid/+bug/893821"
},
{
"name": "https://bugs.launchpad.net/ubuntu/+source/acpid/+bug/893821",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/ubuntu/+source/acpid/+bug/893821"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=760984",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=760984"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4580",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,12 +27,36 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2011:1822",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2011-1822.html"
"url": "http://rhn.redhat.com/errata/RHSA-2011-1822.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2011-1822.html"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4581",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,22 +27,46 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=140af2a0f0a4598bf568b9ae182cb81eb583edeb",
"refsource": "CONFIRM",
"url": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=140af2a0f0a4598bf568b9ae182cb81eb583edeb"
"url": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=140af2a0f0a4598bf568b9ae182cb81eb583edeb",
"refsource": "MISC",
"name": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=140af2a0f0a4598bf568b9ae182cb81eb583edeb"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=761248",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761248"
"url": "http://moodle.org/mod/forum/discuss.php?d=191747",
"refsource": "MISC",
"name": "http://moodle.org/mod/forum/discuss.php?d=191747"
},
{
"name": "http://moodle.org/mod/forum/discuss.php?d=191747",
"refsource": "CONFIRM",
"url": "http://moodle.org/mod/forum/discuss.php?d=191747"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761248",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=761248"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4588",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=761248",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761248"
"url": "http://www.debian.org/security/2012/dsa-2421",
"refsource": "MISC",
"name": "http://www.debian.org/security/2012/dsa-2421"
},
{
"name": "DSA-2421",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2421"
"url": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=3ab2851d2a59721445945d0706c58092e07e861e",
"refsource": "MISC",
"name": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=3ab2851d2a59721445945d0706c58092e07e861e"
},
{
"name": "http://moodle.org/mod/forum/discuss.php?d=191756",
"refsource": "CONFIRM",
"url": "http://moodle.org/mod/forum/discuss.php?d=191756"
"url": "http://moodle.org/mod/forum/discuss.php?d=191756",
"refsource": "MISC",
"name": "http://moodle.org/mod/forum/discuss.php?d=191756"
},
{
"name": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=3ab2851d2a59721445945d0706c58092e07e861e",
"refsource": "CONFIRM",
"url": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=3ab2851d2a59721445945d0706c58092e07e861e"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761248",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=761248"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4589",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,22 +27,46 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=761248",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761248"
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-29591",
"refsource": "MISC",
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-29591"
},
{
"name": "http://moodle.org/mod/forum/discuss.php?d=191758",
"refsource": "CONFIRM",
"url": "http://moodle.org/mod/forum/discuss.php?d=191758"
"url": "http://moodle.org/mod/forum/discuss.php?d=191758",
"refsource": "MISC",
"name": "http://moodle.org/mod/forum/discuss.php?d=191758"
},
{
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-29591",
"refsource": "CONFIRM",
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-29591"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761248",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=761248"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4590",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,22 +27,46 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=761248",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761248"
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-28629",
"refsource": "MISC",
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-28629"
},
{
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-28629",
"refsource": "CONFIRM",
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-28629"
"url": "http://moodle.org/mod/forum/discuss.php?d=191759",
"refsource": "MISC",
"name": "http://moodle.org/mod/forum/discuss.php?d=191759"
},
{
"name": "http://moodle.org/mod/forum/discuss.php?d=191759",
"refsource": "CONFIRM",
"url": "http://moodle.org/mod/forum/discuss.php?d=191759"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761248",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=761248"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4591",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,22 +27,46 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=761248",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761248"
"url": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=187672608ec96659e07f2461b3b83634debd16cb",
"refsource": "MISC",
"name": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=187672608ec96659e07f2461b3b83634debd16cb"
},
{
"name": "http://moodle.org/mod/forum/discuss.php?d=191760",
"refsource": "CONFIRM",
"url": "http://moodle.org/mod/forum/discuss.php?d=191760"
"url": "http://moodle.org/mod/forum/discuss.php?d=191760",
"refsource": "MISC",
"name": "http://moodle.org/mod/forum/discuss.php?d=191760"
},
{
"name": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=187672608ec96659e07f2461b3b83634debd16cb",
"refsource": "CONFIRM",
"url": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=187672608ec96659e07f2461b3b83634debd16cb"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761248",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=761248"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4598",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,37 +27,61 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20111209 Re: CVE Request -- Asterisk -- AST-2011-013 and AST-2011-014",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/12/09/4"
"url": "http://openwall.com/lists/oss-security/2011/12/09/3",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/12/09/3"
},
{
"name": "[oss-security] 20111209 CVE Request -- Asterisk -- AST-2011-013 and AST-2011-014",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/12/09/3"
"url": "http://openwall.com/lists/oss-security/2011/12/09/4",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/12/09/4"
},
{
"name": "47273",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/47273"
"url": "http://secunia.com/advisories/47273",
"refsource": "MISC",
"name": "http://secunia.com/advisories/47273"
},
{
"name": "77598",
"refsource": "OSVDB",
"url": "http://osvdb.org/77598"
"url": "http://www.debian.org/security/2011/dsa-2367",
"refsource": "MISC",
"name": "http://www.debian.org/security/2011/dsa-2367"
},
{
"name": "http://downloads.asterisk.org/pub/security/AST-2011-014.html",
"refsource": "CONFIRM",
"url": "http://downloads.asterisk.org/pub/security/AST-2011-014.html"
"url": "http://downloads.asterisk.org/pub/security/AST-2011-014.html",
"refsource": "MISC",
"name": "http://downloads.asterisk.org/pub/security/AST-2011-014.html"
},
{
"name": "DSA-2367",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2367"
"url": "http://osvdb.org/77598",
"refsource": "MISC",
"name": "http://osvdb.org/77598"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2011-4599 icu: Stack-based buffer overflow by canonicalizing the given localeID"
"value": "Stack-based buffer overflow in the _canonicalize function in common/uloc.c in International Components for Unicode (ICU) before 49.1 allows remote attackers to execute arbitrary code via a crafted locale ID that is not properly handled during variant canonicalization."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Stack-based Buffer Overflow",
"cweId": "CWE-121"
"value": "n/a"
}
]
}
@ -32,27 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:3.6-5.16.1",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:4.2.1-9.1.el6_2",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -165,51 +153,11 @@
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/51006"
},
{
"url": "https://access.redhat.com/errata/RHSA-2011:1815",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:1815"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2011-4599",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2011-4599"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=765812",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=765812"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71726",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71726"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.1,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4600",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://libvirt.org/news-2012.html",
"refsource": "CONFIRM",
"url": "http://libvirt.org/news-2012.html"
"url": "http://www.ubuntu.com/usn/USN-2867-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2867-1"
},
{
"name": "http://libvirt.org/git/?p=libvirt.git;a=commitdiff;h=ae1232b298323dd7bef909426e2ebafa6bca9157",
"refsource": "CONFIRM",
"url": "http://libvirt.org/git/?p=libvirt.git;a=commitdiff;h=ae1232b298323dd7bef909426e2ebafa6bca9157"
"url": "http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=ae1232b298323dd7bef909426e2ebafa6bca9157",
"refsource": "MISC",
"name": "http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=ae1232b298323dd7bef909426e2ebafa6bca9157"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=760442",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=760442"
"url": "http://libvirt.org/news-2012.html",
"refsource": "MISC",
"name": "http://libvirt.org/news-2012.html"
},
{
"name": "USN-2867-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2867-1"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=760442",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=760442"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2011-4608 mod_cluster: malicious worker nodes can register on any vhost"
"value": "mod_cluster in JBoss Enterprise Application Platform 5.1.2 for Red Hat Linux allows worker nodes to register with arbitrary virtual hosts, which allows remote attackers to bypass intended access restrictions and provide malicious content, hijack sessions, and steal credentials by registering from an external vhost that does not enforce security constraints."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Incorrect Authorization",
"cweId": "CWE-863"
"value": "n/a"
}
]
}
@ -32,105 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "JBEWP 5 for RHEL 5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:1.0.10-4.1.GA_CP02.ep5.el5",
"version_affected": "!"
}
]
}
},
{
"product_name": "JBEWP 5 for RHEL 6",
"version": {
"version_data": [
{
"version_value": "0:1.0.10-4.1.1.GA_CP02.ep5.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "JBEWS 1.0 for RHEL 4",
"version": {
"version_data": [
{
"version_value": "0:1.0.10-3.GA_CP02.ep5.el4",
"version_affected": "!"
},
{
"version_value": "0:1.0.10-4.GA_CP02.ep5.el4",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 4",
"version": {
"version_data": [
{
"version_value": "0:1.0.10-4.GA_CP02.ep5.el4",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 5",
"version": {
"version_data": [
{
"version_value": "0:1.0.10-4.1.GA_CP02.ep5.el5",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 6",
"version": {
"version_data": [
{
"version_value": "0:1.0.10-4.1.1.GA_CP02.ep5.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5",
"version": {
"version_data": [
{
"version_value": "0:1.0.10-3.1.GA_CP02.ep5.el5",
"version_affected": "!"
},
{
"version_value": "0:1.0.10-4.1.GA_CP02.ep5.el5",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 6",
"version": {
"version_data": [
{
"version_value": "0:1.0.10-3.2.GA_CP02.ep5.el6",
"version_affected": "!"
},
{
"version_value": "0:1.0.10-4.1.1.GA_CP02.ep5.el6",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -184,74 +94,14 @@
"name": "http://www.securitytracker.com/id?1026545"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:0035",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72460",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:0035"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:0036",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:0036"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:0037",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:0037"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:0038",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:0038"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:0039",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:0039"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:0040",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:0040"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2011-4608",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2011-4608"
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72460"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=767020",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=767020"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72460",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72460"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 7.5,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3444",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,37 +27,61 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20120730 CVE Request: Django 1.3.1 and 1.4.0 security issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/07/31/1"
"url": "http://www.debian.org/security/2012/dsa-2529",
"refsource": "MISC",
"name": "http://www.debian.org/security/2012/dsa-2529"
},
{
"name": "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/",
"refsource": "CONFIRM",
"url": "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143"
},
{
"name": "MDVSA-2012:143",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143"
"url": "http://www.openwall.com/lists/oss-security/2012/07/31/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/07/31/1"
},
{
"name": "USN-1560-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1560-1"
"url": "http://www.openwall.com/lists/oss-security/2012/07/31/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/07/31/2"
},
{
"name": "[oss-security] 20120730 Re: CVE Request: Django 1.3.1 and 1.4.0 security issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/07/31/2"
"url": "http://www.ubuntu.com/usn/USN-1560-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1560-1"
},
{
"name": "DSA-2529",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2529"
"url": "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/",
"refsource": "MISC",
"name": "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3445",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,57 +27,81 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "50118",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50118"
},
{
"name": "54748",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/54748"
},
{
"name": "[libvirt] 20120730 [PATCH] daemon: Fix crash in virTypedParameterArrayClear",
"refsource": "MLIST",
"url": "https://www.redhat.com/archives/libvir-list/2012-July/msg01650.html"
},
{
"name": "[oss-security] 20120731 CVE Request -- libvirt: crash in virTypedParameterArrayClear",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/07/31/4"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=844734",
"url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00023.html",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=844734"
"name": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00023.html"
},
{
"name": "RHSA-2012:1202",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1202.html"
"url": "http://rhn.redhat.com/errata/RHSA-2012-1202.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-1202.html"
},
{
"name": "50299",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50299"
"url": "http://secunia.com/advisories/50118",
"refsource": "MISC",
"name": "http://secunia.com/advisories/50118"
},
{
"name": "50372",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50372"
"url": "http://secunia.com/advisories/50299",
"refsource": "MISC",
"name": "http://secunia.com/advisories/50299"
},
{
"name": "[oss-security] 20120731 Re: CVE Request -- libvirt: crash in virTypedParameterArrayClear",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/07/31/7"
"url": "http://secunia.com/advisories/50372",
"refsource": "MISC",
"name": "http://secunia.com/advisories/50372"
},
{
"name": "openSUSE-SU-2012:0991",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00023.html"
"url": "http://www.openwall.com/lists/oss-security/2012/07/31/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/07/31/4"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/07/31/7",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/07/31/7"
},
{
"url": "http://www.securityfocus.com/bid/54748",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/54748"
},
{
"url": "https://www.redhat.com/archives/libvir-list/2012-July/msg01650.html",
"refsource": "MISC",
"name": "https://www.redhat.com/archives/libvir-list/2012-July/msg01650.html"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=844734",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=844734"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3446",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,17 +27,41 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://svn.apache.org/repos/asf/libcloud/trunk/CHANGES",
"refsource": "CONFIRM",
"url": "https://svn.apache.org/repos/asf/libcloud/trunk/CHANGES"
"url": "http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf",
"refsource": "MISC",
"name": "http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf"
},
{
"name": "http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf",
"url": "https://svn.apache.org/repos/asf/libcloud/trunk/CHANGES",
"refsource": "MISC",
"url": "http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf"
"name": "https://svn.apache.org/repos/asf/libcloud/trunk/CHANGES"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3447",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "virt/disk/api.py in OpenStack Compute (Nova) 2012.1.x before 2012.1.2 and Folsom before Folsom-3 allows remote authenticated users to overwrite arbitrary files via a symlink attack on a file in an image that uses a symlink that is only readable by root. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3361."
"value": "virt/disk/api.py in OpenStack Compute (Nova) 2012.1.x before 2012.1.2 and Folsom before Folsom-3 allows remote authenticated users to overwrite arbitrary files via a symlink attack on a file in an image that uses a symlink that is only readable by root. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3361."
}
]
},
@ -50,47 +27,71 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://github.com/openstack/nova/commit/ce4b2e27be45a85b310237615c47eb53f37bb5f3",
"refsource": "CONFIRM",
"url": "https://github.com/openstack/nova/commit/ce4b2e27be45a85b310237615c47eb53f37bb5f3"
},
{
"name": "[oss-security] 20120807 [OSSA 2012-011] Compute node filesystem injection/corruption (CVE-2012-3447)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/07/1"
},
{
"name": "54869",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/54869"
},
{
"name": "openstack-nova-code-execution(77539)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77539"
},
{
"name": "https://review.openstack.org/#/c/10953/",
"refsource": "CONFIRM",
"url": "https://review.openstack.org/#/c/10953/"
},
{
"name": "https://bugs.launchpad.net/nova/+bug/1031311",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/nova/+bug/1031311"
},
{
"name": "https://github.com/openstack/nova/commit/d9577ce9f266166a297488445b5b0c93c1ddb368",
"refsource": "CONFIRM",
"url": "https://github.com/openstack/nova/commit/d9577ce9f266166a297488445b5b0c93c1ddb368"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=845106",
"url": "http://www.openwall.com/lists/oss-security/2012/08/07/1",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=845106"
"name": "http://www.openwall.com/lists/oss-security/2012/08/07/1"
},
{
"url": "http://www.securityfocus.com/bid/54869",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/54869"
},
{
"url": "https://bugs.launchpad.net/nova/+bug/1031311",
"refsource": "MISC",
"name": "https://bugs.launchpad.net/nova/+bug/1031311"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77539",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77539"
},
{
"url": "https://github.com/openstack/nova/commit/ce4b2e27be45a85b310237615c47eb53f37bb5f3",
"refsource": "MISC",
"name": "https://github.com/openstack/nova/commit/ce4b2e27be45a85b310237615c47eb53f37bb5f3"
},
{
"url": "https://github.com/openstack/nova/commit/d9577ce9f266166a297488445b5b0c93c1ddb368",
"refsource": "MISC",
"name": "https://github.com/openstack/nova/commit/d9577ce9f266166a297488445b5b0c93c1ddb368"
},
{
"url": "https://review.openstack.org/#/c/10953/",
"refsource": "MISC",
"name": "https://review.openstack.org/#/c/10953/"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=845106",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=845106"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3448",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,62 +27,86 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "54699",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/54699"
},
{
"name": "FEDORA-2012-10727",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/084196.html"
},
{
"name": "38030",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/38030/"
},
{
"name": "FEDORA-2012-10699",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/084202.html"
},
{
"name": "[oss-security] 20120801 Re: CVE request: Ganglia Web 3.5.1",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/02/1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=845124",
"url": "http://ganglia.info/?p=549",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=845124"
"name": "http://ganglia.info/?p=549"
},
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00136.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00136.html"
},
{
"name": "DSA-2610",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2610"
},
{
"name": "50047",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50047"
},
{
"name": "https://bugs.gentoo.org/show_bug.cgi?id=428776",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/084196.html",
"refsource": "MISC",
"url": "https://bugs.gentoo.org/show_bug.cgi?id=428776"
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/084196.html"
},
{
"name": "http://ganglia.info/?p=549",
"refsource": "CONFIRM",
"url": "http://ganglia.info/?p=549"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/084202.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/084202.html"
},
{
"url": "http://secunia.com/advisories/50047",
"refsource": "MISC",
"name": "http://secunia.com/advisories/50047"
},
{
"url": "http://www.debian.org/security/2013/dsa-2610",
"refsource": "MISC",
"name": "http://www.debian.org/security/2013/dsa-2610"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/08/02/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/08/02/1"
},
{
"url": "http://www.securityfocus.com/bid/54699",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/54699"
},
{
"url": "https://bugs.gentoo.org/show_bug.cgi?id=428776",
"refsource": "MISC",
"name": "https://bugs.gentoo.org/show_bug.cgi?id=428776"
},
{
"url": "https://www.exploit-db.com/exploits/38030/",
"refsource": "MISC",
"name": "https://www.exploit-db.com/exploits/38030/"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00136.html",
"refsource": "MISC",
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00136.html"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=845124",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=845124"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3450",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,57 +27,81 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20120802 Re: CVE Request: php5 pdo array overread/crash",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/02/7"
"url": "http://www.php.net/ChangeLog-5.php",
"refsource": "MISC",
"name": "http://www.php.net/ChangeLog-5.php"
},
{
"name": "DSA-2527",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2527"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00021.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00021.html"
},
{
"name": "http://www.php.net/ChangeLog-5.php",
"refsource": "CONFIRM",
"url": "http://www.php.net/ChangeLog-5.php"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:108",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:108"
},
{
"name": "[oss-security] 20120802 CVE Request: php5 pdo array overread/crash",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/02/3"
"url": "http://seclists.org/bugtraq/2012/Jun/60",
"refsource": "MISC",
"name": "http://seclists.org/bugtraq/2012/Jun/60"
},
{
"name": "https://bugs.php.net/bug.php?id=61755",
"refsource": "CONFIRM",
"url": "https://bugs.php.net/bug.php?id=61755"
"url": "http://www.debian.org/security/2012/dsa-2527",
"refsource": "MISC",
"name": "http://www.debian.org/security/2012/dsa-2527"
},
{
"name": "20120610 [php<=5.4.3] Parsing Bug in PHP PDO prepared statements may lead to access violation",
"refsource": "BUGTRAQ",
"url": "http://seclists.org/bugtraq/2012/Jun/60"
"url": "http://www.openwall.com/lists/oss-security/2012/08/02/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/08/02/3"
},
{
"name": "MDVSA-2012:108",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:108"
"url": "http://www.openwall.com/lists/oss-security/2012/08/02/7",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/08/02/7"
},
{
"name": "USN-1569-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1569-1"
"url": "http://www.ubuntu.com/usn/USN-1569-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1569-1"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=769785",
"refsource": "CONFIRM",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=769785"
"url": "https://bugs.php.net/bug.php?id=61755",
"refsource": "MISC",
"name": "https://bugs.php.net/bug.php?id=61755"
},
{
"name": "SUSE-SU-2012:1033",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00021.html"
"url": "https://bugzilla.novell.com/show_bug.cgi?id=769785",
"refsource": "MISC",
"name": "https://bugzilla.novell.com/show_bug.cgi?id=769785"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3455",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based buffer overflow in the read function in filters/words/msword-odf/wv2/src/styles.cpp in the Microsoft import filter in KOffice 2.3.3 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted ODF style in an ODF document. NOTE: this is the same vulnerability as CVE-2012-3456, but it was SPLIT by the CNA even though Calligra and KOffice share the same codebase."
"value": "Heap-based buffer overflow in the read function in filters/words/msword-odf/wv2/src/styles.cpp in the Microsoft import filter in KOffice 2.3.3 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted ODF style in an ODF document. NOTE: this is the same vulnerability as CVE-2012-3456, but it was SPLIT by the CNA even though Calligra and KOffice share the same codebase."
}
]
},
@ -50,67 +27,91 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "50199",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50199"
},
{
"name": "[oss-security] 20120810 Re: CVE request for Calligra",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/10/1"
},
{
"name": "[oss-security] 20120806 Re: CVE request for Calligra",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/06/6"
},
{
"name": "[oss-security] 20120805 Re: CVE request for Calligra",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/06/1"
},
{
"name": "[oss-security] 20120804 Re: CVE request for Calligra",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/04/5"
},
{
"name": "koffice-kword-odf-bo(77483)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77483"
},
{
"name": "http://media.blackhat.com/bh-us-12/Briefings/C_Miller/BH_US_12_Miller_NFC_attack_surface_WP.pdf",
"url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00040.html",
"refsource": "MISC",
"url": "http://media.blackhat.com/bh-us-12/Briefings/C_Miller/BH_US_12_Miller_NFC_attack_surface_WP.pdf"
"name": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00040.html"
},
{
"name": "[oss-security] 20120804 CVE request for Calligra",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/04/1"
"url": "http://media.blackhat.com/bh-us-12/Briefings/C_Miller/BH_US_12_Miller_NFC_attack_surface_WP.pdf",
"refsource": "MISC",
"name": "http://media.blackhat.com/bh-us-12/Briefings/C_Miller/BH_US_12_Miller_NFC_attack_surface_WP.pdf"
},
{
"name": "USN-1526-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1526-1"
"url": "http://secunia.com/advisories/50199",
"refsource": "MISC",
"name": "http://secunia.com/advisories/50199"
},
{
"name": "http://www.kde.org/info/security/advisory-20120810-1.txt",
"refsource": "CONFIRM",
"url": "http://www.kde.org/info/security/advisory-20120810-1.txt"
"url": "http://www.kde.org/info/security/advisory-20120810-1.txt",
"refsource": "MISC",
"name": "http://www.kde.org/info/security/advisory-20120810-1.txt"
},
{
"name": "54816",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/54816"
"url": "http://www.openwall.com/lists/oss-security/2012/08/04/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/08/04/1"
},
{
"name": "openSUSE-SU-2012:1060",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00040.html"
"url": "http://www.openwall.com/lists/oss-security/2012/08/04/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/08/04/5"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/08/06/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/08/06/1"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/08/06/6",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/08/06/6"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/08/10/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/08/10/1"
},
{
"url": "http://www.securityfocus.com/bid/54816",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/54816"
},
{
"url": "http://www.ubuntu.com/usn/USN-1526-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1526-1"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77483",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77483"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3456",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based buffer overflow in the read function in filters/words/msword-odf/wv2/src/styles.cpp in the Microsoft import filter in Calligra 2.4.3 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted ODF style in an ODF document. NOTE: this is the same vulnerability as CVE-2012-3455, but it was SPLIT by the CNA even though Calligra and KOffice share the same codebase."
"value": "Heap-based buffer overflow in the read function in filters/words/msword-odf/wv2/src/styles.cpp in the Microsoft import filter in Calligra 2.4.3 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted ODF style in an ODF document. NOTE: this is the same vulnerability as CVE-2012-3455, but it was SPLIT by the CNA even though Calligra and KOffice share the same codebase."
}
]
},
@ -50,77 +27,96 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "calligra-styles-bo(77482)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77482"
},
{
"name": "[oss-security] 20120810 Re: CVE request for Calligra",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/10/1"
},
{
"name": "[oss-security] 20120806 Re: CVE request for Calligra",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/06/6"
},
{
"name": "openSUSE-SU-2012:1061",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00026.html"
},
{
"name": "[oss-security] 20120805 Re: CVE request for Calligra",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/06/1"
},
{
"name": "[oss-security] 20120804 Re: CVE request for Calligra",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/04/5"
},
{
"name": "SSRT101182",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=136733075705494&w=2"
},
{
"name": "http://media.blackhat.com/bh-us-12/Briefings/C_Miller/BH_US_12_Miller_NFC_attack_surface_WP.pdf",
"url": "http://media.blackhat.com/bh-us-12/Briefings/C_Miller/BH_US_12_Miller_NFC_attack_surface_WP.pdf",
"refsource": "MISC",
"url": "http://media.blackhat.com/bh-us-12/Briefings/C_Miller/BH_US_12_Miller_NFC_attack_surface_WP.pdf"
"name": "http://media.blackhat.com/bh-us-12/Briefings/C_Miller/BH_US_12_Miller_NFC_attack_surface_WP.pdf"
},
{
"name": "[oss-security] 20120804 CVE request for Calligra",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/04/1"
"url": "http://www.kde.org/info/security/advisory-20120810-1.txt",
"refsource": "MISC",
"name": "http://www.kde.org/info/security/advisory-20120810-1.txt"
},
{
"name": "USN-1525-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1525-1"
"url": "http://www.openwall.com/lists/oss-security/2012/08/04/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/08/04/1"
},
{
"name": "http://www.kde.org/info/security/advisory-20120810-1.txt",
"refsource": "CONFIRM",
"url": "http://www.kde.org/info/security/advisory-20120810-1.txt"
"url": "http://www.openwall.com/lists/oss-security/2012/08/04/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/08/04/5"
},
{
"name": "50050",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50050"
"url": "http://www.openwall.com/lists/oss-security/2012/08/06/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/08/06/1"
},
{
"name": "HPSBMU02873",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=136733075705494&w=2"
"url": "http://www.openwall.com/lists/oss-security/2012/08/06/6",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/08/06/6"
},
{
"name": "54816",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/54816"
"url": "http://www.openwall.com/lists/oss-security/2012/08/10/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/08/10/1"
},
{
"url": "http://www.securityfocus.com/bid/54816",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/54816"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00026.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00026.html"
},
{
"url": "http://marc.info/?l=bugtraq&m=136733075705494&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=bugtraq&m=136733075705494&w=2"
},
{
"url": "http://secunia.com/advisories/50050",
"refsource": "MISC",
"name": "http://secunia.com/advisories/50050"
},
{
"url": "http://www.ubuntu.com/usn/USN-1525-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1525-1"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77482",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77482"
}
]
}