diff --git a/2010/2xxx/CVE-2010-2805.json b/2010/2xxx/CVE-2010-2805.json index f5f40c12c13..dfc3f2dd0d4 100644 --- a/2010/2xxx/CVE-2010-2805.json +++ b/2010/2xxx/CVE-2010-2805.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-2805", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,122 +27,146 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "ADV-2010-3045", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/3045" + "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", + "refsource": "MISC", + "name": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { - "name": "http://support.apple.com/kb/HT4435", - "refsource": "CONFIRM", - "url": "http://support.apple.com/kb/HT4435" + "url": "http://support.apple.com/kb/HT4435", + "refsource": "MISC", + "name": "http://support.apple.com/kb/HT4435" }, { - "name": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019", - "refsource": "CONFIRM", - "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" + "url": "http://secunia.com/advisories/48951", + "refsource": "MISC", + "name": "http://secunia.com/advisories/48951" }, { - "name": "http://support.apple.com/kb/HT4457", - "refsource": "CONFIRM", - "url": "http://support.apple.com/kb/HT4457" + "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html", + "refsource": "MISC", + "name": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html" }, { - "name": "ADV-2010-2018", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/2018" + "url": "http://secunia.com/advisories/42314", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42314" }, { - "name": "ADV-2010-3046", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/3046" + "url": "http://secunia.com/advisories/42317", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42317" }, { - "name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=45a3c76b547511fa9d97aca34b150a0663257375", - "refsource": "CONFIRM", - "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=45a3c76b547511fa9d97aca34b150a0663257375" + "url": "http://support.apple.com/kb/HT4456", + "refsource": "MISC", + "name": "http://support.apple.com/kb/HT4456" }, { - "name": "USN-972-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-972-1" + "url": "http://support.apple.com/kb/HT4457", + "refsource": "MISC", + "name": "http://support.apple.com/kb/HT4457" }, { - "name": "APPLE-SA-2010-11-10-1", - "refsource": "APPLE", - "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" + "url": "http://www.vupen.com/english/advisories/2010/3045", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/3045" }, { - "name": "[oss-security] 20100806 Re: CVE Request -- FreeType -- Memory corruption flaw by processing certain LWFN fonts + three more", - "refsource": "MLIST", - "url": "http://marc.info/?l=oss-security&m=128111955616772&w=2" + "url": "http://www.vupen.com/english/advisories/2010/3046", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/3046" }, { - "name": "42317", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42317" + "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2", + "refsource": "MISC", + "name": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2" }, { - "name": "40816", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/40816" + "url": "http://secunia.com/advisories/40982", + "refsource": "MISC", + "name": "http://secunia.com/advisories/40982" }, { - "name": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2", - "refsource": "CONFIRM", - "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2" + "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view", + "refsource": "MISC", + "name": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view" }, { - "name": "42314", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42314" + "url": "http://www.ubuntu.com/usn/USN-972-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-972-1" }, { - "name": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view", - "refsource": "CONFIRM", - "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view" + "url": "http://www.vupen.com/english/advisories/2010/2106", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/2106" }, { - "name": "RHSA-2010:0864", - "refsource": "REDHAT", - "url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html" + "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019", + "refsource": "MISC", + "name": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" }, { - "name": "40982", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/40982" + "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=45a3c76b547511fa9d97aca34b150a0663257375", + "refsource": "MISC", + "name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=45a3c76b547511fa9d97aca34b150a0663257375" }, { - "name": "ADV-2010-2106", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/2106" + "url": "http://marc.info/?l=oss-security&m=128111955616772&w=2", + "refsource": "MISC", + "name": "http://marc.info/?l=oss-security&m=128111955616772&w=2" }, { - "name": "http://support.apple.com/kb/HT4456", - "refsource": "CONFIRM", - "url": "http://support.apple.com/kb/HT4456" + "url": "http://secunia.com/advisories/40816", + "refsource": "MISC", + "name": "http://secunia.com/advisories/40816" }, { - "name": "48951", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/48951" + "url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html", + "refsource": "MISC", + "name": "http://www.redhat.com/support/errata/RHSA-2010-0864.html" }, { - "name": "https://savannah.nongnu.org/bugs/?30644", - "refsource": "CONFIRM", - "url": "https://savannah.nongnu.org/bugs/?30644" + "url": "http://www.securityfocus.com/bid/42285", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/42285" }, { - "name": "42285", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/42285" + "url": "http://www.vupen.com/english/advisories/2010/2018", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/2018" }, { - "name": "APPLE-SA-2010-11-22-1", - "refsource": "APPLE", - "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html" + "url": "https://savannah.nongnu.org/bugs/?30644", + "refsource": "MISC", + "name": "https://savannah.nongnu.org/bugs/?30644" } ] } diff --git a/2010/2xxx/CVE-2010-2806.json b/2010/2xxx/CVE-2010-2806.json index 55fb80f07ed..45d39ab8726 100644 --- a/2010/2xxx/CVE-2010-2806.json +++ b/2010/2xxx/CVE-2010-2806.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2010-2806 FreeType: Heap-based buffer overflow by processing FontType42 fonts with negative length of SFNT strings (FT bug #30656)" + "value": "Array index error in the t42_parse_sfnts function in type42/t42parse.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via negative size values for certain strings in FontType42 font files, leading to a heap-based buffer overflow." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Heap-based Buffer Overflow", - "cweId": "CWE-122" + "value": "n/a" } ] } @@ -32,49 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 3", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:2.1.4-18.el3", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 4", - "version": { - "version_data": [ - { - "version_value": "0:2.1.9-17.el4.8", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 5", - "version": { - "version_data": [ - { - "version_value": "0:2.2.1-28.el5_5", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 6", - "version": { - "version_data": [ - { - "version_value": "0:2.3.11-6.el6_0.1", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -187,36 +153,11 @@ "refsource": "MISC", "name": "http://www.vupen.com/english/advisories/2010/2018" }, - { - "url": "https://access.redhat.com/errata/RHSA-2010:0864", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2010:0864" - }, { "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c06da1ad34663da7b6fc39b030dc3ae185b96557", "refsource": "MISC", "name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c06da1ad34663da7b6fc39b030dc3ae185b96557" }, - { - "url": "https://access.redhat.com/errata/RHSA-2010:0736", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2010:0736" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2010:0737", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2010:0737" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2010-2806", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2010-2806" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621980", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=621980" - }, { "url": "https://rhn.redhat.com/errata/RHSA-2010-0736.html", "refsource": "MISC", @@ -231,31 +172,11 @@ "url": "https://savannah.nongnu.org/bugs/?30656", "refsource": "MISC", "name": "https://savannah.nongnu.org/bugs/?30656" - } - ] - }, - "impact": { - "cvss": [ + }, { - "accessComplexity": "MEDIUM", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 6.8, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", - "version": "2.0" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621980", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=621980" } ] } diff --git a/2010/2xxx/CVE-2010-2807.json b/2010/2xxx/CVE-2010-2807.json index f38b78a8a6c..83954daee8b 100644 --- a/2010/2xxx/CVE-2010-2807.json +++ b/2010/2xxx/CVE-2010-2807.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-2807", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,112 +27,136 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "ADV-2010-3045", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/3045" + "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", + "refsource": "MISC", + "name": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { - "name": "http://support.apple.com/kb/HT4435", - "refsource": "CONFIRM", - "url": "http://support.apple.com/kb/HT4435" + "url": "http://support.apple.com/kb/HT4435", + "refsource": "MISC", + "name": "http://support.apple.com/kb/HT4435" }, { - "name": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019", - "refsource": "CONFIRM", - "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" + "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html", + "refsource": "MISC", + "name": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html" }, { - "name": "http://support.apple.com/kb/HT4457", - "refsource": "CONFIRM", - "url": "http://support.apple.com/kb/HT4457" + "url": "http://secunia.com/advisories/42314", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42314" }, { - "name": "ADV-2010-2018", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/2018" + "url": "http://secunia.com/advisories/42317", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42317" }, { - "name": "ADV-2010-3046", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/3046" + "url": "http://support.apple.com/kb/HT4456", + "refsource": "MISC", + "name": "http://support.apple.com/kb/HT4456" }, { - "name": "USN-972-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-972-1" + "url": "http://support.apple.com/kb/HT4457", + "refsource": "MISC", + "name": "http://support.apple.com/kb/HT4457" }, { - "name": "APPLE-SA-2010-11-10-1", - "refsource": "APPLE", - "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" + "url": "http://www.vupen.com/english/advisories/2010/3045", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/3045" }, { - "name": "[oss-security] 20100806 Re: CVE Request -- FreeType -- Memory corruption flaw by processing certain LWFN fonts + three more", - "refsource": "MLIST", - "url": "http://marc.info/?l=oss-security&m=128111955616772&w=2" + "url": "http://www.vupen.com/english/advisories/2010/3046", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/3046" }, { - "name": "42317", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42317" + "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2", + "refsource": "MISC", + "name": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2" }, { - "name": "40816", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/40816" + "url": "http://secunia.com/advisories/40982", + "refsource": "MISC", + "name": "http://secunia.com/advisories/40982" }, { - "name": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2", - "refsource": "CONFIRM", - "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2" + "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view", + "refsource": "MISC", + "name": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view" }, { - "name": "42314", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42314" + "url": "http://www.ubuntu.com/usn/USN-972-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-972-1" }, { - "name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=346f1867fd32dae8f56e5b482d1af98f626804ac", - "refsource": "CONFIRM", - "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=346f1867fd32dae8f56e5b482d1af98f626804ac" + "url": "http://www.vupen.com/english/advisories/2010/2106", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/2106" }, { - "name": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view", - "refsource": "CONFIRM", - "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view" + "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019", + "refsource": "MISC", + "name": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" }, { - "name": "40982", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/40982" + "url": "http://marc.info/?l=oss-security&m=128111955616772&w=2", + "refsource": "MISC", + "name": "http://marc.info/?l=oss-security&m=128111955616772&w=2" }, { - "name": "https://savannah.nongnu.org/bugs/?30657", - "refsource": "CONFIRM", - "url": "https://savannah.nongnu.org/bugs/?30657" + "url": "http://secunia.com/advisories/40816", + "refsource": "MISC", + "name": "http://secunia.com/advisories/40816" }, { - "name": "ADV-2010-2106", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/2106" + "url": "http://www.securityfocus.com/bid/42285", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/42285" }, { - "name": "http://support.apple.com/kb/HT4456", - "refsource": "CONFIRM", - "url": "http://support.apple.com/kb/HT4456" + "url": "http://www.vupen.com/english/advisories/2010/2018", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/2018" }, { - "name": "42285", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/42285" + "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=346f1867fd32dae8f56e5b482d1af98f626804ac", + "refsource": "MISC", + "name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=346f1867fd32dae8f56e5b482d1af98f626804ac" }, { - "name": "APPLE-SA-2010-11-22-1", - "refsource": "APPLE", - "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html" + "url": "https://savannah.nongnu.org/bugs/?30657", + "refsource": "MISC", + "name": "https://savannah.nongnu.org/bugs/?30657" } ] } diff --git a/2010/2xxx/CVE-2010-2808.json b/2010/2xxx/CVE-2010-2808.json index 9aef0244d41..f5599d685a1 100644 --- a/2010/2xxx/CVE-2010-2808.json +++ b/2010/2xxx/CVE-2010-2808.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2010-2808 FreeType: Stack-based buffer overflow by processing certain LWFN fonts" + "value": "Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Adobe Type 1 Mac Font File (aka LWFN) font." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Stack-based Buffer Overflow", - "cweId": "CWE-121" + "value": "n/a" } ] } @@ -32,38 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 4", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:2.1.9-17.el4.8", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 5", - "version": { - "version_data": [ - { - "version_value": "0:2.2.1-28.el5_5", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 6", - "version": { - "version_data": [ - { - "version_value": "0:2.3.11-6.el6_0.1", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -176,16 +153,6 @@ "refsource": "MISC", "name": "http://www.vupen.com/english/advisories/2010/2018" }, - { - "url": "https://access.redhat.com/errata/RHSA-2010:0864", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2010:0864" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2010:0737", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2010:0737" - }, { "url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html", "refsource": "MISC", @@ -202,44 +169,14 @@ "name": "http://marc.info/?l=oss-security&m=128110167119337&w=2" }, { - "url": "https://access.redhat.com/security/cve/CVE-2010-2808", + "url": "https://savannah.nongnu.org/bugs/?30658", "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2010-2808" + "name": "https://savannah.nongnu.org/bugs/?30658" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621907", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=621907" - }, - { - "url": "https://savannah.nongnu.org/bugs/?30658", - "refsource": "MISC", - "name": "https://savannah.nongnu.org/bugs/?30658" - } - ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "MEDIUM", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 6.8, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", - "version": "2.0" } ] } diff --git a/2010/2xxx/CVE-2010-2809.json b/2010/2xxx/CVE-2010-2809.json index e52b88452c5..be60a33a096 100644 --- a/2010/2xxx/CVE-2010-2809.json +++ b/2010/2xxx/CVE-2010-2809.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-2809", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,57 +27,81 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://github.com/Dieterbe/uzbl/commit/9cc39cb5c9396be013b5dc2ba7e4b3eaa647e975", - "refsource": "CONFIRM", - "url": "http://github.com/Dieterbe/uzbl/commit/9cc39cb5c9396be013b5dc2ba7e4b3eaa647e975" + "url": "http://github.com/Dieterbe/uzbl/commit/9cc39cb5c9396be013b5dc2ba7e4b3eaa647e975", + "refsource": "MISC", + "name": "http://github.com/Dieterbe/uzbl/commit/9cc39cb5c9396be013b5dc2ba7e4b3eaa647e975" }, { - "name": "http://github.com/pawelz/uzbl/commit/342f292c27973c9df5f631a38bd12f14a9c5cdc2", - "refsource": "CONFIRM", - "url": "http://github.com/pawelz/uzbl/commit/342f292c27973c9df5f631a38bd12f14a9c5cdc2" + "url": "http://github.com/pawelz/uzbl/commit/342f292c27973c9df5f631a38bd12f14a9c5cdc2", + "refsource": "MISC", + "name": "http://github.com/pawelz/uzbl/commit/342f292c27973c9df5f631a38bd12f14a9c5cdc2" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=621964", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621964" + "url": "http://marc.info/?l=oss-security&m=128111493509265&w=2", + "refsource": "MISC", + "name": "http://marc.info/?l=oss-security&m=128111493509265&w=2" }, { - "name": "[oss-security] 20100806 CVE request: uzbl before 2010.08.05: User-assisted execution of arbitrary commands caused by faulty default config", - "refsource": "MLIST", - "url": "http://marc.info/?l=oss-security&m=128111493509265&w=2" + "url": "http://marc.info/?l=oss-security&m=128111994317381&w=2", + "refsource": "MISC", + "name": "http://marc.info/?l=oss-security&m=128111994317381&w=2" }, { - "name": "[oss-security] 20100806 Re: CVE request: uzbl before 2010.08.05: User-assisted execution of arbitrary commands caused by faulty default config", - "refsource": "MLIST", - "url": "http://marc.info/?l=oss-security&m=128111994317381&w=2" + "url": "http://www.securityfocus.com/bid/42297", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/42297" }, { - "name": "http://www.uzbl.org/news.php?id=29", - "refsource": "CONFIRM", - "url": "http://www.uzbl.org/news.php?id=29" + "url": "http://www.uzbl.org/bugs/index.php?do=details&task_id=240", + "refsource": "MISC", + "name": "http://www.uzbl.org/bugs/index.php?do=details&task_id=240" }, { - "name": "42297", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/42297" + "url": "http://www.uzbl.org/news.php?id=29", + "refsource": "MISC", + "name": "http://www.uzbl.org/news.php?id=29" }, { - "name": "http://www.uzbl.org/bugs/index.php?do=details&task_id=240", - "refsource": "CONFIRM", - "url": "http://www.uzbl.org/bugs/index.php?do=details&task_id=240" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621965", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=621965" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=621965", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621965" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61011", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61011" }, { - "name": "uzbl-atselecteduri-command-execution(61011)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61011" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621964", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=621964" } ] } diff --git a/2010/2xxx/CVE-2010-2810.json b/2010/2xxx/CVE-2010-2810.json index faeeae2e077..b6334023344 100644 --- a/2010/2xxx/CVE-2010-2810.json +++ b/2010/2xxx/CVE-2010-2810.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-2810", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,37 +27,61 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "lynx-converttoidna-bo(61007)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61007" + "url": "http://marc.info/?l=oss-security&m=128151768510564&w=2", + "refsource": "MISC", + "name": "http://marc.info/?l=oss-security&m=128151768510564&w=2" }, { - "name": "[oss-security] 20100809 Re: CVE request: Lynx", - "refsource": "MLIST", - "url": "http://marc.info/?l=oss-security&m=128152412221677&w=2" + "url": "http://marc.info/?l=oss-security&m=128152412221677&w=2", + "refsource": "MISC", + "name": "http://marc.info/?l=oss-security&m=128152412221677&w=2" }, { - "name": "ADV-2010-2042", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/2042" + "url": "http://www.ubuntu.com/usn/USN-1642-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1642-1" }, { - "name": "USN-1642-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1642-1" + "url": "http://www.vupen.com/english/advisories/2010/2042", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/2042" }, { - "name": "[oss-security] 20100809 CVE request: Lynx", - "refsource": "MLIST", - "url": "http://marc.info/?l=oss-security&m=128151768510564&w=2" + "url": "https://bugs.launchpad.net/ubuntu/+source/lynx-cur/+bug/613254", + "refsource": "MISC", + "name": "https://bugs.launchpad.net/ubuntu/+source/lynx-cur/+bug/613254" }, { - "name": "https://bugs.launchpad.net/ubuntu/+source/lynx-cur/+bug/613254", - "refsource": "CONFIRM", - "url": "https://bugs.launchpad.net/ubuntu/+source/lynx-cur/+bug/613254" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61007", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61007" } ] } diff --git a/2010/2xxx/CVE-2010-2811.json b/2010/2xxx/CVE-2010-2811.json index 9fa6abaa6f4..bf124456f1c 100644 --- a/2010/2xxx/CVE-2010-2811.json +++ b/2010/2xxx/CVE-2010-2811.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-2811", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,32 +27,56 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "42580", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/42580" + "url": "https://rhn.redhat.com/errata/RHSA-2010-0622.html", + "refsource": "MISC", + "name": "https://rhn.redhat.com/errata/RHSA-2010-0622.html" }, { - "name": "RHSA-2010:0622", - "refsource": "REDHAT", - "url": "https://rhn.redhat.com/errata/RHSA-2010-0622.html" + "url": "http://securitytracker.com/id?1024347", + "refsource": "MISC", + "name": "http://securitytracker.com/id?1024347" }, { - "name": "RHSA-2010:0628", - "refsource": "REDHAT", - "url": "https://rhn.redhat.com/errata/RHSA-2010-0628.html" + "url": "http://www.securityfocus.com/bid/42580", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/42580" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=622928", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=622928" + "url": "https://rhn.redhat.com/errata/RHSA-2010-0628.html", + "refsource": "MISC", + "name": "https://rhn.redhat.com/errata/RHSA-2010-0628.html" }, { - "name": "1024347", - "refsource": "SECTRACK", - "url": "http://securitytracker.com/id?1024347" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=622928", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=622928" } ] } diff --git a/2010/2xxx/CVE-2010-2812.json b/2010/2xxx/CVE-2010-2812.json index 80a0c054faa..c8045582360 100644 --- a/2010/2xxx/CVE-2010-2812.json +++ b/2010/2xxx/CVE-2010-2812.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-2812", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,67 +27,91 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "ADV-2010-2071", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/2071" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045385.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045385.html" }, { - "name": "40919", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/40919" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045386.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045386.html" }, { - "name": "FEDORA-2010-12481", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045385.html" + "url": "http://marc.info/?l=oss-security&m=128146120727810&w=2", + "refsource": "MISC", + "name": "http://marc.info/?l=oss-security&m=128146120727810&w=2" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=622600", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=622600" + "url": "http://marc.info/?l=oss-security&m=128146352011964&w=2", + "refsource": "MISC", + "name": "http://marc.info/?l=oss-security&m=128146352011964&w=2" }, { - "name": "42314", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/42314" + "url": "http://marc.info/?l=oss-security&m=128152390219401&w=2", + "refsource": "MISC", + "name": "http://marc.info/?l=oss-security&m=128152390219401&w=2" }, { - "name": "[oss-security] 20100810 Re: Re: CVE Request - ZNC", - "refsource": "MLIST", - "url": "http://marc.info/?l=oss-security&m=128152390219401&w=2" + "url": "http://secunia.com/advisories/40919", + "refsource": "MISC", + "name": "http://secunia.com/advisories/40919" }, { - "name": "http://znc.svn.sourceforge.net/viewvc/znc/trunk/Client.cpp?r1=2093&r2=2092&pathrev=2093", - "refsource": "CONFIRM", - "url": "http://znc.svn.sourceforge.net/viewvc/znc/trunk/Client.cpp?r1=2093&r2=2092&pathrev=2093" + "url": "http://secunia.com/advisories/40970", + "refsource": "MISC", + "name": "http://secunia.com/advisories/40970" }, { - "name": "[oss-security] 20100809 CVE Request - ZNC", - "refsource": "MLIST", - "url": "http://marc.info/?l=oss-security&m=128146352011964&w=2" + "url": "http://www.securityfocus.com/bid/42314", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/42314" }, { - "name": "[oss-security] 20100809 Re: CVE Request - ZNC", - "refsource": "MLIST", - "url": "http://marc.info/?l=oss-security&m=128146120727810&w=2" + "url": "http://www.vupen.com/english/advisories/2010/2071", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/2071" }, { - "name": "FEDORA-2010-12468", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045386.html" + "url": "http://znc.svn.sourceforge.net/viewvc/znc/trunk/Client.cpp?r1=2093&r2=2092&pathrev=2093", + "refsource": "MISC", + "name": "http://znc.svn.sourceforge.net/viewvc/znc/trunk/Client.cpp?r1=2093&r2=2092&pathrev=2093" }, { - "name": "40970", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/40970" + "url": "http://znc.svn.sourceforge.net/viewvc/znc?view=revision&revision=2093", + "refsource": "MISC", + "name": "http://znc.svn.sourceforge.net/viewvc/znc?view=revision&revision=2093" }, { - "name": "http://znc.svn.sourceforge.net/viewvc/znc?view=revision&revision=2093", - "refsource": "CONFIRM", - "url": "http://znc.svn.sourceforge.net/viewvc/znc?view=revision&revision=2093" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=622600", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=622600" } ] } diff --git a/2010/2xxx/CVE-2010-2934.json b/2010/2xxx/CVE-2010-2934.json index 1102089238f..2faa0aa3a34 100644 --- a/2010/2xxx/CVE-2010-2934.json +++ b/2010/2xxx/CVE-2010-2934.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-2934", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,62 +27,86 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "ADV-2010-2071", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/2071" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045385.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045385.html" }, { - "name": "40919", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/40919" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045386.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045386.html" }, { - "name": "http://znc.svn.sourceforge.net/viewvc/znc?view=revision&revision=2095", - "refsource": "CONFIRM", - "url": "http://znc.svn.sourceforge.net/viewvc/znc?view=revision&revision=2095" + "url": "http://marc.info/?l=oss-security&m=128146120727810&w=2", + "refsource": "MISC", + "name": "http://marc.info/?l=oss-security&m=128146120727810&w=2" }, { - "name": "FEDORA-2010-12481", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045385.html" + "url": "http://marc.info/?l=oss-security&m=128146352011964&w=2", + "refsource": "MISC", + "name": "http://marc.info/?l=oss-security&m=128146352011964&w=2" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=622600", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=622600" + "url": "http://marc.info/?l=oss-security&m=128152390219401&w=2", + "refsource": "MISC", + "name": "http://marc.info/?l=oss-security&m=128152390219401&w=2" }, { - "name": "42314", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/42314" + "url": "http://secunia.com/advisories/40919", + "refsource": "MISC", + "name": "http://secunia.com/advisories/40919" }, { - "name": "[oss-security] 20100810 Re: Re: CVE Request - ZNC", - "refsource": "MLIST", - "url": "http://marc.info/?l=oss-security&m=128152390219401&w=2" + "url": "http://secunia.com/advisories/40970", + "refsource": "MISC", + "name": "http://secunia.com/advisories/40970" }, { - "name": "[oss-security] 20100809 CVE Request - ZNC", - "refsource": "MLIST", - "url": "http://marc.info/?l=oss-security&m=128146352011964&w=2" + "url": "http://www.securityfocus.com/bid/42314", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/42314" }, { - "name": "[oss-security] 20100809 Re: CVE Request - ZNC", - "refsource": "MLIST", - "url": "http://marc.info/?l=oss-security&m=128146120727810&w=2" + "url": "http://www.vupen.com/english/advisories/2010/2071", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/2071" }, { - "name": "FEDORA-2010-12468", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045386.html" + "url": "http://znc.svn.sourceforge.net/viewvc/znc?view=revision&revision=2095", + "refsource": "MISC", + "name": "http://znc.svn.sourceforge.net/viewvc/znc?view=revision&revision=2095" }, { - "name": "40970", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/40970" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=622600", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=622600" } ] } diff --git a/2010/2xxx/CVE-2010-2935.json b/2010/2xxx/CVE-2010-2935.json index 9ef5dab744e..53936fcca41 100644 --- a/2010/2xxx/CVE-2010-2935.json +++ b/2010/2xxx/CVE-2010-2935.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-2935", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,157 +27,181 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "40775", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/40775" - }, - { - "name": "[dev] 20100806 Two exploitable OpenOffice.org bugs!", - "refsource": "MLIST", - "url": "http://www.openoffice.org/servlets/ReadMsg?list=dev&msgNo=27690" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=622529", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=622529" - }, - { - "name": "MDVSA-2010:221", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:221" - }, - { - "name": "ADV-2010-2003", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/2003" - }, - { - "name": "60799", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/60799" - }, - { - "name": "1024976", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id?1024976" - }, - { - "name": "GLSA-201408-19", - "refsource": "GENTOO", - "url": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml" - }, - { - "name": "oval:org.mitre.oval:def:12063", - "refsource": "OVAL", - "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12063" - }, - { - "name": "ADV-2011-0150", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0150" - }, - { - "name": "42927", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42927" - }, - { - "name": "RHSA-2010:0643", - "refsource": "REDHAT", - "url": "http://www.redhat.com/support/errata/RHSA-2010-0643.html" - }, - { - "name": "ADV-2011-0230", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0230" - }, - { - "name": "ADV-2010-2149", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/2149" - }, - { - "name": "[oss-security] 20100811 CVE Request -- OpenOffice.org [two ids]: 1, integer truncation error 2, short integer overflow", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2010/08/11/1" - }, - { - "name": "ADV-2010-2228", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/2228" - }, - { - "name": "http://www.openoffice.org/security/cves/CVE-2010-2935_CVE-2010-2936.html", - "refsource": "CONFIRM", - "url": "http://www.openoffice.org/security/cves/CVE-2010-2935_CVE-2010-2936.html" - }, - { - "name": "41235", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/41235" - }, - { - "name": "USN-1056-1", - "refsource": "UBUNTU", - "url": "http://ubuntu.com/usn/usn-1056-1" - }, - { - "name": "ADV-2011-0279", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0279" - }, - { - "name": "1024352", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id?1024352" - }, - { - "name": "43105", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/43105" - }, - { - "name": "http://securityevaluators.com/files/papers/CrashAnalysis.pdf", + "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html", "refsource": "MISC", - "url": "http://securityevaluators.com/files/papers/CrashAnalysis.pdf" + "name": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { - "name": "SUSE-SR:2010:024", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" }, { - "name": "DSA-2099", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2010/dsa-2099" + "url": "http://secunia.com/advisories/40775", + "refsource": "MISC", + "name": "http://secunia.com/advisories/40775" }, { - "name": "SUSE-SR:2010:019", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" + "url": "http://secunia.com/advisories/41052", + "refsource": "MISC", + "name": "http://secunia.com/advisories/41052" }, { - "name": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html", - "refsource": "CONFIRM", - "url": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html" + "url": "http://secunia.com/advisories/41235", + "refsource": "MISC", + "name": "http://secunia.com/advisories/41235" }, { - "name": "41052", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/41052" + "url": "http://secunia.com/advisories/42927", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42927" }, { - "name": "ADV-2010-2905", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/2905" + "url": "http://secunia.com/advisories/43105", + "refsource": "MISC", + "name": "http://secunia.com/advisories/43105" }, { - "name": "[oss-security] 20100811 Re: CVE Request -- OpenOffice.org [two ids]: 1, integer truncation error 2, short integer overflow", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2010/08/11/4" + "url": "http://secunia.com/advisories/60799", + "refsource": "MISC", + "name": "http://secunia.com/advisories/60799" + }, + { + "url": "http://securityevaluators.com/files/papers/CrashAnalysis.pdf", + "refsource": "MISC", + "name": "http://securityevaluators.com/files/papers/CrashAnalysis.pdf" + }, + { + "url": "http://ubuntu.com/usn/usn-1056-1", + "refsource": "MISC", + "name": "http://ubuntu.com/usn/usn-1056-1" + }, + { + "url": "http://www.debian.org/security/2010/dsa-2099", + "refsource": "MISC", + "name": "http://www.debian.org/security/2010/dsa-2099" + }, + { + "url": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml", + "refsource": "MISC", + "name": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:221", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:221" + }, + { + "url": "http://www.openoffice.org/security/cves/CVE-2010-2935_CVE-2010-2936.html", + "refsource": "MISC", + "name": "http://www.openoffice.org/security/cves/CVE-2010-2935_CVE-2010-2936.html" + }, + { + "url": "http://www.openoffice.org/servlets/ReadMsg?list=dev&msgNo=27690", + "refsource": "MISC", + "name": "http://www.openoffice.org/servlets/ReadMsg?list=dev&msgNo=27690" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2010/08/11/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2010/08/11/1" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2010/08/11/4", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2010/08/11/4" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html", + "refsource": "MISC", + "name": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html" + }, + { + "url": "http://www.redhat.com/support/errata/RHSA-2010-0643.html", + "refsource": "MISC", + "name": "http://www.redhat.com/support/errata/RHSA-2010-0643.html" + }, + { + "url": "http://www.securitytracker.com/id?1024352", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id?1024352" + }, + { + "url": "http://www.securitytracker.com/id?1024976", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id?1024976" + }, + { + "url": "http://www.vupen.com/english/advisories/2010/2003", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/2003" + }, + { + "url": "http://www.vupen.com/english/advisories/2010/2149", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/2149" + }, + { + "url": "http://www.vupen.com/english/advisories/2010/2228", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/2228" + }, + { + "url": "http://www.vupen.com/english/advisories/2010/2905", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/2905" + }, + { + "url": "http://www.vupen.com/english/advisories/2011/0150", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0150" + }, + { + "url": "http://www.vupen.com/english/advisories/2011/0230", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0230" + }, + { + "url": "http://www.vupen.com/english/advisories/2011/0279", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0279" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12063", + "refsource": "MISC", + "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12063" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=622529", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=622529" } ] } diff --git a/2010/2xxx/CVE-2010-2936.json b/2010/2xxx/CVE-2010-2936.json index 1bcd27f638e..2ab8c8f4ca4 100644 --- a/2010/2xxx/CVE-2010-2936.json +++ b/2010/2xxx/CVE-2010-2936.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2010-2936 OpenOffice.org: Heap-based buffer overflow by parsing specially-crafted Microsoft PowerPoint document" + "value": "Integer overflow in simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted polygons in a PowerPoint document that triggers a heap-based buffer overflow." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Heap-based Buffer Overflow", - "cweId": "CWE-122" + "value": "n/a" } ] } @@ -32,31 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 3", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:1.1.2-48.2.0.EL3", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 4", - "version": { - "version_data": [ - { - "version_value": "0:1.1.5-10.6.0.7.EL4.5", - "version_affected": "!" - }, - { - "version_value": "1:2.0.4-5.7.0.6.1.el4_8.6", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -209,55 +193,20 @@ "refsource": "MISC", "name": "http://www.vupen.com/english/advisories/2011/0279" }, - { - "url": "https://access.redhat.com/errata/RHSA-2010:0643", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2010:0643" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2010-2936", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2010-2936" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=622529#c6", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=622529#c6" }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=622555", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=622555" - }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12144", "refsource": "MISC", "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12144" - } - ] - }, - "impact": { - "cvss": [ + }, { - "accessComplexity": "MEDIUM", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 6.8, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", - "version": "2.0" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=622555", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=622555" } ] } diff --git a/2010/2xxx/CVE-2010-2938.json b/2010/2xxx/CVE-2010-2938.json index 0446c444289..346a22236db 100644 --- a/2010/2xxx/CVE-2010-2938.json +++ b/2010/2xxx/CVE-2010-2938.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-2938", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,47 +27,71 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "RHSA-2010:0723", - "refsource": "REDHAT", - "url": "http://www.redhat.com/support/errata/RHSA-2010-0723.html" + "url": "http://secunia.com/advisories/46397", + "refsource": "MISC", + "name": "http://secunia.com/advisories/46397" }, { - "name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console", - "refsource": "BUGTRAQ", - "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" + "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded", + "refsource": "MISC", + "name": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { - "name": "43578", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/43578" + "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", + "refsource": "MISC", + "name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { - "name": "46397", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/46397" + "url": "http://support.avaya.com/css/P8/documents/100113326", + "refsource": "MISC", + "name": "http://support.avaya.com/css/P8/documents/100113326" }, { - "name": "http://xenbits.xensource.com/xen-unstable.hg?rev/15911", - "refsource": "CONFIRM", - "url": "http://xenbits.xensource.com/xen-unstable.hg?rev/15911" + "url": "http://www.redhat.com/support/errata/RHSA-2010-0723.html", + "refsource": "MISC", + "name": "http://www.redhat.com/support/errata/RHSA-2010-0723.html" }, { - "name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", - "refsource": "CONFIRM", - "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" + "url": "http://www.securityfocus.com/bid/43578", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/43578" }, { - "name": "http://support.avaya.com/css/P8/documents/100113326", - "refsource": "CONFIRM", - "url": "http://support.avaya.com/css/P8/documents/100113326" + "url": "http://xenbits.xensource.com/xen-unstable.hg?rev/15911", + "refsource": "MISC", + "name": "http://xenbits.xensource.com/xen-unstable.hg?rev/15911" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=620490", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=620490" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=620490", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=620490" } ] } diff --git a/2010/2xxx/CVE-2010-2939.json b/2010/2xxx/CVE-2010-2939.json index 54caf91464c..e4f2ac410f0 100644 --- a/2010/2xxx/CVE-2010-2939.json +++ b/2010/2xxx/CVE-2010-2939.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-2939", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "Double free vulnerability in the ssl3_get_key_exchange function in the OpenSSL client (ssl/s3_clnt.c) in OpenSSL 1.0.0a, 0.9.8, 0.9.7, and possibly other versions, when using ECDH, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted private key with an invalid prime. NOTE: some sources refer to this as a use-after-free issue." + "value": "Double free vulnerability in the ssl3_get_key_exchange function in the OpenSSL client (ssl/s3_clnt.c) in OpenSSL 1.0.0a, 0.9.8, 0.9.7, and possibly other versions, when using ECDH, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted private key with an invalid prime. NOTE: some sources refer to this as a use-after-free issue." } ] }, @@ -50,122 +27,141 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "SSA:2010-326-01", - "refsource": "SLACKWARE", - "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.668793" + "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded", + "refsource": "MISC", + "name": "http://www.securityfocus.com/archive/1/516397/100/0/threaded" }, { - "name": "[openssl-dev] 20100808 Re: openssl-1.0.0a and glibc detected sthg ;)", - "refsource": "MLIST", - "url": "http://www.mail-archive.com/openssl-dev@openssl.org/msg28049.html" + "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html", + "refsource": "MISC", + "name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html" }, { - "name": "HPSBMA02662", - "refsource": "HP", - "url": "http://marc.info/?l=bugtraq&m=130331363227777&w=2" + "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { - "name": "42413", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42413" + "url": "http://marc.info/?l=bugtraq&m=130331363227777&w=2", + "refsource": "MISC", + "name": "http://marc.info/?l=bugtraq&m=130331363227777&w=2" }, { - "name": "40906", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/40906" + "url": "http://seclists.org/fulldisclosure/2010/Aug/84", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2010/Aug/84" }, { - "name": "DSA-2100", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2010/dsa-2100" + "url": "http://secunia.com/advisories/40906", + "refsource": "MISC", + "name": "http://secunia.com/advisories/40906" }, { - "name": "[oss-security] 20100812 Re: CVE Request: openssl double free", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2010/08/11/6" + "url": "http://secunia.com/advisories/41105", + "refsource": "MISC", + "name": "http://secunia.com/advisories/41105" }, { - "name": "20100807 openssl-1.0.0a", - "refsource": "FULLDISC", - "url": "http://seclists.org/fulldisclosure/2010/Aug/84" + "url": "http://secunia.com/advisories/42309", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42309" }, { - "name": "ADV-2010-2229", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/2229" + "url": "http://secunia.com/advisories/42413", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42413" }, { - "name": "ADV-2010-2038", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/2038" + "url": "http://secunia.com/advisories/43312", + "refsource": "MISC", + "name": "http://secunia.com/advisories/43312" }, { - "name": "1024296", - "refsource": "SECTRACK", - "url": "http://securitytracker.com/id?1024296" + "url": "http://security.FreeBSD.org/advisories/FreeBSD-SA-10:10.openssl.asc", + "refsource": "MISC", + "name": "http://security.FreeBSD.org/advisories/FreeBSD-SA-10:10.openssl.asc" }, { - "name": "USN-1003-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1003-1" + "url": "http://securitytracker.com/id?1024296", + "refsource": "MISC", + "name": "http://securitytracker.com/id?1024296" }, { - "name": "SSRT100409", - "refsource": "HP", - "url": "http://marc.info/?l=bugtraq&m=130331363227777&w=2" + "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.668793", + "refsource": "MISC", + "name": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.668793" }, { - "name": "42309", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42309" + "url": "http://www.debian.org/security/2010/dsa-2100", + "refsource": "MISC", + "name": "http://www.debian.org/security/2010/dsa-2100" }, { - "name": "ADV-2010-3077", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/3077" + "url": "http://www.mail-archive.com/openssl-dev%40openssl.org/msg28043.html", + "refsource": "MISC", + "name": "http://www.mail-archive.com/openssl-dev%40openssl.org/msg28043.html" }, { - "name": "FreeBSD-SA-10:10", - "refsource": "FREEBSD", - "url": "http://security.FreeBSD.org/advisories/FreeBSD-SA-10:10.openssl.asc" + "url": "http://www.mail-archive.com/openssl-dev%40openssl.org/msg28045.html", + "refsource": "MISC", + "name": "http://www.mail-archive.com/openssl-dev%40openssl.org/msg28045.html" }, { - "name": "43312", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/43312" + "url": "http://www.mail-archive.com/openssl-dev%40openssl.org/msg28049.html", + "refsource": "MISC", + "name": "http://www.mail-archive.com/openssl-dev%40openssl.org/msg28049.html" }, { - "name": "SUSE-SR:2010:021", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" + "url": "http://www.openwall.com/lists/oss-security/2010/08/11/6", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2010/08/11/6" }, { - "name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html", - "refsource": "CONFIRM", - "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html" + "url": "http://www.ubuntu.com/usn/USN-1003-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1003-1" }, { - "name": "[openssl-dev] 20100807 openssl-1.0.0a and glibc detected sthg ;)", - "refsource": "MLIST", - "url": "http://www.mail-archive.com/openssl-dev@openssl.org/msg28043.html" + "url": "http://www.vupen.com/english/advisories/2010/2038", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/2038" }, { - "name": "[openssl-dev] 20100807 Re: openssl-1.0.0a and glibc detected sthg ;)", - "refsource": "MLIST", - "url": "http://www.mail-archive.com/openssl-dev@openssl.org/msg28045.html" + "url": "http://www.vupen.com/english/advisories/2010/2229", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/2229" }, { - "name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX", - "refsource": "BUGTRAQ", - "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded" - }, - { - "name": "41105", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/41105" + "url": "http://www.vupen.com/english/advisories/2010/3077", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/3077" } ] } diff --git a/2010/2xxx/CVE-2010-2940.json b/2010/2xxx/CVE-2010-2940.json index 025d3ecdc1c..1d670fbd483 100644 --- a/2010/2xxx/CVE-2010-2940.json +++ b/2010/2xxx/CVE-2010-2940.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-2940", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,22 +27,46 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "sssd-ldap-security-bypass(61399)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61399" + "url": "http://secunia.com/advisories/41159", + "refsource": "MISC", + "name": "http://secunia.com/advisories/41159" }, { - "name": "41159", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/41159" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61399", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61399" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=625189", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=625189" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=625189", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=625189" } ] } diff --git a/2010/2xxx/CVE-2010-2941.json b/2010/2xxx/CVE-2010-2941.json index 5ea7ffa9149..7fdbcdf7247 100644 --- a/2010/2xxx/CVE-2010-2941.json +++ b/2010/2xxx/CVE-2010-2941.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-2941", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,152 +27,176 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "MDVSA-2010:234", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:234" + "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", + "refsource": "MISC", + "name": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { - "name": "http://support.apple.com/kb/HT4435", - "refsource": "CONFIRM", - "url": "http://support.apple.com/kb/HT4435" + "url": "http://support.apple.com/kb/HT4435", + "refsource": "MISC", + "name": "http://support.apple.com/kb/HT4435" }, { - "name": "ADV-2010-3042", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/3042" + "url": "http://security.gentoo.org/glsa/glsa-201207-10.xml", + "refsource": "MISC", + "name": "http://security.gentoo.org/glsa/glsa-201207-10.xml" }, { - "name": "RHSA-2010:0811", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2010-0811.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" }, { - "name": "RHSA-2010:0866", - "refsource": "REDHAT", - "url": "http://www.redhat.com/support/errata/RHSA-2010-0866.html" + "url": "http://secunia.com/advisories/43521", + "refsource": "MISC", + "name": "http://secunia.com/advisories/43521" }, { - "name": "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox", - "refsource": "CONFIRM", - "url": "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox" + "url": "http://www.debian.org/security/2011/dsa-2176", + "refsource": "MISC", + "name": "http://www.debian.org/security/2011/dsa-2176" }, { - "name": "MDVSA-2010:232", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:232" + "url": "http://www.vupen.com/english/advisories/2011/0535", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0535" }, { - "name": "FEDORA-2010-17615", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051301.html" + "url": "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox", + "refsource": "MISC", + "name": "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox" }, { - "name": "SUSE-SR:2010:023", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050977.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050977.html" }, { - "name": "ADV-2010-2856", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/2856" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051277.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051277.html" }, { - "name": "DSA-2176", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2011/dsa-2176" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051301.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051301.html" }, { - "name": "1024662", - "refsource": "SECTRACK", - "url": "http://securitytracker.com/id?1024662" + "url": "http://rhn.redhat.com/errata/RHSA-2010-0811.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2010-0811.html" }, { - "name": "APPLE-SA-2010-11-10-1", - "refsource": "APPLE", - "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" + "url": "http://secunia.com/advisories/42287", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42287" }, { - "name": "42867", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42867" + "url": "http://secunia.com/advisories/42867", + "refsource": "MISC", + "name": "http://secunia.com/advisories/42867" }, { - "name": "GLSA-201207-10", - "refsource": "GENTOO", - "url": "http://security.gentoo.org/glsa/glsa-201207-10.xml" + "url": "http://securitytracker.com/id?1024662", + "refsource": "MISC", + "name": "http://securitytracker.com/id?1024662" }, { - "name": "ADV-2011-0061", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0061" + "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.468323", + "refsource": "MISC", + "name": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.468323" }, { - "name": "FEDORA-2010-17641", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050977.html" + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:232", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:232" }, { - "name": "ADV-2011-0535", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0535" + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:233", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:233" }, { - "name": "USN-1012-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1012-1" + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:234", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:234" }, { - "name": "FEDORA-2010-17627", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051277.html" + "url": "http://www.osvdb.org/68951", + "refsource": "MISC", + "name": "http://www.osvdb.org/68951" }, { - "name": "MDVSA-2010:233", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:233" + "url": "http://www.redhat.com/support/errata/RHSA-2010-0866.html", + "refsource": "MISC", + "name": "http://www.redhat.com/support/errata/RHSA-2010-0866.html" }, { - "name": "42287", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/42287" + "url": "http://www.securityfocus.com/bid/44530", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/44530" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=624438", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=624438" + "url": "http://www.ubuntu.com/usn/USN-1012-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1012-1" }, { - "name": "cups-cupsd-code-execution(62882)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62882" + "url": "http://www.vupen.com/english/advisories/2010/2856", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/2856" }, { - "name": "43521", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/43521" + "url": "http://www.vupen.com/english/advisories/2010/3042", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/3042" }, { - "name": "SSA:2010-333-01", - "refsource": "SLACKWARE", - "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.468323" + "url": "http://www.vupen.com/english/advisories/2010/3088", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2010/3088" }, { - "name": "68951", - "refsource": "OSVDB", - "url": "http://www.osvdb.org/68951" + "url": "http://www.vupen.com/english/advisories/2011/0061", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0061" }, { - "name": "44530", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/44530" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62882", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62882" }, { - "name": "ADV-2010-3088", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2010/3088" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=624438", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=624438" } ] } diff --git a/2011/0xxx/CVE-2011-0709.json b/2011/0xxx/CVE-2011-0709.json index aff8c7e46e1..b85b610492c 100644 --- a/2011/0xxx/CVE-2011-0709.json +++ b/2011/0xxx/CVE-2011-0709.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-0709", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,47 +27,71 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.35/ChangeLog-2.6.35-rc5", - "refsource": "CONFIRM", - "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.35/ChangeLog-2.6.35-rc5" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7f285fa78d4b81b8458f05e77fb6b46245121b4e", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7f285fa78d4b81b8458f05e77fb6b46245121b4e" }, { - "name": "[oss-security] 20110216 Re: CVE request - kernel: bridge br_multicast NULL pointer dereference", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2011/02/16/14" + "url": "http://openwall.com/lists/oss-security/2011/02/16/1", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2011/02/16/1" }, { - "name": "41432", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/41432" + "url": "http://openwall.com/lists/oss-security/2011/02/16/14", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2011/02/16/14" }, { - "name": "[netdev] 20100706 Re: bridge br_multicast: BUG: unable to handle kernel NULL pointer dereference", - "refsource": "MLIST", - "url": "http://www.spinics.net/lists/netdev/msg134444.html" + "url": "http://openwall.com/lists/oss-security/2011/02/16/8", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2011/02/16/8" }, { - "name": "[oss-security] 20110216 CVE request - kernel: bridge br_multicast NULL pointer dereference", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2011/02/16/1" + "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.35/ChangeLog-2.6.35-rc5", + "refsource": "MISC", + "name": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.35/ChangeLog-2.6.35-rc5" }, { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7f285fa78d4b81b8458f05e77fb6b46245121b4e", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7f285fa78d4b81b8458f05e77fb6b46245121b4e" + "url": "http://www.securityfocus.com/bid/41432", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/41432" }, { - "name": "[oss-security] 20110216 Re: CVE request - kernel: bridge br_multicast NULL pointer dereference", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2011/02/16/8" + "url": "http://www.spinics.net/lists/netdev/msg134414.html", + "refsource": "MISC", + "name": "http://www.spinics.net/lists/netdev/msg134414.html" }, { - "name": "[netdev] 20100705 bridge br_multicast: BUG: unable to handle kernel NULL pointer dereference", - "refsource": "MLIST", - "url": "http://www.spinics.net/lists/netdev/msg134414.html" + "url": "http://www.spinics.net/lists/netdev/msg134444.html", + "refsource": "MISC", + "name": "http://www.spinics.net/lists/netdev/msg134444.html" } ] } diff --git a/2011/0xxx/CVE-2011-0710.json b/2011/0xxx/CVE-2011-0710.json index 46d17ac9dd8..f15bec54430 100644 --- a/2011/0xxx/CVE-2011-0710.json +++ b/2011/0xxx/CVE-2011-0710.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-0710", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,57 +27,81 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console", - "refsource": "BUGTRAQ", - "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" + "url": "http://secunia.com/advisories/46397", + "refsource": "MISC", + "name": "http://secunia.com/advisories/46397" }, { - "name": "46397", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/46397" + "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded", + "refsource": "MISC", + "name": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { - "name": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.38-rc4-next-20110216.bz2", - "refsource": "CONFIRM", - "url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.38-rc4-next-20110216.bz2" + "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", + "refsource": "MISC", + "name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=677850", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677850" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=261cd298a8c363d7985e3482946edb4bfedacf98", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=261cd298a8c363d7985e3482946edb4bfedacf98" }, { - "name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", - "refsource": "CONFIRM", - "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" + "url": "http://openwall.com/lists/oss-security/2011/02/16/3", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2011/02/16/3" }, { - "name": "[oss-security] 20110216 CVE request - kernel: s390 task_show_regs infoleak", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2011/02/16/3" + "url": "http://openwall.com/lists/oss-security/2011/02/16/9", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2011/02/16/9" }, { - "name": "[oss-security] 20110216 Re: CVE request - kernel: s390 task_show_regs infoleak", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2011/02/16/9" + "url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.38-rc4-next-20110216.bz2", + "refsource": "MISC", + "name": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.38-rc4-next-20110216.bz2" }, { - "name": "46421", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/46421" + "url": "http://www.securityfocus.com/bid/46421", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/46421" }, { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=261cd298a8c363d7985e3482946edb4bfedacf98", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=261cd298a8c363d7985e3482946edb4bfedacf98" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65464", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65464" }, { - "name": "kernel-taskshowregs-info-disclosure(65464)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65464" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677850", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=677850" } ] } diff --git a/2011/0xxx/CVE-2011-0711.json b/2011/0xxx/CVE-2011-0711.json index 8923fd34f41..c64d3c5bdc8 100644 --- a/2011/0xxx/CVE-2011-0711.json +++ b/2011/0xxx/CVE-2011-0711.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-0711", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,52 +27,76 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "46417", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/46417" + "url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2011-0927.html" }, { - "name": "https://patchwork.kernel.org/patch/555461/", - "refsource": "CONFIRM", - "url": "https://patchwork.kernel.org/patch/555461/" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3a3675b7f23f83ca8c67c9c2b6edf707fd28d1ba", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3a3675b7f23f83ca8c67c9c2b6edf707fd28d1ba" }, { - "name": "RHSA-2011:0927", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html" + "url": "http://openwall.com/lists/oss-security/2011/02/16/10", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2011/02/16/10" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=677260", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677260" + "url": "http://openwall.com/lists/oss-security/2011/02/16/4", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2011/02/16/4" }, { - "name": "[oss-security] 20110216 Re: CVE request - kernel: xfs infoleak", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2011/02/16/10" + "url": "http://osvdb.org/70950", + "refsource": "MISC", + "name": "http://osvdb.org/70950" }, { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3a3675b7f23f83ca8c67c9c2b6edf707fd28d1ba", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3a3675b7f23f83ca8c67c9c2b6edf707fd28d1ba" + "url": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.38-rc6-git3.log", + "refsource": "MISC", + "name": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.38-rc6-git3.log" }, { - "name": "[oss-security] 20110216 CVE request - kernel: xfs infoleak", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2011/02/16/4" + "url": "http://www.securityfocus.com/bid/46417", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/46417" }, { - "name": "70950", - "refsource": "OSVDB", - "url": "http://osvdb.org/70950" + "url": "https://patchwork.kernel.org/patch/555461/", + "refsource": "MISC", + "name": "https://patchwork.kernel.org/patch/555461/" }, { - "name": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.38-rc6-git3.log", - "refsource": "CONFIRM", - "url": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.38-rc6-git3.log" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677260", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=677260" } ] } diff --git a/2011/0xxx/CVE-2011-0718.json b/2011/0xxx/CVE-2011-0718.json index e08a46dfb7b..1a4df7b4db4 100644 --- a/2011/0xxx/CVE-2011-0718.json +++ b/2011/0xxx/CVE-2011-0718.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-0718", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "46528", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/46528" + "url": "http://secunia.com/advisories/43487", + "refsource": "MISC", + "name": "http://secunia.com/advisories/43487" }, { - "name": "ADV-2011-0491", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0491" + "url": "http://www.redhat.com/support/errata/RHSA-2011-0300.html", + "refsource": "MISC", + "name": "http://www.redhat.com/support/errata/RHSA-2011-0300.html" }, { - "name": "RHSA-2011:0300", - "refsource": "REDHAT", - "url": "http://www.redhat.com/support/errata/RHSA-2011-0300.html" + "url": "http://www.securityfocus.com/bid/46528", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/46528" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=672159", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=672159" + "url": "http://www.securitytracker.com/id?1025116", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id?1025116" }, { - "name": "1025116", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id?1025116" + "url": "http://www.vupen.com/english/advisories/2011/0491", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0491" }, { - "name": "rhnss-weak-security(65657)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65657" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=672159", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=672159" }, { - "name": "43487", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/43487" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65657", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65657" } ] } diff --git a/2011/0xxx/CVE-2011-0719.json b/2011/0xxx/CVE-2011-0719.json index c962542bd1e..15830d1accd 100644 --- a/2011/0xxx/CVE-2011-0719.json +++ b/2011/0xxx/CVE-2011-0719.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-0719", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,177 +27,196 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "HPSBUX02657", - "refsource": "HP", - "url": "http://marc.info/?l=bugtraq&m=130835366526620&w=2" + "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html", + "refsource": "MISC", + "name": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { - "name": "ADV-2011-0522", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0522" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056229.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056229.html" }, { - "name": "SSA:2011-059-01", - "refsource": "SLACKWARE", - "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.593629" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056241.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056241.html" }, { - "name": "1025132", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id?1025132" + "url": "http://marc.info/?l=bugtraq&m=130835366526620&w=2", + "refsource": "MISC", + "name": "http://marc.info/?l=bugtraq&m=130835366526620&w=2" }, { - "name": "http://support.apple.com/kb/HT4723", - "refsource": "CONFIRM", - "url": "http://support.apple.com/kb/HT4723" + "url": "http://samba.org/samba/security/CVE-2011-0719.html", + "refsource": "MISC", + "name": "http://samba.org/samba/security/CVE-2011-0719.html" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=678328", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=678328" + "url": "http://secunia.com/advisories/43482", + "refsource": "MISC", + "name": "http://secunia.com/advisories/43482" }, { - "name": "RHSA-2011:0306", - "refsource": "REDHAT", - "url": "http://www.redhat.com/support/errata/RHSA-2011-0306.html" + "url": "http://secunia.com/advisories/43503", + "refsource": "MISC", + "name": "http://secunia.com/advisories/43503" }, { - "name": "DSA-2175", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2011/dsa-2175" + "url": "http://secunia.com/advisories/43512", + "refsource": "MISC", + "name": "http://secunia.com/advisories/43512" }, { - "name": "46597", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/46597" + "url": "http://secunia.com/advisories/43517", + "refsource": "MISC", + "name": "http://secunia.com/advisories/43517" }, { - "name": "ADV-2011-0541", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0541" + "url": "http://secunia.com/advisories/43556", + "refsource": "MISC", + "name": "http://secunia.com/advisories/43556" }, { - "name": "ADV-2011-0517", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0517" + "url": "http://secunia.com/advisories/43557", + "refsource": "MISC", + "name": "http://secunia.com/advisories/43557" }, { - "name": "ADV-2011-0702", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0702" + "url": "http://secunia.com/advisories/43843", + "refsource": "MISC", + "name": "http://secunia.com/advisories/43843" }, { - "name": "APPLE-SA-2011-06-23-1", - "refsource": "APPLE", - "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" + "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.593629", + "refsource": "MISC", + "name": "http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.593629" }, { - "name": "http://www.samba.org/samba/history/samba-3.4.12.html", - "refsource": "CONFIRM", - "url": "http://www.samba.org/samba/history/samba-3.4.12.html" + "url": "http://support.apple.com/kb/HT4723", + "refsource": "MISC", + "name": "http://support.apple.com/kb/HT4723" }, { - "name": "SSRT100460", - "refsource": "HP", - "url": "http://marc.info/?l=bugtraq&m=130835366526620&w=2" + "url": "http://www.debian.org/security/2011/dsa-2175", + "refsource": "MISC", + "name": "http://www.debian.org/security/2011/dsa-2175" }, { - "name": "ADV-2011-0518", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0518" + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:038", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:038" }, { - "name": "FEDORA-2011-3118", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056241.html" + "url": "http://www.redhat.com/support/errata/RHSA-2011-0305.html", + "refsource": "MISC", + "name": "http://www.redhat.com/support/errata/RHSA-2011-0305.html" }, { - "name": "43517", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/43517" + "url": "http://www.redhat.com/support/errata/RHSA-2011-0306.html", + "refsource": "MISC", + "name": "http://www.redhat.com/support/errata/RHSA-2011-0306.html" }, { - "name": "43557", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/43557" + "url": "http://www.samba.org/samba/history/samba-3.3.15.html", + "refsource": "MISC", + "name": "http://www.samba.org/samba/history/samba-3.3.15.html" }, { - "name": "43556", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/43556" + "url": "http://www.samba.org/samba/history/samba-3.4.12.html", + "refsource": "MISC", + "name": "http://www.samba.org/samba/history/samba-3.4.12.html" }, { - "name": "43512", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/43512" + "url": "http://www.samba.org/samba/history/samba-3.5.7.html", + "refsource": "MISC", + "name": "http://www.samba.org/samba/history/samba-3.5.7.html" }, { - "name": "USN-1075-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1075-1" + "url": "http://www.securityfocus.com/bid/46597", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/46597" }, { - "name": "ADV-2011-0519", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0519" + "url": "http://www.securitytracker.com/id?1025132", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id?1025132" }, { - "name": "http://samba.org/samba/security/CVE-2011-0719.html", - "refsource": "CONFIRM", - "url": "http://samba.org/samba/security/CVE-2011-0719.html" + "url": "http://www.ubuntu.com/usn/USN-1075-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1075-1" }, { - "name": "ADV-2011-0520", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0520" + "url": "http://www.vupen.com/english/advisories/2011/0517", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0517" }, { - "name": "FEDORA-2011-3120", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056229.html" + "url": "http://www.vupen.com/english/advisories/2011/0518", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0518" }, { - "name": "43503", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/43503" + "url": "http://www.vupen.com/english/advisories/2011/0519", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0519" }, { - "name": "samba-fdset-dos(65724)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65724" + "url": "http://www.vupen.com/english/advisories/2011/0520", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0520" }, { - "name": "RHSA-2011:0305", - "refsource": "REDHAT", - "url": "http://www.redhat.com/support/errata/RHSA-2011-0305.html" + "url": "http://www.vupen.com/english/advisories/2011/0522", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0522" }, { - "name": "http://www.samba.org/samba/history/samba-3.5.7.html", - "refsource": "CONFIRM", - "url": "http://www.samba.org/samba/history/samba-3.5.7.html" + "url": "http://www.vupen.com/english/advisories/2011/0541", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0541" }, { - "name": "43482", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/43482" + "url": "http://www.vupen.com/english/advisories/2011/0702", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0702" }, { - "name": "43843", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/43843" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65724", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65724" }, { - "name": "MDVSA-2011:038", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:038" - }, - { - "name": "http://www.samba.org/samba/history/samba-3.3.15.html", - "refsource": "CONFIRM", - "url": "http://www.samba.org/samba/history/samba-3.3.15.html" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=678328", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=678328" } ] } diff --git a/2011/0xxx/CVE-2011-0999.json b/2011/0xxx/CVE-2011-0999.json index 16adc3b9c49..15b1ef1b86d 100644 --- a/2011/0xxx/CVE-2011-0999.json +++ b/2011/0xxx/CVE-2011-0999.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-0999", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[oss-security] 20110217 CVE request - kernel: thp: prevent hugepages during args/env copying into the user stack", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2011/02/17/3" + "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.38-rc5", + "refsource": "MISC", + "name": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.38-rc5" }, { - "name": "46442", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/46442" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a7d6e4ecdb7648478ddec76d30d87d03d6e22b31", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a7d6e4ecdb7648478ddec76d30d87d03d6e22b31" }, { - "name": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.38-rc5", - "refsource": "CONFIRM", - "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.38-rc5" + "url": "http://openwall.com/lists/oss-security/2011/02/17/3", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2011/02/17/3" }, { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a7d6e4ecdb7648478ddec76d30d87d03d6e22b31", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a7d6e4ecdb7648478ddec76d30d87d03d6e22b31" + "url": "http://openwall.com/lists/oss-security/2011/02/17/6", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2011/02/17/6" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=678209", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=678209" + "url": "http://www.securityfocus.com/bid/46442", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/46442" }, { - "name": "[oss-security] 20110217 Re: CVE request - kernel: thp: prevent hugepages during args/env copying into the user stack", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2011/02/17/6" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65535", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65535" }, { - "name": "kernel-hugepages-dos(65535)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65535" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=678209", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=678209" } ] } diff --git a/2011/1xxx/CVE-2011-1000.json b/2011/1xxx/CVE-2011-1000.json index 1b6e11b70a7..c7d48b75bde 100644 --- a/2011/1xxx/CVE-2011-1000.json +++ b/2011/1xxx/CVE-2011-1000.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-1000", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,117 +27,141 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "ADV-2011-0901", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0901" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054324.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054324.html" }, { - "name": "43316", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/43316" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054409.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054409.html" }, { - "name": "https://bugs.freedesktop.org/show_bug.cgi?id=34048", - "refsource": "CONFIRM", - "url": "https://bugs.freedesktop.org/show_bug.cgi?id=34048" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054575.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054575.html" }, { - "name": "44023", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/44023" + "url": "http://secunia.com/advisories/43316", + "refsource": "MISC", + "name": "http://secunia.com/advisories/43316" }, { - "name": "gabble-jingle-info-security-bypass(65523)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65523" + "url": "http://secunia.com/advisories/43369", + "refsource": "MISC", + "name": "http://secunia.com/advisories/43369" }, { - "name": "ADV-2011-0537", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0537" + "url": "http://secunia.com/advisories/43404", + "refsource": "MISC", + "name": "http://secunia.com/advisories/43404" }, { - "name": "[oss-security] 20110217 CVE id request: telepathy-gabble", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2011/02/17/4" + "url": "http://secunia.com/advisories/43485", + "refsource": "MISC", + "name": "http://secunia.com/advisories/43485" }, { - "name": "USN-1067-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1067-1" + "url": "http://secunia.com/advisories/43545", + "refsource": "MISC", + "name": "http://secunia.com/advisories/43545" }, { - "name": "FEDORA-2011-1668", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054324.html" + "url": "http://secunia.com/advisories/44023", + "refsource": "MISC", + "name": "http://secunia.com/advisories/44023" }, { - "name": "43369", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/43369" + "url": "http://www.debian.org/security/2011/dsa-2169", + "refsource": "MISC", + "name": "http://www.debian.org/security/2011/dsa-2169" }, { - "name": "FEDORA-2011-1284", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054575.html" + "url": "http://www.openwall.com/lists/oss-security/2011/02/17/4", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2011/02/17/4" }, { - "name": "43485", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/43485" + "url": "http://www.openwall.com/lists/oss-security/2011/02/17/7", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2011/02/17/7" }, { - "name": "openSUSE-SU-2011:0303", - "refsource": "SUSE", - "url": "https://hermes.opensuse.org/messages/7848248" + "url": "http://www.securityfocus.com/bid/46440", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/46440" }, { - "name": "FEDORA-2011-1903", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054409.html" + "url": "http://www.ubuntu.com/usn/USN-1067-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1067-1" }, { - "name": "ADV-2011-0572", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0572" + "url": "http://www.vupen.com/english/advisories/2011/0412", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0412" }, { - "name": "[oss-security] 20110217 Re: CVE id request: telepathy-gabble", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2011/02/17/7" + "url": "http://www.vupen.com/english/advisories/2011/0428", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0428" }, { - "name": "DSA-2169", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2011/dsa-2169" + "url": "http://www.vupen.com/english/advisories/2011/0537", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0537" }, { - "name": "ADV-2011-0428", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0428" + "url": "http://www.vupen.com/english/advisories/2011/0572", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0572" }, { - "name": "43545", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/43545" + "url": "http://www.vupen.com/english/advisories/2011/0901", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0901" }, { - "name": "46440", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/46440" + "url": "https://bugs.freedesktop.org/show_bug.cgi?id=34048", + "refsource": "MISC", + "name": "https://bugs.freedesktop.org/show_bug.cgi?id=34048" }, { - "name": "ADV-2011-0412", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0412" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65523", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65523" }, { - "name": "43404", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/43404" + "url": "https://hermes.opensuse.org/messages/7848248", + "refsource": "MISC", + "name": "https://hermes.opensuse.org/messages/7848248" } ] } diff --git a/2011/1xxx/CVE-2011-1010.json b/2011/1xxx/CVE-2011-1010.json index 9cce1c22686..e84164c50f4 100644 --- a/2011/1xxx/CVE-2011-1010.json +++ b/2011/1xxx/CVE-2011-1010.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-1010", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,82 +27,106 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console", - "refsource": "BUGTRAQ", - "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" - }, - { - "name": "46397", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/46397" - }, - { - "name": "8115", - "refsource": "SREASON", - "url": "http://securityreason.com/securityalert/8115" - }, - { - "name": "[oss-security] 20110222 CVE request: kernel: fs/partitions: validate map_count in mac partition tables", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2011/02/22/3" - }, - { - "name": "kernel-map-dos(65643)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65643" - }, - { - "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37.2", - "refsource": "CONFIRM", - "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37.2" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=679282", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=679282" - }, - { - "name": "46492", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/46492" - }, - { - "name": "[oss-security] 20110222 Re: CVE request: kernel: fs/partitions: validate map_count in mac partition tables", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2011/02/22/11" - }, - { - "name": "20110223 [PRE-SA-2011-01] Multiple Linux kernel vulnerabilities in partition handling code of LDM and MAC partition tables", - "refsource": "BUGTRAQ", - "url": "http://www.securityfocus.com/archive/1/516615/100/0/threaded" - }, - { - "name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", - "refsource": "CONFIRM", - "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" - }, - { - "name": "[oss-security] 20110222 Re: CVE request: kernel: fs/partitions: validate map_count in mac partition tables", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2011/02/22/15" - }, - { - "name": "1025126", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id?1025126" - }, - { - "name": "http://www.pre-cert.de/advisories/PRE-SA-2011-01.txt", + "url": "http://secunia.com/advisories/46397", "refsource": "MISC", - "url": "http://www.pre-cert.de/advisories/PRE-SA-2011-01.txt" + "name": "http://secunia.com/advisories/46397" }, { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=fa7ea87a057958a8b7926c1a60a3ca6d696328ed", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=fa7ea87a057958a8b7926c1a60a3ca6d696328ed" + "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded", + "refsource": "MISC", + "name": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", + "refsource": "MISC", + "name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" + }, + { + "url": "http://securityreason.com/securityalert/8115", + "refsource": "MISC", + "name": "http://securityreason.com/securityalert/8115" + }, + { + "url": "http://www.pre-cert.de/advisories/PRE-SA-2011-01.txt", + "refsource": "MISC", + "name": "http://www.pre-cert.de/advisories/PRE-SA-2011-01.txt" + }, + { + "url": "http://www.securityfocus.com/archive/1/516615/100/0/threaded", + "refsource": "MISC", + "name": "http://www.securityfocus.com/archive/1/516615/100/0/threaded" + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fa7ea87a057958a8b7926c1a60a3ca6d696328ed", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fa7ea87a057958a8b7926c1a60a3ca6d696328ed" + }, + { + "url": "http://openwall.com/lists/oss-security/2011/02/22/11", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2011/02/22/11" + }, + { + "url": "http://openwall.com/lists/oss-security/2011/02/22/15", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2011/02/22/15" + }, + { + "url": "http://openwall.com/lists/oss-security/2011/02/22/3", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2011/02/22/3" + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37.2", + "refsource": "MISC", + "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37.2" + }, + { + "url": "http://www.securityfocus.com/bid/46492", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/46492" + }, + { + "url": "http://www.securitytracker.com/id?1025126", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id?1025126" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65643", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65643" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=679282", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=679282" } ] } diff --git a/2011/1xxx/CVE-2011-1011.json b/2011/1xxx/CVE-2011-1011.json index c228b05229f..0ce7618cb2d 100644 --- a/2011/1xxx/CVE-2011-1011.json +++ b/2011/1xxx/CVE-2011-1011.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-1011", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,82 +27,106 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=633544", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=633544" + "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0585.html", + "refsource": "MISC", + "name": "http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0585.html" }, { - "name": "44034", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/44034" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056227.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056227.html" }, { - "name": "20110222 Developers should not rely on the stickiness of /tmp on Red Hat Linux", - "refsource": "FULLDISC", - "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0585.html" + "url": "http://openwall.com/lists/oss-security/2011/02/23/1", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2011/02/23/1" }, { - "name": "1025291", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id?1025291" + "url": "http://openwall.com/lists/oss-security/2011/02/23/2", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2011/02/23/2" }, { - "name": "http://pkgs.fedoraproject.org/gitweb/?p=policycoreutils.git;a=blob;f=policycoreutils-rhat.patch;h=d4db5bc06027de23d12a4b3f18fa6f9b1517df27;hb=HEAD#l2197", - "refsource": "CONFIRM", - "url": "http://pkgs.fedoraproject.org/gitweb/?p=policycoreutils.git;a=blob;f=policycoreutils-rhat.patch;h=d4db5bc06027de23d12a4b3f18fa6f9b1517df27;hb=HEAD#l2197" + "url": "http://pkgs.fedoraproject.org/gitweb/?p=policycoreutils.git%3Ba=blob%3Bf=policycoreutils-rhat.patch%3Bh=d4db5bc06027de23d12a4b3f18fa6f9b1517df27%3Bhb=HEAD#l2197", + "refsource": "MISC", + "name": "http://pkgs.fedoraproject.org/gitweb/?p=policycoreutils.git%3Ba=blob%3Bf=policycoreutils-rhat.patch%3Bh=d4db5bc06027de23d12a4b3f18fa6f9b1517df27%3Bhb=HEAD#l2197" }, { - "name": "policycoreutils-seunshare-symlink(65641)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65641" + "url": "http://secunia.com/advisories/43415", + "refsource": "MISC", + "name": "http://secunia.com/advisories/43415" }, { - "name": "43844", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/43844" + "url": "http://secunia.com/advisories/43844", + "refsource": "MISC", + "name": "http://secunia.com/advisories/43844" }, { - "name": "ADV-2011-0701", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0701" + "url": "http://secunia.com/advisories/44034", + "refsource": "MISC", + "name": "http://secunia.com/advisories/44034" }, { - "name": "FEDORA-2011-3043", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056227.html" + "url": "http://www.redhat.com/support/errata/RHSA-2011-0414.html", + "refsource": "MISC", + "name": "http://www.redhat.com/support/errata/RHSA-2011-0414.html" }, { - "name": "RHSA-2011:0414", - "refsource": "REDHAT", - "url": "http://www.redhat.com/support/errata/RHSA-2011-0414.html" + "url": "http://www.securityfocus.com/bid/46510", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/46510" }, { - "name": "ADV-2011-0864", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0864" + "url": "http://www.securitytracker.com/id?1025291", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id?1025291" }, { - "name": "46510", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/46510" + "url": "http://www.vupen.com/english/advisories/2011/0701", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0701" }, { - "name": "[oss-security] 20110222 CVE Request", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2011/02/23/1" + "url": "http://www.vupen.com/english/advisories/2011/0864", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0864" }, { - "name": "43415", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/43415" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65641", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65641" }, { - "name": "[oss-security] 20110223 Re: CVE Request", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2011/02/23/2" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=633544", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=633544" } ] } diff --git a/2011/1xxx/CVE-2011-1018.json b/2011/1xxx/CVE-2011-1018.json index 09dfebe61a5..9fd8bb8e584 100644 --- a/2011/1xxx/CVE-2011-1018.json +++ b/2011/1xxx/CVE-2011-1018.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2011-1018 logwatch: Privilege escalation due improper sanitization of special characters in log file names" + "value": "logwatch.pl in Logwatch 7.3.6 allows remote attackers to execute arbitrary commands via shell metacharacters in a log file name, as demonstrated via a crafted username to a Samba server." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", - "cweId": "CWE-78" + "value": "n/a" } ] } @@ -32,27 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 5", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:7.3-9.el5_6", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 6", - "version": { - "version_data": [ - { - "version_value": "0:7.3.6-49.el6", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -175,46 +163,11 @@ "refsource": "MISC", "name": "http://www.vupen.com/english/advisories/2011/0596" }, - { - "url": "https://access.redhat.com/errata/RHSA-2011:0324", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2011:0324" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2011-1018", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2011-1018" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680237", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=680237" } ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "MEDIUM", - "accessVector": "ADJACENT_NETWORK", - "authentication": "NONE", - "availabilityImpact": "COMPLETE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 7.9, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "COMPLETE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "COMPLETE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C", - "version": "2.0" - } - ] } } \ No newline at end of file diff --git a/2011/1xxx/CVE-2011-1019.json b/2011/1xxx/CVE-2011-1019.json index 2af58c789de..21f985f705c 100644 --- a/2011/1xxx/CVE-2011-1019.json +++ b/2011/1xxx/CVE-2011-1019.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-1019", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,32 +27,56 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://github.com/torvalds/linux/commit/8909c9ad8ff03611c9c96c9a92656213e4bb495b", - "refsource": "CONFIRM", - "url": "https://github.com/torvalds/linux/commit/8909c9ad8ff03611c9c96c9a92656213e4bb495b" + "url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38", + "refsource": "MISC", + "name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38" }, { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8909c9ad8ff03611c9c96c9a92656213e4bb495b", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8909c9ad8ff03611c9c96c9a92656213e4bb495b" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8909c9ad8ff03611c9c96c9a92656213e4bb495b", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8909c9ad8ff03611c9c96c9a92656213e4bb495b" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=680360", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680360" + "url": "http://www.openwall.com/lists/oss-security/2011/02/25/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2011/02/25/1" }, { - "name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38", - "refsource": "CONFIRM", - "url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38" + "url": "https://github.com/torvalds/linux/commit/8909c9ad8ff03611c9c96c9a92656213e4bb495b", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/8909c9ad8ff03611c9c96c9a92656213e4bb495b" }, { - "name": "[oss-security] 20110225 Re: CVE request: kernel: CAP_SYS_MODULE bypass via CAP_NET_ADMIN", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2011/02/25/1" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680360", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=680360" } ] } diff --git a/2011/1xxx/CVE-2011-1020.json b/2011/1xxx/CVE-2011-1020.json index 1962a37ebcc..57347f56b4e 100644 --- a/2011/1xxx/CVE-2011-1020.json +++ b/2011/1xxx/CVE-2011-1020.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-1020", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,82 +27,106 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "kernel-procpid-security-bypass(65693)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65693" - }, - { - "name": "8107", - "refsource": "SREASON", - "url": "http://securityreason.com/securityalert/8107" - }, - { - "name": "43496", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/43496" - }, - { - "name": "[oss-security] 20110224 CVE request: kernel: /proc/$pid/ leaks contents across setuid exec", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2011/02/24/18" - }, - { - "name": "[linux-kernel] 20110208 Re: [SECURITY] /proc/$pid/ leaks contents across setuid exec", - "refsource": "MLIST", - "url": "https://lkml.org/lkml/2011/2/7/466" - }, - { - "name": "[oss-security] 20110225 Re: CVE request: kernel: /proc/$pid/ leaks contents across setuid exec", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2011/02/25/2" - }, - { - "name": "[linux-kernel] 20110207 Re: [SECURITY] /proc/$pid/ leaks contents across setuid exec", - "refsource": "MLIST", - "url": "https://lkml.org/lkml/2011/2/7/414" - }, - { - "name": "[linux-kernel] 20110209 Re: [SECURITY] /proc/$pid/ leaks contents across setuid exec", - "refsource": "MLIST", - "url": "https://lkml.org/lkml/2011/2/10/21" - }, - { - "name": "46567", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/46567" - }, - { - "name": "[linux-kernel] 20110207 [SECURITY] /proc/$pid/ leaks contents across setuid exec", - "refsource": "MLIST", - "url": "https://lkml.org/lkml/2011/2/7/368" - }, - { - "name": "[linux-kernel] 20110209 Re: [SECURITY] /proc/$pid/ leaks contents across setuid exec", - "refsource": "MLIST", - "url": "https://lkml.org/lkml/2011/2/9/417" - }, - { - "name": "[linux-kernel] 20110207 Re: [SECURITY] /proc/$pid/ leaks contents across setuid exec", - "refsource": "MLIST", - "url": "https://lkml.org/lkml/2011/2/7/474" - }, - { - "name": "[linux-kernel] 20110208 Re: [SECURITY] /proc/$pid/ leaks contents across setuid exec", - "refsource": "MLIST", - "url": "https://lkml.org/lkml/2011/2/7/404" - }, - { - "name": "20110122 Proc filesystem and SUID-Binaries", - "refsource": "FULLDISC", - "url": "http://seclists.org/fulldisclosure/2011/Jan/421" - }, - { - "name": "http://www.halfdog.net/Security/2011/SuidBinariesAndProcInterface/", + "url": "http://openwall.com/lists/oss-security/2011/02/24/18", "refsource": "MISC", - "url": "http://www.halfdog.net/Security/2011/SuidBinariesAndProcInterface/" + "name": "http://openwall.com/lists/oss-security/2011/02/24/18" + }, + { + "url": "http://openwall.com/lists/oss-security/2011/02/25/2", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2011/02/25/2" + }, + { + "url": "http://seclists.org/fulldisclosure/2011/Jan/421", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2011/Jan/421" + }, + { + "url": "http://secunia.com/advisories/43496", + "refsource": "MISC", + "name": "http://secunia.com/advisories/43496" + }, + { + "url": "http://securityreason.com/securityalert/8107", + "refsource": "MISC", + "name": "http://securityreason.com/securityalert/8107" + }, + { + "url": "http://www.halfdog.net/Security/2011/SuidBinariesAndProcInterface/", + "refsource": "MISC", + "name": "http://www.halfdog.net/Security/2011/SuidBinariesAndProcInterface/" + }, + { + "url": "http://www.securityfocus.com/bid/46567", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/46567" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65693", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65693" + }, + { + "url": "https://lkml.org/lkml/2011/2/10/21", + "refsource": "MISC", + "name": "https://lkml.org/lkml/2011/2/10/21" + }, + { + "url": "https://lkml.org/lkml/2011/2/7/368", + "refsource": "MISC", + "name": "https://lkml.org/lkml/2011/2/7/368" + }, + { + "url": "https://lkml.org/lkml/2011/2/7/404", + "refsource": "MISC", + "name": "https://lkml.org/lkml/2011/2/7/404" + }, + { + "url": "https://lkml.org/lkml/2011/2/7/414", + "refsource": "MISC", + "name": "https://lkml.org/lkml/2011/2/7/414" + }, + { + "url": "https://lkml.org/lkml/2011/2/7/466", + "refsource": "MISC", + "name": "https://lkml.org/lkml/2011/2/7/466" + }, + { + "url": "https://lkml.org/lkml/2011/2/7/474", + "refsource": "MISC", + "name": "https://lkml.org/lkml/2011/2/7/474" + }, + { + "url": "https://lkml.org/lkml/2011/2/9/417", + "refsource": "MISC", + "name": "https://lkml.org/lkml/2011/2/9/417" } ] } diff --git a/2011/1xxx/CVE-2011-1021.json b/2011/1xxx/CVE-2011-1021.json index b55ed7e4206..f9e58f336db 100644 --- a/2011/1xxx/CVE-2011-1021.json +++ b/2011/1xxx/CVE-2011-1021.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-1021", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,32 +27,56 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[oss-security] 20110225 Re: CVE request: kernel: /sys/kernel/debug/acpi/custom_method can bypass module restrictions", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2011/02/25/5" + "url": "http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0", + "refsource": "MISC", + "name": "http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0" }, { - "name": "https://github.com/torvalds/linux/commit/526b4af47f44148c9d665e57723ed9f86634c6e3", - "refsource": "CONFIRM", - "url": "https://github.com/torvalds/linux/commit/526b4af47f44148c9d665e57723ed9f86634c6e3" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=526b4af47f44148c9d665e57723ed9f86634c6e3", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=526b4af47f44148c9d665e57723ed9f86634c6e3" }, { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=526b4af47f44148c9d665e57723ed9f86634c6e3", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=526b4af47f44148c9d665e57723ed9f86634c6e3" + "url": "http://www.openwall.com/lists/oss-security/2011/02/25/5", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2011/02/25/5" }, { - "name": "http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0", - "refsource": "CONFIRM", - "url": "http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0" + "url": "https://github.com/torvalds/linux/commit/526b4af47f44148c9d665e57723ed9f86634c6e3", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/526b4af47f44148c9d665e57723ed9f86634c6e3" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=680841", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680841" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680841", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=680841" } ] } diff --git a/2011/1xxx/CVE-2011-1071.json b/2011/1xxx/CVE-2011-1071.json index 428cc920e9d..bafd10eb611 100644 --- a/2011/1xxx/CVE-2011-1071.json +++ b/2011/1xxx/CVE-2011-1071.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-1071", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,132 +27,156 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "46563", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/46563" - }, - { - "name": "8175", - "refsource": "SREASON", - "url": "http://securityreason.com/securityalert/8175" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=681054", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681054" - }, - { - "name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console", - "refsource": "BUGTRAQ", - "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" - }, - { - "name": "46397", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/46397" - }, - { - "name": "RHSA-2011:0412", - "refsource": "REDHAT", - "url": "http://www.redhat.com/support/errata/RHSA-2011-0412.html" - }, - { - "name": "ADV-2011-0863", - "refsource": "VUPEN", - "url": "http://www.vupen.com/english/advisories/2011/0863" - }, - { - "name": "http://bugs.debian.org/615120", - "refsource": "CONFIRM", - "url": "http://bugs.debian.org/615120" - }, - { - "name": "43989", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/43989" - }, - { - "name": "1025290", - "refsource": "SECTRACK", - "url": "http://securitytracker.com/id?1025290" - }, - { - "name": "http://sourceware.org/bugzilla/show_bug.cgi?id=11883", - "refsource": "CONFIRM", - "url": "http://sourceware.org/bugzilla/show_bug.cgi?id=11883" - }, - { - "name": "43492", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/43492" - }, - { - "name": "[oss-security] 20110228 cve request: eglibc memory corruption", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2011/02/26/3" - }, - { - "name": "oval:org.mitre.oval:def:12853", - "refsource": "OVAL", - "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12853" - }, - { - "name": "[oss-security] 20110228 Re: cve request: eglibc memory corruption", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2011/02/28/11" - }, - { - "name": "20110224 glibc and alloca()", - "refsource": "FULLDISC", - "url": "http://seclists.org/fulldisclosure/2011/Feb/635" - }, - { - "name": "20110226 Re: glibc and alloca()", - "refsource": "FULLDISC", - "url": "http://seclists.org/fulldisclosure/2011/Feb/644" - }, - { - "name": "MDVSA-2011:178", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:178" - }, - { - "name": "43830", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/43830" - }, - { - "name": "http://sourceware.org/git/?p=glibc.git;a=commit;h=f15ce4d8dc139523fe0c273580b604b2453acba6", - "refsource": "CONFIRM", - "url": "http://sourceware.org/git/?p=glibc.git;a=commit;h=f15ce4d8dc139523fe0c273580b604b2453acba6" - }, - { - "name": "RHSA-2011:0413", - "refsource": "REDHAT", - "url": "http://www.redhat.com/support/errata/RHSA-2011-0413.html" - }, - { - "name": "http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html", + "url": "http://secunia.com/advisories/46397", "refsource": "MISC", - "url": "http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html" + "name": "http://secunia.com/advisories/46397" }, { - "name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", - "refsource": "CONFIRM", - "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" + "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded", + "refsource": "MISC", + "name": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { - "name": "[oss-security] 20110228 Re: cve request: eglibc memory corruption", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2011/02/28/15" + "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", + "refsource": "MISC", + "name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { - "name": "http://code.google.com/p/chromium/issues/detail?id=48733", - "refsource": "CONFIRM", - "url": "http://code.google.com/p/chromium/issues/detail?id=48733" + "url": "http://secunia.com/advisories/43830", + "refsource": "MISC", + "name": "http://secunia.com/advisories/43830" + }, + { + "url": "http://secunia.com/advisories/43989", + "refsource": "MISC", + "name": "http://secunia.com/advisories/43989" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:178", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:178" + }, + { + "url": "http://www.redhat.com/support/errata/RHSA-2011-0412.html", + "refsource": "MISC", + "name": "http://www.redhat.com/support/errata/RHSA-2011-0412.html" + }, + { + "url": "http://www.redhat.com/support/errata/RHSA-2011-0413.html", + "refsource": "MISC", + "name": "http://www.redhat.com/support/errata/RHSA-2011-0413.html" + }, + { + "url": "http://www.vupen.com/english/advisories/2011/0863", + "refsource": "MISC", + "name": "http://www.vupen.com/english/advisories/2011/0863" + }, + { + "url": "http://bugs.debian.org/615120", + "refsource": "MISC", + "name": "http://bugs.debian.org/615120" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=48733", + "refsource": "MISC", + "name": "http://code.google.com/p/chromium/issues/detail?id=48733" + }, + { + "url": "http://openwall.com/lists/oss-security/2011/02/26/3", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2011/02/26/3" + }, + { + "url": "http://openwall.com/lists/oss-security/2011/02/28/11", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2011/02/28/11" + }, + { + "url": "http://openwall.com/lists/oss-security/2011/02/28/15", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2011/02/28/15" + }, + { + "url": "http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html", + "refsource": "MISC", + "name": "http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html" + }, + { + "url": "http://seclists.org/fulldisclosure/2011/Feb/635", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2011/Feb/635" + }, + { + "url": "http://seclists.org/fulldisclosure/2011/Feb/644", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2011/Feb/644" + }, + { + "url": "http://secunia.com/advisories/43492", + "refsource": "MISC", + "name": "http://secunia.com/advisories/43492" + }, + { + "url": "http://securityreason.com/securityalert/8175", + "refsource": "MISC", + "name": "http://securityreason.com/securityalert/8175" + }, + { + "url": "http://securitytracker.com/id?1025290", + "refsource": "MISC", + "name": "http://securitytracker.com/id?1025290" + }, + { + "url": "http://sourceware.org/bugzilla/show_bug.cgi?id=11883", + "refsource": "MISC", + "name": "http://sourceware.org/bugzilla/show_bug.cgi?id=11883" + }, + { + "url": "http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=f15ce4d8dc139523fe0c273580b604b2453acba6", + "refsource": "MISC", + "name": "http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=f15ce4d8dc139523fe0c273580b604b2453acba6" + }, + { + "url": "http://www.securityfocus.com/bid/46563", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/46563" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12853", + "refsource": "MISC", + "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12853" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681054", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=681054" } ] } diff --git a/2012/0xxx/CVE-2012-0810.json b/2012/0xxx/CVE-2012-0810.json index 6888d89ae82..d4413808fe4 100644 --- a/2012/0xxx/CVE-2012-0810.json +++ b/2012/0xxx/CVE-2012-0810.json @@ -1,12 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-0810", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -39,6 +39,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "before 3.3" } ] @@ -53,19 +54,19 @@ "references": { "reference_data": [ { + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git/commit/?id=bcf6b1d78c0bde228929c388978ed3af9a623463", "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=794557", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=794557" + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git/commit/?id=bcf6b1d78c0bde228929c388978ed3af9a623463" }, { - "refsource": "CONFIRM", - "name": "https://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git/commit/?id=e5d4e1c3ccee18c68f23d62ba77bda26e893d4f0", - "url": "https://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git/commit/?id=e5d4e1c3ccee18c68f23d62ba77bda26e893d4f0" + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git/commit/?id=e5d4e1c3ccee18c68f23d62ba77bda26e893d4f0", + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git/commit/?id=e5d4e1c3ccee18c68f23d62ba77bda26e893d4f0" }, { - "refsource": "CONFIRM", - "name": "https://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git/commit/?id=bcf6b1d78c0bde228929c388978ed3af9a623463", - "url": "https://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git/commit/?id=bcf6b1d78c0bde228929c388978ed3af9a623463" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=794557", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=794557" } ] } diff --git a/2012/0xxx/CVE-2012-0814.json b/2012/0xxx/CVE-2012-0814.json index 085b95b554e..d4a78192138 100644 --- a/2012/0xxx/CVE-2012-0814.json +++ b/2012/0xxx/CVE-2012-0814.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-0814", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory." + "value": "The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory." } ] }, @@ -50,62 +27,86 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "51702", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/51702" + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673", + "refsource": "MISC", + "name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673" }, { - "name": "[oss-security] 20120127 Re: CVE Request: Debian (others?) openssh-server: Forced Command handling leaks private information to ssh clients", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2012/01/27/4" + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657445", + "refsource": "MISC", + "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657445" }, { - "name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673", - "refsource": "CONFIRM", - "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673" + "url": "http://openwall.com/lists/oss-security/2012/01/26/15", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2012/01/26/15" }, { - "name": "[oss-security] 20120126 CVE Request: Debian (others?) openssh-server: Forced Command handling leaks private information to ssh clients", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2012/01/26/15" + "url": "http://openwall.com/lists/oss-security/2012/01/26/16", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2012/01/26/16" }, { - "name": "78706", - "refsource": "OSVDB", - "url": "http://osvdb.org/78706" + "url": "http://openwall.com/lists/oss-security/2012/01/27/1", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2012/01/27/1" }, { - "name": "opensshserver-commands-info-disc(72756)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72756" + "url": "http://openwall.com/lists/oss-security/2012/01/27/4", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2012/01/27/4" }, { - "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657445", - "refsource": "CONFIRM", - "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657445" + "url": "http://osvdb.org/78706", + "refsource": "MISC", + "name": "http://osvdb.org/78706" }, { - "name": "[oss-security] 20120126 Re: CVE Request: Debian (others?) openssh-server: Forced Command handling leaks private information to ssh clients", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2012/01/26/16" + "url": "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth-options.c", + "refsource": "MISC", + "name": "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth-options.c" }, { - "name": "[oss-security] 20120126 Re: CVE Request: Debian (others?) openssh-server: Forced Command handling leaks private information to ssh clients", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2012/01/27/1" + "url": "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth-options.c.diff?r1=1.53%3Br2=1.54", + "refsource": "MISC", + "name": "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth-options.c.diff?r1=1.53%3Br2=1.54" }, { - "name": "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth-options.c", - "refsource": "CONFIRM", - "url": "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth-options.c" + "url": "http://www.securityfocus.com/bid/51702", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/51702" }, { - "name": "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth-options.c.diff?r1=1.53;r2=1.54", - "refsource": "CONFIRM", - "url": "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth-options.c.diff?r1=1.53;r2=1.54" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72756", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72756" } ] } diff --git a/2012/0xxx/CVE-2012-0817.json b/2012/0xxx/CVE-2012-0817.json index 6ff6063ab43..0e6cf67a2e8 100644 --- a/2012/0xxx/CVE-2012-0817.json +++ b/2012/0xxx/CVE-2012-0817.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-0817", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "47763", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/47763" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-February/072930.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-February/072930.html" }, { - "name": "SUSE-SU-2012:0515", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00014.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html" }, { - "name": "SUSE-SU-2012:0502", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00014.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00014.html" }, { - "name": "http://www.samba.org/samba/history/samba-3.6.3.html", - "refsource": "CONFIRM", - "url": "http://www.samba.org/samba/history/samba-3.6.3.html" + "url": "http://secunia.com/advisories/47763", + "refsource": "MISC", + "name": "http://secunia.com/advisories/47763" }, { - "name": "http://www.samba.org/samba/security/CVE-2012-0817", - "refsource": "CONFIRM", - "url": "http://www.samba.org/samba/security/CVE-2012-0817" + "url": "http://secunia.com/advisories/48879", + "refsource": "MISC", + "name": "http://secunia.com/advisories/48879" }, { - "name": "FEDORA-2012-1098", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-February/072930.html" + "url": "http://www.samba.org/samba/history/samba-3.6.3.html", + "refsource": "MISC", + "name": "http://www.samba.org/samba/history/samba-3.6.3.html" }, { - "name": "48879", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/48879" + "url": "http://www.samba.org/samba/security/CVE-2012-0817", + "refsource": "MISC", + "name": "http://www.samba.org/samba/security/CVE-2012-0817" } ] } diff --git a/2012/0xxx/CVE-2012-0818.json b/2012/0xxx/CVE-2012-0818.json index 9f770628736..3ef7627d593 100644 --- a/2012/0xxx/CVE-2012-0818.json +++ b/2012/0xxx/CVE-2012-0818.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2011-5245 CVE-2012-0818 RESTEasy: XML eXternal Entity (XXE) flaw" + "value": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Restriction of XML External Entity Reference", - "cweId": "CWE-611" + "value": "n/a" } ] } @@ -32,114 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "JBEWP 5 for RHEL 5", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:1.2.1-10.CP02_patch01.1.ep5.el5", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "JBEWP 5 for RHEL 6", - "version": { - "version_data": [ - { - "version_value": "0:1.2.1-10.CP02_patch01.1.ep5.el6", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 4", - "version": { - "version_data": [ - { - "version_value": "0:1.2.1-10.CP02_patch01.1.ep5.el4", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 5", - "version": { - "version_data": [ - { - "version_value": "0:1.2.1-10.CP02_patch01.1.ep5.el5", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 6", - "version": { - "version_data": [ - { - "version_value": "0:1.2.1-10.CP02_patch01.1.ep5.el6", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Storage Console 2.1", - "version": { - "version_data": [ - { - "version_value": "0:2.1.0-16", - "version_affected": "!" - }, - { - "version_value": "0:1.1.0-1.el6ev", - "version_affected": "!" - }, - { - "version_value": "0:1.5.2-1.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.1.1-2.el6ev", - "version_affected": "!" - }, - { - "version_value": "0:0.8-5.el6", - "version_affected": "!" - }, - { - "version_value": "0:3.3-7.el6ev", - "version_affected": "!" - }, - { - "version_value": "0:2.1.0-0.el6rhs", - "version_affected": "!" - }, - { - "version_value": "0:2.1.0.0-0.bb3a.el6rhs", - "version_affected": "!" - }, - { - "version_value": "0:2.1-0.1.el6rhs", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "RHEV Manager version 3.0", - "version": { - "version_data": [ - { - "version_value": "0:3.0.3_0001-3", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -162,11 +63,6 @@ "refsource": "MISC", "name": "http://secunia.com/advisories/50084" }, - { - "url": "https://access.redhat.com/errata/RHSA-2012:1125", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2012:1125" - }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-0371.html", "refsource": "MISC", @@ -187,16 +83,6 @@ "refsource": "MISC", "name": "http://secunia.com/advisories/57719" }, - { - "url": "https://access.redhat.com/errata/RHSA-2014:0371", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2014:0371" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2014:0372", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2014:0372" - }, { "url": "http://rhn.redhat.com/errata/RHSA-2012-0441.html", "refsource": "MISC", @@ -217,16 +103,6 @@ "refsource": "MISC", "name": "http://secunia.com/advisories/48954" }, - { - "url": "https://access.redhat.com/errata/RHSA-2012:0441", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2012:0441" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2012:0519", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2012:0519" - }, { "url": "http://rhn.redhat.com/errata/RHSA-2012-1056.html", "refsource": "MISC", @@ -272,46 +148,6 @@ "refsource": "MISC", "name": "http://www.securityfocus.com/bid/51766" }, - { - "url": "https://access.redhat.com/errata/RHSA-2012:0421", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2012:0421" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2012:1056", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2012:1056" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2012:1057", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2012:1057" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2012:1058", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2012:1058" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2012:1059", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2012:1059" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:1263", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:1263" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2012-0818", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2012-0818" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" - }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72808", "refsource": "MISC", @@ -321,31 +157,11 @@ "url": "https://issues.jboss.org/browse/RESTEASY-637", "refsource": "MISC", "name": "https://issues.jboss.org/browse/RESTEASY-637" - } - ] - }, - "impact": { - "cvss": [ + }, { - "accessComplexity": "LOW", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "NONE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 5, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", - "version": "2.0" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" } ] } diff --git a/2012/0xxx/CVE-2012-0825.json b/2012/0xxx/CVE-2012-0825.json index 2920e7c6069..f2725a93711 100644 --- a/2012/0xxx/CVE-2012-0825.json +++ b/2012/0xxx/CVE-2012-0825.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-0825", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,22 +27,46 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://drupal.org/node/1425084", - "refsource": "CONFIRM", - "url": "https://drupal.org/node/1425084" - }, - { - "name": "http://openid.net/2011/05/05/attribute-exchange-security-alert/", + "url": "http://openid.net/2011/05/05/attribute-exchange-security-alert/", "refsource": "MISC", - "url": "http://openid.net/2011/05/05/attribute-exchange-security-alert/" + "name": "http://openid.net/2011/05/05/attribute-exchange-security-alert/" }, { - "name": "DSA-2776", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2013/dsa-2776" + "url": "http://www.debian.org/security/2013/dsa-2776", + "refsource": "MISC", + "name": "http://www.debian.org/security/2013/dsa-2776" + }, + { + "url": "https://drupal.org/node/1425084", + "refsource": "MISC", + "name": "https://drupal.org/node/1425084" } ] } diff --git a/2012/0xxx/CVE-2012-0826.json b/2012/0xxx/CVE-2012-0826.json index 9faef19c4b1..bc1ca0179a8 100644 --- a/2012/0xxx/CVE-2012-0826.json +++ b/2012/0xxx/CVE-2012-0826.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-0826", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,17 +27,41 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://drupal.org/node/1425084", - "refsource": "CONFIRM", - "url": "https://drupal.org/node/1425084" + "url": "http://www.debian.org/security/2013/dsa-2776", + "refsource": "MISC", + "name": "http://www.debian.org/security/2013/dsa-2776" }, { - "name": "DSA-2776", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2013/dsa-2776" + "url": "https://drupal.org/node/1425084", + "refsource": "MISC", + "name": "https://drupal.org/node/1425084" } ] } diff --git a/2012/0xxx/CVE-2012-0827.json b/2012/0xxx/CVE-2012-0827.json index beaeb0855fe..e52165fb744 100644 --- a/2012/0xxx/CVE-2012-0827.json +++ b/2012/0xxx/CVE-2012-0827.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-0827", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,12 +27,36 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://drupal.org/node/1425084", - "refsource": "CONFIRM", - "url": "https://drupal.org/node/1425084" + "url": "https://drupal.org/node/1425084", + "refsource": "MISC", + "name": "https://drupal.org/node/1425084" } ] } diff --git a/2012/0xxx/CVE-2012-0828.json b/2012/0xxx/CVE-2012-0828.json index 9557002f0c7..4578fd8d591 100644 --- a/2012/0xxx/CVE-2012-0828.json +++ b/2012/0xxx/CVE-2012-0828.json @@ -1,45 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-0828", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "xchat", - "product": { - "product_data": [ - { - "product_name": "Xchat-WDK", - "version": { - "version_data": [ - { - "version_value": "before 1499-4 (2012-01-18)" - } - ] - } - }, - { - "product_name": "xchat", - "version": { - "version_data": [ - { - "version_value": "2.8.6 on Maemo architecture" - } - ] - } - } - ] - } - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -60,17 +27,47 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "xchat", + "product": { + "product_data": [ + { + "product_name": "Xchat-WDK", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "before 1499-4 (2012-01-18)" + } + ] + } + }, + { + "product_name": "xchat", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "2.8.6 on Maemo architecture" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://security-tracker.debian.org/tracker/CVE-2012-0828", + "url": "http://www.openwall.com/lists/oss-security/2012/02/01/9", "refsource": "MISC", - "name": "https://security-tracker.debian.org/tracker/CVE-2012-0828" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0828", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0828" + "name": "http://www.openwall.com/lists/oss-security/2012/02/01/9" }, { "url": "https://access.redhat.com/security/cve/cve-2012-0828", @@ -78,9 +75,14 @@ "name": "https://access.redhat.com/security/cve/cve-2012-0828" }, { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0828", "refsource": "MISC", - "name": "http://www.openwall.com/lists/oss-security/2012/02/01/9", - "url": "http://www.openwall.com/lists/oss-security/2012/02/01/9" + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0828" + }, + { + "url": "https://security-tracker.debian.org/tracker/CVE-2012-0828", + "refsource": "MISC", + "name": "https://security-tracker.debian.org/tracker/CVE-2012-0828" } ] } diff --git a/2012/0xxx/CVE-2012-0830.json b/2012/0xxx/CVE-2012-0830.json index da1d0304d35..e3e8b126422 100644 --- a/2012/0xxx/CVE-2012-0830.json +++ b/2012/0xxx/CVE-2012-0830.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2012-0830 php: remote code exec flaw introduced in the CVE-2011-4885 hashdos fix" + "value": "The php_register_variable_ex function in php_variables.c in PHP 5.3.9 allows remote attackers to execute arbitrary code via a request containing a large number of variables, related to improper handling of array variables. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4885." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Restriction of Operations within the Bounds of a Memory Buffer", - "cweId": "CWE-119" + "value": "n/a" } ] } @@ -32,42 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 4", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:4.3.9-3.36", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 5", - "version": { - "version_data": [ - { - "version_value": "0:5.3.3-1.el5_7.6", - "version_affected": "!" - }, - { - "version_value": "0:5.1.6-27.el5_7.5", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 6", - "version": { - "version_data": [ - { - "version_value": "0:5.3.3-3.el6_2.6", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -185,26 +158,6 @@ "refsource": "MISC", "name": "http://www.securityfocus.com/bid/51830" }, - { - "url": "https://access.redhat.com/errata/RHSA-2012:0092", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2012:0092" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2012:0093", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2012:0093" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2012-0830", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2012-0830" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=786686", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=786686" - }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72911", "refsource": "MISC", @@ -216,30 +169,5 @@ "name": "https://gist.github.com/1725489" } ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "LOW", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 7.5, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", - "version": "2.0" - } - ] } } \ No newline at end of file diff --git a/2012/0xxx/CVE-2012-0834.json b/2012/0xxx/CVE-2012-0834.json index 233e88682ed..35b86f87611 100644 --- a/2012/0xxx/CVE-2012-0834.json +++ b/2012/0xxx/CVE-2012-0834.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-0834", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,37 +27,61 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://phpldapadmin.git.sourceforge.net/git/gitweb.cgi?p=phpldapadmin/phpldapadmin;a=commit;h=7dc8d57d6952fe681cb9e8818df7f103220457bd", - "refsource": "CONFIRM", - "url": "http://phpldapadmin.git.sourceforge.net/git/gitweb.cgi?p=phpldapadmin/phpldapadmin;a=commit;h=7dc8d57d6952fe681cb9e8818df7f103220457bd" + "url": "http://openwall.com/lists/oss-security/2012/02/02/9", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2012/02/02/9" }, { - "name": "47852", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/47852" + "url": "http://openwall.com/lists/oss-security/2012/02/03/3", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2012/02/03/3" }, { - "name": "https://sourceforge.net/tracker/index.php?func=detail&aid=3477910&group_id=61828&atid=498546", - "refsource": "CONFIRM", - "url": "https://sourceforge.net/tracker/index.php?func=detail&aid=3477910&group_id=61828&atid=498546" + "url": "http://phpldapadmin.git.sourceforge.net/git/gitweb.cgi?p=phpldapadmin/phpldapadmin%3Ba=commit%3Bh=7dc8d57d6952fe681cb9e8818df7f103220457bd", + "refsource": "MISC", + "name": "http://phpldapadmin.git.sourceforge.net/git/gitweb.cgi?p=phpldapadmin/phpldapadmin%3Ba=commit%3Bh=7dc8d57d6952fe681cb9e8818df7f103220457bd" }, { - "name": "[oss-security] 20120203 Re: CVE request: phpldapadmin \"base\" Cross-Site Scripting Vulnerability", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2012/02/03/3" + "url": "http://secunia.com/advisories/47852", + "refsource": "MISC", + "name": "http://secunia.com/advisories/47852" }, { - "name": "[oss-security] 20120202 CVE request: phpldapadmin \"base\" Cross-Site Scripting Vulnerability", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2012/02/02/9" + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:020", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:020" }, { - "name": "MDVSA-2012:020", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:020" + "url": "https://sourceforge.net/tracker/index.php?func=detail&aid=3477910&group_id=61828&atid=498546", + "refsource": "MISC", + "name": "https://sourceforge.net/tracker/index.php?func=detail&aid=3477910&group_id=61828&atid=498546" } ] } diff --git a/2012/0xxx/CVE-2012-0838.json b/2012/0xxx/CVE-2012-0838.json index 56451576a95..c7c7ec9959b 100644 --- a/2012/0xxx/CVE-2012-0838.json +++ b/2012/0xxx/CVE-2012-0838.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-0838", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "JVNDB-2012-000012", - "refsource": "JVNDB", - "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000012" + "url": "http://jvn.jp/en/jp/JVN79099262/index.html", + "refsource": "MISC", + "name": "http://jvn.jp/en/jp/JVN79099262/index.html" }, { - "name": "http://struts.apache.org/2.3.1.2/docs/s2-007.html", - "refsource": "CONFIRM", - "url": "http://struts.apache.org/2.3.1.2/docs/s2-007.html" + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000012", + "refsource": "MISC", + "name": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000012" }, { - "name": "https://issues.apache.org/jira/browse/WW-3668", - "refsource": "CONFIRM", - "url": "https://issues.apache.org/jira/browse/WW-3668" + "url": "http://struts.apache.org/2.3.1.2/docs/s2-007.html", + "refsource": "MISC", + "name": "http://struts.apache.org/2.3.1.2/docs/s2-007.html" }, { - "name": "JVN#79099262", - "refsource": "JVN", - "url": "http://jvn.jp/en/jp/JVN79099262/index.html" + "url": "https://issues.apache.org/jira/browse/WW-3668", + "refsource": "MISC", + "name": "https://issues.apache.org/jira/browse/WW-3668" } ] } diff --git a/2012/0xxx/CVE-2012-0846.json b/2012/0xxx/CVE-2012-0846.json index 1505317a45f..d0f5fe533da 100644 --- a/2012/0xxx/CVE-2012-0846.json +++ b/2012/0xxx/CVE-2012-0846.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-0846", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,52 +27,76 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[oss-security] 20120211 Re: CVE-request: Webcalendar 1.2.4 location XSS", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/02/12/1" + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0129.html", + "refsource": "MISC", + "name": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0129.html" }, { - "name": "webcalendar-location-xss(72563)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72563" + "url": "http://sourceforge.net/tracker/?func=detail&aid=3472745&group_id=3870&atid=103870", + "refsource": "MISC", + "name": "http://sourceforge.net/tracker/?func=detail&aid=3472745&group_id=3870&atid=103870" }, { - "name": "[oss-security] 20120213 Re: CVE-request: Webcalendar 1.2.4 location XSS", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/02/13/6" + "url": "http://sourceforge.net/tracker/?func=detail&aid=3488543&group_id=3870&atid=303870", + "refsource": "MISC", + "name": "http://sourceforge.net/tracker/?func=detail&aid=3488543&group_id=3870&atid=303870" }, { - "name": "[oss-security] 20120211 CVE-request: Webcalendar 1.2.4 location XSS", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/02/11/2" + "url": "http://www.openwall.com/lists/oss-security/2012/02/11/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/02/11/2" }, { - "name": "[oss-security] 20120212 Re: CVE-request: Webcalendar 1.2.4 location XSS", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/02/12/3" + "url": "http://www.openwall.com/lists/oss-security/2012/02/12/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/02/12/1" }, { - "name": "20120119 Webcalendar 1.2.4 'location' XSS", - "refsource": "BUGTRAQ", - "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0129.html" + "url": "http://www.openwall.com/lists/oss-security/2012/02/12/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/02/12/3" }, { - "name": "http://sourceforge.net/tracker/?func=detail&aid=3488543&group_id=3870&atid=303870", - "refsource": "CONFIRM", - "url": "http://sourceforge.net/tracker/?func=detail&aid=3488543&group_id=3870&atid=303870" + "url": "http://www.openwall.com/lists/oss-security/2012/02/13/6", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/02/13/6" }, { - "name": "51600", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/51600" + "url": "http://www.securityfocus.com/bid/51600", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/51600" }, { - "name": "http://sourceforge.net/tracker/?func=detail&aid=3472745&group_id=3870&atid=103870", - "refsource": "CONFIRM", - "url": "http://sourceforge.net/tracker/?func=detail&aid=3472745&group_id=3870&atid=103870" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72563", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72563" } ] } diff --git a/2012/0xxx/CVE-2012-0860.json b/2012/0xxx/CVE-2012-0860.json index f2ea5b7da4f..e87cde25879 100644 --- a/2012/0xxx/CVE-2012-0860.json +++ b/2012/0xxx/CVE-2012-0860.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2012-0860 rhev: vds_installer insecure /tmp use" + "value": "Multiple untrusted search path vulnerabilities in Red Hat Enterprise Virtualization Manager (RHEV-M) before 3.1, when adding a host, allow local users to gain privileges via a Trojan horse (1) deployUtil.py or (2) vds_bootstrap.py Python module in /tmp/." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Insecure Temporary File", - "cweId": "CWE-377" + "value": "n/a" } ] } @@ -32,27 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "RHEV 3.X Hypervisor and Agents for RHEL-6", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:4.9.6-44.0.el6_3", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "RHEV Manager version 3.0", - "version": { - "version_data": [ - { - "version_value": "0:3.1.0-32", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -80,60 +68,20 @@ "refsource": "MISC", "name": "http://www.securitytracker.com/id?1027838" }, - { - "url": "https://access.redhat.com/errata/RHSA-2012:1506", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2012:1506" - }, { "url": "http://rhn.redhat.com/errata/RHSA-2012-1508.html", "refsource": "MISC", "name": "http://rhn.redhat.com/errata/RHSA-2012-1508.html" }, { - "url": "https://access.redhat.com/errata/RHSA-2012:1508", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80543", "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2012:1508" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2012-0860", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2012-0860" + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80543" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790730", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=790730" - }, - { - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80543", - "refsource": "MISC", - "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80543" - } - ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "HIGH", - "accessVector": "LOCAL", - "authentication": "NONE", - "availabilityImpact": "COMPLETE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 6.2, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "COMPLETE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "COMPLETE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", - "version": "2.0" } ] } diff --git a/2012/0xxx/CVE-2012-0864.json b/2012/0xxx/CVE-2012-0864.json index dee1140b567..4ce89b88da2 100644 --- a/2012/0xxx/CVE-2012-0864.json +++ b/2012/0xxx/CVE-2012-0864.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2012-0864 glibc: FORTIFY_SOURCE format string protection bypass via \"nargs\" integer overflow" + "value": "Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Integer Overflow or Wraparound", - "cweId": "CWE-190" + "value": "n/a" } ] } @@ -32,38 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 5", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:2.5-81.el5_8.1", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 6", - "version": { - "version_data": [ - { - "version_value": "0:2.12-1.47.el6_2.9", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "RHEV 3.X Hypervisor and Agents for RHEL-6", - "version": { - "version_data": [ - { - "version_value": "0:6.2-20120423.1.el6_2", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -116,61 +93,11 @@ "refsource": "MISC", "name": "http://www.securityfocus.com/bid/52201" }, - { - "url": "https://access.redhat.com/errata/RHSA-2012:0393", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2012:0393" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2012:0397", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2012:0397" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2012:0488", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2012:0488" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2012:0531", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2012:0531" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2012-0864", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2012-0864" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=794766", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=794766" } ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "MEDIUM", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 6.8, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", - "version": "2.0" - } - ] } } \ No newline at end of file