From b48a1cda6cab2b3e8ac8be09a524ae7c618d252d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 13 Feb 2023 04:02:07 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2012/4xxx/CVE-2012-4524.json | 115 ++++++++++----------- 2012/4xxx/CVE-2012-4527.json | 141 ++++++++++++------------- 2012/4xxx/CVE-2012-4528.json | 117 ++++++++++----------- 2012/4xxx/CVE-2012-4530.json | 97 +++++++++--------- 2012/4xxx/CVE-2012-4534.json | 179 +++++++++++++++----------------- 2012/4xxx/CVE-2012-4535.json | 193 ++++++++++++++++++----------------- 2012/4xxx/CVE-2012-4536.json | 157 ++++++++++++++-------------- 2012/4xxx/CVE-2012-4537.json | 193 ++++++++++++++++++----------------- 2012/4xxx/CVE-2012-4538.json | 181 ++++++++++++++++---------------- 2012/4xxx/CVE-2012-4544.json | 181 ++++++++++++++++---------------- 2013/1xxx/CVE-2013-1953.json | 73 ++++++------- 2013/1xxx/CVE-2013-1957.json | 79 +++++++------- 2013/1xxx/CVE-2013-1958.json | 79 +++++++------- 2013/1xxx/CVE-2013-1959.json | 97 +++++++++--------- 2013/1xxx/CVE-2013-1960.json | 64 ++---------- 2013/1xxx/CVE-2013-1961.json | 64 ++---------- 2013/1xxx/CVE-2013-1962.json | 145 +++++++++++++------------- 2013/1xxx/CVE-2013-1963.json | 61 +++++------ 2013/1xxx/CVE-2013-1964.json | 103 ++++++++++--------- 2013/1xxx/CVE-2013-1967.json | 103 ++++++++++--------- 2013/4xxx/CVE-2013-4441.json | 25 ++--- 2013/4xxx/CVE-2013-4442.json | 115 ++++++++++----------- 2013/4xxx/CVE-2013-4449.json | 151 +++++++++++++-------------- 2013/4xxx/CVE-2013-4452.json | 79 +++++++------- 2013/4xxx/CVE-2013-4458.json | 53 ++-------- 2013/4xxx/CVE-2013-4459.json | 81 +++++++-------- 2013/4xxx/CVE-2013-4460.json | 85 +++++++-------- 2013/4xxx/CVE-2013-4461.json | 73 ++++++------- 2013/4xxx/CVE-2013-4463.json | 81 +++++++-------- 2013/4xxx/CVE-2013-4469.json | 75 +++++++------- 30 files changed, 1556 insertions(+), 1684 deletions(-) diff --git a/2012/4xxx/CVE-2012-4524.json b/2012/4xxx/CVE-2012-4524.json index 20383d0028c..dbb552a2d9a 100644 --- a/2012/4xxx/CVE-2012-4524.json +++ b/2012/4xxx/CVE-2012-4524.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-4524", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "xlockmore", - "product": { - "product_data": [ - { - "product_name": "xlockmore", - "version": { - "version_data": [ - { - "version_value": "< 5.43" - } - ] - } - } - ] - } - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,17 +27,61 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "xlockmore", + "product": { + "product_data": [ + { + "product_name": "xlockmore", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 5.43" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://security-tracker.debian.org/tracker/CVE-2012-4524", + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091108.html", "refsource": "MISC", - "name": "https://security-tracker.debian.org/tracker/CVE-2012-4524" + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091108.html" }, { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4524", + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091150.html", "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4524" + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091150.html" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091709.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091709.html" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201309-03.xml", + "refsource": "MISC", + "name": "http://security.gentoo.org/glsa/glsa-201309-03.xml" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/10/17/12", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/10/17/12" + }, + { + "url": "http://www.securityfocus.com/bid/56169", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/56169" }, { "url": "https://access.redhat.com/security/cve/cve-2012-4524", @@ -68,39 +89,19 @@ "name": "https://access.redhat.com/security/cve/cve-2012-4524" }, { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4524", "refsource": "MISC", - "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79558", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79558" + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4524" }, { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79558", "refsource": "MISC", - "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091108.html", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091108.html" + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79558" }, { + "url": "https://security-tracker.debian.org/tracker/CVE-2012-4524", "refsource": "MISC", - "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091150.html", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091150.html" - }, - { - "refsource": "MISC", - "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091709.html", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091709.html" - }, - { - "refsource": "MISC", - "name": "http://security.gentoo.org/glsa/glsa-201309-03.xml", - "url": "http://security.gentoo.org/glsa/glsa-201309-03.xml" - }, - { - "refsource": "MISC", - "name": "http://www.openwall.com/lists/oss-security/2012/10/17/12", - "url": "http://www.openwall.com/lists/oss-security/2012/10/17/12" - }, - { - "refsource": "MISC", - "name": "http://www.securityfocus.com/bid/56169", - "url": "http://www.securityfocus.com/bid/56169" + "name": "https://security-tracker.debian.org/tracker/CVE-2012-4524" } ] } diff --git a/2012/4xxx/CVE-2012-4527.json b/2012/4xxx/CVE-2012-4527.json index e78333303ab..f2cbaddba5c 100644 --- a/2012/4xxx/CVE-2012-4527.json +++ b/2012/4xxx/CVE-2012-4527.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-4527", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "Stack-based buffer overflow in mcrypt 2.6.8 and earlier allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long file name. NOTE: it is not clear whether this is a vulnerability." + "value": "Stack-based buffer overflow in mcrypt 2.6.8 and earlier allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long file name. NOTE: it is not clear whether this is a vulnerability." } ] }, @@ -50,52 +27,76 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "FEDORA-2012-17290", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091206.html" - }, - { - "name": "openSUSE-SU-2012:1440", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2012-11/msg00003.html" - }, - { - "name": "FEDORA-2012-17318", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091173.html" - }, - { - "name": "FEDORA-2012-17339", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091377.html" - }, - { - "name": "56114", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/56114" - }, - { - "name": "[oss-security] 20121018 Re: CVE Request -- mcrypt: stack-based buffer overflow by encryption / decryption of overly long file names", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/10/18/12" - }, - { - "name": "[oss-security] 20121119 Re: CVE Request -- mcrypt: stack-based buffer overflow by encryption / decryption of overly long file names", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/11/20/1" - }, - { - "name": "[oss-security] 20121018 CVE Request -- mcrypt: stack-based buffer overflow by encryption / decryption of overly long file names", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/10/18/9" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=867790", + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091173.html", "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867790" + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091173.html" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091206.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091206.html" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091377.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091377.html" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-11/msg00003.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2012-11/msg00003.html" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/10/18/12", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/10/18/12" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/10/18/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/10/18/9" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/11/20/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/11/20/1" + }, + { + "url": "http://www.securityfocus.com/bid/56114", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/56114" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867790", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=867790" } ] } diff --git a/2012/4xxx/CVE-2012-4528.json b/2012/4xxx/CVE-2012-4528.json index 7e5cb75aea0..9a223c685ad 100644 --- a/2012/4xxx/CVE-2012-4528.json +++ b/2012/4xxx/CVE-2012-4528.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-4528", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,57 +27,81 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "openSUSE-SU-2013:1342", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html" - }, - { - "name": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20121017-0_mod_security_ruleset_bypass.txt", + "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html", "refsource": "MISC", - "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20121017-0_mod_security_ruleset_bypass.txt" + "name": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html" }, { - "name": "http://mod-security.svn.sourceforge.net/viewvc/mod-security?view=revision&sortby=date&revision=2081", - "refsource": "CONFIRM", - "url": "http://mod-security.svn.sourceforge.net/viewvc/mod-security?view=revision&sortby=date&revision=2081" + "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html" }, { - "name": "openSUSE-SU-2013:1331", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html" + "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html" }, { - "name": "http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/branches/2.7.x/CHANGES", - "refsource": "CONFIRM", - "url": "http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/branches/2.7.x/CHANGES" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093011.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093011.html" }, { - "name": "http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/trunk/apache2/msc_multipart.c?sortby=date&r1=2081&r2=2080&pathrev=2081", - "refsource": "CONFIRM", - "url": "http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/trunk/apache2/msc_multipart.c?sortby=date&r1=2081&r2=2080&pathrev=2081" + "url": "http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/branches/2.7.x/CHANGES", + "refsource": "MISC", + "name": "http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/branches/2.7.x/CHANGES" }, { - "name": "20121017 SEC Consult SA-20121017-0 :: ModSecurity multipart/invalid part ruleset bypass", - "refsource": "FULLDISC", - "url": "http://seclists.org/fulldisclosure/2012/Oct/113" + "url": "http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/trunk/apache2/msc_multipart.c?sortby=date&r1=2081&r2=2080&pathrev=2081", + "refsource": "MISC", + "name": "http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/trunk/apache2/msc_multipart.c?sortby=date&r1=2081&r2=2080&pathrev=2081" }, { - "name": "FEDORA-2012-18278", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093011.html" + "url": "http://mod-security.svn.sourceforge.net/viewvc/mod-security?view=revision&sortby=date&revision=2081", + "refsource": "MISC", + "name": "http://mod-security.svn.sourceforge.net/viewvc/mod-security?view=revision&sortby=date&revision=2081" }, { - "name": "[oss-security] 20121018 Re: CVE request: Fwd: [Full-disclosure] SEC Consult SA-20121017-0 :: ModSecurity multipart/invalid part ruleset bypass", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/10/18/14" + "url": "http://seclists.org/fulldisclosure/2012/Oct/113", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2012/Oct/113" }, { - "name": "openSUSE-SU-2013:1336", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html" + "url": "http://www.openwall.com/lists/oss-security/2012/10/18/14", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/10/18/14" + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20121017-0_mod_security_ruleset_bypass.txt", + "refsource": "MISC", + "name": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20121017-0_mod_security_ruleset_bypass.txt" } ] } diff --git a/2012/4xxx/CVE-2012-4530.json b/2012/4xxx/CVE-2012-4530.json index 001f03ef930..4a7f3873cd8 100644 --- a/2012/4xxx/CVE-2012-4530.json +++ b/2012/4xxx/CVE-2012-4530.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-4530", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "RHSA-2013:0223", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0223.html" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0223.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0223.html" }, { - "name": "[oss-security] 20121019 Re: CVE Request -- kernel stack disclosure in binfmt_script load_script()", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/10/19/3" + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.2", + "refsource": "MISC", + "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.2" }, { - "name": "https://github.com/torvalds/linux/commit/b66c5984017533316fd1951770302649baf1aa33", - "refsource": "CONFIRM", - "url": "https://github.com/torvalds/linux/commit/b66c5984017533316fd1951770302649baf1aa33" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b66c5984017533316fd1951770302649baf1aa33", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b66c5984017533316fd1951770302649baf1aa33" }, { - "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.2", - "refsource": "CONFIRM", - "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.2" + "url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html" }, { - "name": "SUSE-SU-2013:0674", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html" + "url": "http://www.openwall.com/lists/oss-security/2012/10/19/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/10/19/3" }, { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b66c5984017533316fd1951770302649baf1aa33", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b66c5984017533316fd1951770302649baf1aa33" + "url": "https://github.com/torvalds/linux/commit/b66c5984017533316fd1951770302649baf1aa33", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/b66c5984017533316fd1951770302649baf1aa33" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=868285", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=868285" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=868285", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=868285" } ] } diff --git a/2012/4xxx/CVE-2012-4534.json b/2012/4xxx/CVE-2012-4534.json index e5abbb7f2dd..2fb32596774 100644 --- a/2012/4xxx/CVE-2012-4534.json +++ b/2012/4xxx/CVE-2012-4534.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-4534", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,112 +27,126 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "SSRT101139", - "refsource": "HP", - "url": "http://marc.info/?l=bugtraq&m=136612293908376&w=2" + "url": "http://tomcat.apache.org/security-6.html", + "refsource": "MISC", + "name": "http://tomcat.apache.org/security-6.html" }, { - "name": "http://svn.apache.org/viewvc?view=revision&revision=1340218", - "refsource": "CONFIRM", - "url": "http://svn.apache.org/viewvc?view=revision&revision=1340218" + "url": "http://tomcat.apache.org/security-7.html", + "refsource": "MISC", + "name": "http://tomcat.apache.org/security-7.html" }, { - "name": "openSUSE-SU-2013:0161", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00051.html" + "url": "http://marc.info/?l=bugtraq&m=139344343412337&w=2", + "refsource": "MISC", + "name": "http://marc.info/?l=bugtraq&m=139344343412337&w=2" }, { - "name": "USN-1685-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1685-1" + "url": "http://secunia.com/advisories/57126", + "refsource": "MISC", + "name": "http://secunia.com/advisories/57126" }, { - "name": "1027836", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id?1027836" + "url": "http://marc.info/?l=bugtraq&m=136612293908376&w=2", + "refsource": "MISC", + "name": "http://marc.info/?l=bugtraq&m=136612293908376&w=2" }, { - "name": "openSUSE-SU-2013:0192", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00080.html" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0623.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0623.html" }, { - "name": "SSRT101182", - "refsource": "HP", - "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03748878" + "url": "http://www.ubuntu.com/usn/USN-1685-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1685-1" }, { - "name": "https://issues.apache.org/bugzilla/show_bug.cgi?id=52858", - "refsource": "CONFIRM", - "url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=52858" + "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03748878", + "refsource": "MISC", + "name": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03748878" }, { - "name": "openSUSE-SU-2013:0170", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00061.html" + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-12/0043.html", + "refsource": "MISC", + "name": "http://archives.neohapsis.com/archives/bugtraq/2012-12/0043.html" }, { - "name": "http://tomcat.apache.org/security-7.html", - "refsource": "CONFIRM", - "url": "http://tomcat.apache.org/security-7.html" + "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00051.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00051.html" }, { - "name": "HPSBMU02873", - "refsource": "HP", - "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03748878" + "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00061.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00061.html" }, { - "name": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/tomcat/util/net/NioEndpoint.java?r1=1340218&r2=1340217&pathrev=1340218", - "refsource": "CONFIRM", - "url": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/tomcat/util/net/NioEndpoint.java?r1=1340218&r2=1340217&pathrev=1340218" + "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00080.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00080.html" }, { - "name": "http://tomcat.apache.org/security-6.html", - "refsource": "CONFIRM", - "url": "http://tomcat.apache.org/security-6.html" + "url": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/tomcat/util/net/NioEndpoint.java?r1=1340218&r2=1340217&pathrev=1340218", + "refsource": "MISC", + "name": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/tomcat/util/net/NioEndpoint.java?r1=1340218&r2=1340217&pathrev=1340218" }, { - "name": "57126", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/57126" + "url": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/webapps/docs/changelog.xml?r1=1340218&r2=1340217&pathrev=1340218", + "refsource": "MISC", + "name": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/webapps/docs/changelog.xml?r1=1340218&r2=1340217&pathrev=1340218" }, { - "name": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/webapps/docs/changelog.xml?r1=1340218&r2=1340217&pathrev=1340218", - "refsource": "CONFIRM", - "url": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/webapps/docs/changelog.xml?r1=1340218&r2=1340217&pathrev=1340218" + "url": "http://svn.apache.org/viewvc?view=revision&revision=1340218", + "refsource": "MISC", + "name": "http://svn.apache.org/viewvc?view=revision&revision=1340218" }, { - "name": "RHSA-2013:0623", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0623.html" + "url": "http://www.securityfocus.com/bid/56813", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/56813" }, { - "name": "20121204 CVE-2012-4534 Apache Tomcat denial of service", - "refsource": "BUGTRAQ", - "url": "http://archives.neohapsis.com/archives/bugtraq/2012-12/0043.html" + "url": "http://www.securitytracker.com/id?1027836", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id?1027836" }, { - "name": "oval:org.mitre.oval:def:19398", - "refsource": "OVAL", - "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19398" + "url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=52858", + "refsource": "MISC", + "name": "https://issues.apache.org/bugzilla/show_bug.cgi?id=52858" }, { - "name": "56813", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/56813" - }, - { - "name": "HPSBUX02866", - "refsource": "HP", - "url": "http://marc.info/?l=bugtraq&m=136612293908376&w=2" - }, - { - "name": "HPSBST02955", - "refsource": "HP", - "url": "http://marc.info/?l=bugtraq&m=139344343412337&w=2" + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19398", + "refsource": "MISC", + "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19398" } ] } diff --git a/2012/4xxx/CVE-2012-4535.json b/2012/4xxx/CVE-2012-4535.json index d835132743a..f383c2bc339 100644 --- a/2012/4xxx/CVE-2012-4535.json +++ b/2012/4xxx/CVE-2012-4535.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-4535", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,122 +27,146 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "RHSA-2012:1540", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2012-1540.html" + "url": "http://secunia.com/advisories/55082", + "refsource": "MISC", + "name": "http://secunia.com/advisories/55082" }, { - "name": "SUSE-SU-2014:0470", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" + "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml", + "refsource": "MISC", + "name": "http://security.gentoo.org/glsa/glsa-201309-24.xml" }, { - "name": "55082", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/55082" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" }, { - "name": "1027759", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id?1027759" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" }, { - "name": "[Xen-announce] 20121113 Xen Security Advisory 20 (CVE-2012-4535) - Timer overflow DoS vulnerability", - "refsource": "MLIST", - "url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00001.html" + "url": "http://secunia.com/advisories/51413", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51413" }, { - "name": "51413", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51413" + "url": "https://security.gentoo.org/glsa/201604-03", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/201604-03" }, { - "name": "51200", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51200" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" }, { - "name": "GLSA-201309-24", - "refsource": "GENTOO", - "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" }, { - "name": "DSA-2582", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2012/dsa-2582" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" }, { - "name": "87298", - "refsource": "OSVDB", - "url": "http://osvdb.org/87298" + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" }, { - "name": "SUSE-SU-2012:1486", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" }, { - "name": "[oss-security] 20121113 Xen Security Advisory 20 (CVE-2012-4535) - Timer overflow DoS vulnerability", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/11/13/1" + "url": "http://rhn.redhat.com/errata/RHSA-2012-1540.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2012-1540.html" }, { - "name": "openSUSE-SU-2012:1572", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" + "url": "http://secunia.com/advisories/51200", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51200" }, { - "name": "51468", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51468" + "url": "http://secunia.com/advisories/51324", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51324" }, { - "name": "xen-vcpu-dos(80022)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80022" + "url": "http://secunia.com/advisories/51352", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51352" }, { - "name": "SUSE-SU-2012:1487", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" + "url": "http://secunia.com/advisories/51468", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51468" }, { - "name": "SUSE-SU-2014:0446", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" + "url": "http://www.debian.org/security/2012/dsa-2582", + "refsource": "MISC", + "name": "http://www.debian.org/security/2012/dsa-2582" }, { - "name": "51352", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51352" + "url": "http://www.securityfocus.com/bid/56498", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/56498" }, { - "name": "51324", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51324" + "url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00001.html", + "refsource": "MISC", + "name": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00001.html" }, { - "name": "GLSA-201604-03", - "refsource": "GENTOO", - "url": "https://security.gentoo.org/glsa/201604-03" + "url": "http://osvdb.org/87298", + "refsource": "MISC", + "name": "http://osvdb.org/87298" }, { - "name": "56498", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/56498" + "url": "http://www.openwall.com/lists/oss-security/2012/11/13/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/11/13/1" }, { - "name": "SUSE-SU-2012:1615", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" + "url": "http://www.securitytracker.com/id?1027759", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id?1027759" }, { - "name": "openSUSE-SU-2012:1573", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80022", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80022" } ] } diff --git a/2012/4xxx/CVE-2012-4536.json b/2012/4xxx/CVE-2012-4536.json index 6f3bf09038e..3d6e16681c2 100644 --- a/2012/4xxx/CVE-2012-4536.json +++ b/2012/4xxx/CVE-2012-4536.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-4536", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,92 +27,116 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "55082", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/55082" + "url": "http://secunia.com/advisories/55082", + "refsource": "MISC", + "name": "http://secunia.com/advisories/55082" }, { - "name": "51413", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51413" + "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml", + "refsource": "MISC", + "name": "http://security.gentoo.org/glsa/glsa-201309-24.xml" }, { - "name": "51200", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51200" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" }, { - "name": "GLSA-201309-24", - "refsource": "GENTOO", - "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" }, { - "name": "SUSE-SU-2012:1486", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" + "url": "http://secunia.com/advisories/51413", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51413" }, { - "name": "xen-domainpirqtoemuirq-dos(80023)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80023" + "url": "https://security.gentoo.org/glsa/201604-03", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/201604-03" }, { - "name": "[Xen-announce] 20121113 Xen Security Advisory 21 (CVE-2012-4536) - pirq range check DoS vulnerability", - "refsource": "MLIST", - "url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00003.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" }, { - "name": "[oss-security] 20121113 Xen Security Advisory 21 (CVE-2012-4536) - pirq range check DoS vulnerability", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/11/13/2" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" }, { - "name": "1027760", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id?1027760" + "url": "http://secunia.com/advisories/51200", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51200" }, { - "name": "87297", - "refsource": "OSVDB", - "url": "http://osvdb.org/87297" + "url": "http://secunia.com/advisories/51324", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51324" }, { - "name": "openSUSE-SU-2012:1572", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" + "url": "http://secunia.com/advisories/51352", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51352" }, { - "name": "SUSE-SU-2012:1487", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" + "url": "http://www.securityfocus.com/bid/56498", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/56498" }, { - "name": "51352", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51352" + "url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00003.html", + "refsource": "MISC", + "name": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00003.html" }, { - "name": "51324", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51324" + "url": "http://osvdb.org/87297", + "refsource": "MISC", + "name": "http://osvdb.org/87297" }, { - "name": "GLSA-201604-03", - "refsource": "GENTOO", - "url": "https://security.gentoo.org/glsa/201604-03" + "url": "http://www.openwall.com/lists/oss-security/2012/11/13/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/11/13/2" }, { - "name": "56498", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/56498" + "url": "http://www.securitytracker.com/id?1027760", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id?1027760" }, { - "name": "openSUSE-SU-2012:1573", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80023", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80023" } ] } diff --git a/2012/4xxx/CVE-2012-4537.json b/2012/4xxx/CVE-2012-4537.json index a4d698bc98d..670042ce9a5 100644 --- a/2012/4xxx/CVE-2012-4537.json +++ b/2012/4xxx/CVE-2012-4537.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-4537", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,122 +27,146 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "RHSA-2012:1540", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2012-1540.html" + "url": "http://secunia.com/advisories/55082", + "refsource": "MISC", + "name": "http://secunia.com/advisories/55082" }, { - "name": "SUSE-SU-2014:0470", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" + "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml", + "refsource": "MISC", + "name": "http://security.gentoo.org/glsa/glsa-201309-24.xml" }, { - "name": "55082", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/55082" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" }, { - "name": "xen-setp2mentry-dos(80024)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80024" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" }, { - "name": "[oss-security] 20121113 Xen Security Advisory 22 (CVE-2012-4537) - Memory mapping failure DoS vulnerability", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/11/13/6" + "url": "http://secunia.com/advisories/51413", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51413" }, { - "name": "51413", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51413" + "url": "https://security.gentoo.org/glsa/201604-03", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/201604-03" }, { - "name": "51200", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51200" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" }, { - "name": "GLSA-201309-24", - "refsource": "GENTOO", - "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" }, { - "name": "DSA-2582", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2012/dsa-2582" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" }, { - "name": "SUSE-SU-2012:1486", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" }, { - "name": "[Xen-announce] 20121113 Xen Security Advisory 22 (CVE-2012-4537) - Memory mapping failure DoS vulnerability", - "refsource": "MLIST", - "url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00005.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" }, { - "name": "openSUSE-SU-2012:1572", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" + "url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00005.html", + "refsource": "MISC", + "name": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00005.html" }, { - "name": "51468", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51468" + "url": "http://osvdb.org/87307", + "refsource": "MISC", + "name": "http://osvdb.org/87307" }, { - "name": "SUSE-SU-2012:1487", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" + "url": "http://rhn.redhat.com/errata/RHSA-2012-1540.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2012-1540.html" }, { - "name": "SUSE-SU-2014:0446", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" + "url": "http://secunia.com/advisories/51200", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51200" }, { - "name": "51352", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51352" + "url": "http://secunia.com/advisories/51324", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51324" }, { - "name": "51324", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51324" + "url": "http://secunia.com/advisories/51352", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51352" }, { - "name": "GLSA-201604-03", - "refsource": "GENTOO", - "url": "https://security.gentoo.org/glsa/201604-03" + "url": "http://secunia.com/advisories/51468", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51468" }, { - "name": "56498", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/56498" + "url": "http://www.debian.org/security/2012/dsa-2582", + "refsource": "MISC", + "name": "http://www.debian.org/security/2012/dsa-2582" }, { - "name": "SUSE-SU-2012:1615", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" + "url": "http://www.openwall.com/lists/oss-security/2012/11/13/6", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/11/13/6" }, { - "name": "openSUSE-SU-2012:1573", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" + "url": "http://www.securityfocus.com/bid/56498", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/56498" }, { - "name": "87307", - "refsource": "OSVDB", - "url": "http://osvdb.org/87307" + "url": "http://www.securitytracker.com/id?1027761", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id?1027761" }, { - "name": "1027761", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id?1027761" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80024", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80024" } ] } diff --git a/2012/4xxx/CVE-2012-4538.json b/2012/4xxx/CVE-2012-4538.json index 206a8fa2016..5d3b80ad1b7 100644 --- a/2012/4xxx/CVE-2012-4538.json +++ b/2012/4xxx/CVE-2012-4538.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-4538", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,112 +27,136 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "55082", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/55082" + "url": "http://secunia.com/advisories/55082", + "refsource": "MISC", + "name": "http://secunia.com/advisories/55082" }, { - "name": "51413", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51413" + "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml", + "refsource": "MISC", + "name": "http://security.gentoo.org/glsa/glsa-201309-24.xml" }, { - "name": "51200", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51200" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" }, { - "name": "1027762", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id?1027762" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" }, { - "name": "GLSA-201309-24", - "refsource": "GENTOO", - "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml" + "url": "http://secunia.com/advisories/51413", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51413" }, { - "name": "DSA-2582", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2012/dsa-2582" + "url": "https://security.gentoo.org/glsa/201604-03", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/201604-03" }, { - "name": "SUSE-SU-2012:1486", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" }, { - "name": "87306", - "refsource": "OSVDB", - "url": "http://osvdb.org/87306" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" }, { - "name": "openSUSE-SU-2012:1572", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" }, { - "name": "51468", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51468" + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" }, { - "name": "SUSE-SU-2012:1487", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" + "url": "http://secunia.com/advisories/51200", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51200" }, { - "name": "xen-hvmop-dos(80025)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80025" + "url": "http://secunia.com/advisories/51324", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51324" }, { - "name": "SUSE-SU-2014:0446", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" + "url": "http://secunia.com/advisories/51352", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51352" }, { - "name": "51352", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51352" + "url": "http://secunia.com/advisories/51468", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51468" }, { - "name": "51324", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51324" + "url": "http://www.debian.org/security/2012/dsa-2582", + "refsource": "MISC", + "name": "http://www.debian.org/security/2012/dsa-2582" }, { - "name": "GLSA-201604-03", - "refsource": "GENTOO", - "url": "https://security.gentoo.org/glsa/201604-03" + "url": "http://www.securityfocus.com/bid/56498", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/56498" }, { - "name": "[oss-security] 20121113 Xen Security Advisory 23 (CVE-2012-4538) - Unhooking empty PAE entries DoS vulnerability", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/11/13/3" + "url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00004.html", + "refsource": "MISC", + "name": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00004.html" }, { - "name": "56498", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/56498" + "url": "http://osvdb.org/87306", + "refsource": "MISC", + "name": "http://osvdb.org/87306" }, { - "name": "SUSE-SU-2012:1615", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" + "url": "http://www.openwall.com/lists/oss-security/2012/11/13/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/11/13/3" }, { - "name": "openSUSE-SU-2012:1573", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" + "url": "http://www.securitytracker.com/id?1027762", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id?1027762" }, { - "name": "[Xen-announce] 20121113 Xen Security Advisory 23 (CVE-2012-4538) - Unhooking empty PAE entries DoS vulnerability", - "refsource": "MLIST", - "url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00004.html" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80025", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80025" } ] } diff --git a/2012/4xxx/CVE-2012-4544.json b/2012/4xxx/CVE-2012-4544.json index 2bae1d9412b..fb1f31fafd6 100644 --- a/2012/4xxx/CVE-2012-4544.json +++ b/2012/4xxx/CVE-2012-4544.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-4544", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,112 +27,136 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "SUSE-SU-2014:0470", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" }, { - "name": "51071", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51071" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" }, { - "name": "[oss-security] 20121026 Xen Security Advisory 25 (CVE-2012-4544) - Xen domain builder Out-of-memory due to malicious kernel/ramdisk", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/10/26/3" + "url": "http://secunia.com/advisories/51413", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51413" }, { - "name": "FEDORA-2012-17408", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091832.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" }, { - "name": "51413", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51413" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" }, { - "name": "FEDORA-2012-17204", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091844.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" }, { - "name": "SUSE-SU-2012:1486", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" }, { - "name": "DSA-2636", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2013/dsa-2636" + "url": "http://secunia.com/advisories/51324", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51324" }, { - "name": "xen-pvdomainbuilder-dos(79617)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79617" + "url": "http://secunia.com/advisories/51352", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51352" }, { - "name": "FEDORA-2012-17135", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092050.html" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091832.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091832.html" }, { - "name": "56289", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/56289" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091844.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091844.html" }, { - "name": "1027699", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id?1027699" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092050.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092050.html" }, { - "name": "RHSA-2013:0241", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0241.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html" }, { - "name": "openSUSE-SU-2012:1572", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" + "url": "http://osvdb.org/86619", + "refsource": "MISC", + "name": "http://osvdb.org/86619" }, { - "name": "86619", - "refsource": "OSVDB", - "url": "http://osvdb.org/86619" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0241.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0241.html" }, { - "name": "SUSE-SU-2012:1487", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" + "url": "http://secunia.com/advisories/51071", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51071" }, { - "name": "SUSE-SU-2014:0446", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" + "url": "http://www.debian.org/security/2013/dsa-2636", + "refsource": "MISC", + "name": "http://www.debian.org/security/2013/dsa-2636" }, { - "name": "51352", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51352" + "url": "http://www.openwall.com/lists/oss-security/2012/10/26/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/10/26/3" }, { - "name": "51324", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51324" + "url": "http://www.securityfocus.com/bid/56289", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/56289" }, { - "name": "SUSE-SU-2014:0411", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html" + "url": "http://www.securitytracker.com/id?1027699", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id?1027699" }, { - "name": "openSUSE-SU-2012:1573", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79617", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79617" } ] } diff --git a/2013/1xxx/CVE-2013-1953.json b/2013/1xxx/CVE-2013-1953.json index 54d324a1b5e..6b33d72f143 100644 --- a/2013/1xxx/CVE-2013-1953.json +++ b/2013/1xxx/CVE-2013-1953.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1953", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,22 +27,46 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=951257", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=951257" + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:190", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:190" }, { - "name": "[oss-security] 20130316 Re: autotrace: stack-based buffer overflow in bmp parser", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/04/16/3" + "url": "http://www.openwall.com/lists/oss-security/2013/04/16/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/04/16/3" }, { - "name": "MDVSA-2013:190", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:190" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=951257", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=951257" } ] } diff --git a/2013/1xxx/CVE-2013-1957.json b/2013/1xxx/CVE-2013-1957.json index 8795babd50e..d4e034ecee8 100644 --- a/2013/1xxx/CVE-2013-1957.json +++ b/2013/1xxx/CVE-2013-1957.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1957", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=132c94e31b8bca8ea921f9f96a57d684fa4ae0a9", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=132c94e31b8bca8ea921f9f96a57d684fa4ae0a9" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=132c94e31b8bca8ea921f9f96a57d684fa4ae0a9", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=132c94e31b8bca8ea921f9f96a57d684fa4ae0a9" }, { - "name": "[oss-security] 20130416 Re: Re: Summary of security bugs (now fixed) in user namespaces", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/04/16/11" + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.6", + "refsource": "MISC", + "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.6" }, { - "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.6", - "refsource": "CONFIRM", - "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.6" + "url": "http://www.openwall.com/lists/oss-security/2013/04/16/11", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/04/16/11" }, { - "name": "https://github.com/torvalds/linux/commit/132c94e31b8bca8ea921f9f96a57d684fa4ae0a9", - "refsource": "CONFIRM", - "url": "https://github.com/torvalds/linux/commit/132c94e31b8bca8ea921f9f96a57d684fa4ae0a9" + "url": "https://github.com/torvalds/linux/commit/132c94e31b8bca8ea921f9f96a57d684fa4ae0a9", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/132c94e31b8bca8ea921f9f96a57d684fa4ae0a9" } ] } diff --git a/2013/1xxx/CVE-2013-1958.json b/2013/1xxx/CVE-2013-1958.json index 83015dc24aa..d5afcf95a25 100644 --- a/2013/1xxx/CVE-2013-1958.json +++ b/2013/1xxx/CVE-2013-1958.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1958", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=92f28d973cce45ef5823209aab3138eb45d8b349", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=92f28d973cce45ef5823209aab3138eb45d8b349" + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.6", + "refsource": "MISC", + "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.6" }, { - "name": "[oss-security] 20130416 Re: Re: Summary of security bugs (now fixed) in user namespaces", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/04/16/11" + "url": "http://www.openwall.com/lists/oss-security/2013/04/16/11", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/04/16/11" }, { - "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.6", - "refsource": "CONFIRM", - "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.6" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=92f28d973cce45ef5823209aab3138eb45d8b349", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=92f28d973cce45ef5823209aab3138eb45d8b349" }, { - "name": "https://github.com/torvalds/linux/commit/92f28d973cce45ef5823209aab3138eb45d8b349", - "refsource": "CONFIRM", - "url": "https://github.com/torvalds/linux/commit/92f28d973cce45ef5823209aab3138eb45d8b349" + "url": "https://github.com/torvalds/linux/commit/92f28d973cce45ef5823209aab3138eb45d8b349", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/92f28d973cce45ef5823209aab3138eb45d8b349" } ] } diff --git a/2013/1xxx/CVE-2013-1959.json b/2013/1xxx/CVE-2013-1959.json index e843c0ac86a..847866ea288 100644 --- a/2013/1xxx/CVE-2013-1959.json +++ b/2013/1xxx/CVE-2013-1959.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1959", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://github.com/torvalds/linux/commit/e3211c120a85b792978bcb4be7b2886df18d27f0", - "refsource": "CONFIRM", - "url": "https://github.com/torvalds/linux/commit/e3211c120a85b792978bcb4be7b2886df18d27f0" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6708075f104c3c9b04b23336bb0366ca30c3931b", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6708075f104c3c9b04b23336bb0366ca30c3931b" }, { - "name": "https://github.com/torvalds/linux/commit/6708075f104c3c9b04b23336bb0366ca30c3931b", - "refsource": "CONFIRM", - "url": "https://github.com/torvalds/linux/commit/6708075f104c3c9b04b23336bb0366ca30c3931b" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e3211c120a85b792978bcb4be7b2886df18d27f0", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e3211c120a85b792978bcb4be7b2886df18d27f0" }, { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6708075f104c3c9b04b23336bb0366ca30c3931b", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6708075f104c3c9b04b23336bb0366ca30c3931b" + "url": "http://www.exploit-db.com/exploits/25307", + "refsource": "MISC", + "name": "http://www.exploit-db.com/exploits/25307" }, { - "name": "[oss-security] 20130428 Multiple Linux setuid output redirection vulnerabilities", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/04/29/1" + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.9", + "refsource": "MISC", + "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.9" }, { - "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.9", - "refsource": "CONFIRM", - "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.9" + "url": "http://www.openwall.com/lists/oss-security/2013/04/29/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/04/29/1" }, { - "name": "25307", - "refsource": "EXPLOIT-DB", - "url": "http://www.exploit-db.com/exploits/25307" + "url": "https://github.com/torvalds/linux/commit/6708075f104c3c9b04b23336bb0366ca30c3931b", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/6708075f104c3c9b04b23336bb0366ca30c3931b" }, { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e3211c120a85b792978bcb4be7b2886df18d27f0", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e3211c120a85b792978bcb4be7b2886df18d27f0" + "url": "https://github.com/torvalds/linux/commit/e3211c120a85b792978bcb4be7b2886df18d27f0", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/e3211c120a85b792978bcb4be7b2886df18d27f0" } ] } diff --git a/2013/1xxx/CVE-2013-1960.json b/2013/1xxx/CVE-2013-1960.json index 41f16579a2c..bff78b80590 100644 --- a/2013/1xxx/CVE-2013-1960.json +++ b/2013/1xxx/CVE-2013-1960.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2013-1960 libtiff (tiff2pdf): Heap-based buffer overflow in t2_process_jpeg_strip()" + "value": "Heap-based buffer overflow in the t2p_process_jpeg_strip function in tiff2pdf in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image file." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Heap-based Buffer Overflow", - "cweId": "CWE-122" + "value": "n/a" } ] } @@ -32,27 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 5", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:3.8.2-19.el5_10", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 6", - "version": { - "version_data": [ - { - "version_value": "0:3.9.4-10.el6_5", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -115,56 +103,16 @@ "refsource": "MISC", "name": "http://www.debian.org/security/2013/dsa-2698" }, - { - "url": "https://access.redhat.com/errata/RHSA-2014:0222", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2014:0222" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2014:0223", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2014:0223" - }, { "url": "http://www.securityfocus.com/bid/59609", "refsource": "MISC", "name": "http://www.securityfocus.com/bid/59609" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2013-1960", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2013-1960" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952158", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=952158" } ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "HIGH", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 5.1, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", - "version": "2.0" - } - ] } } \ No newline at end of file diff --git a/2013/1xxx/CVE-2013-1961.json b/2013/1xxx/CVE-2013-1961.json index 08e8a5ad283..3f8ad3d4fa0 100644 --- a/2013/1xxx/CVE-2013-1961.json +++ b/2013/1xxx/CVE-2013-1961.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2013-1961 libtiff (tiff2pdf): Stack-based buffer overflow with malformed image-length and resolution" + "value": "Stack-based buffer overflow in the t2p_write_pdf_page function in tiff2pdf in libtiff before 4.0.3 allows remote attackers to cause a denial of service (application crash) via a crafted image length and resolution in a TIFF image file." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Stack-based Buffer Overflow", - "cweId": "CWE-121" + "value": "n/a" } ] } @@ -32,27 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 5", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:3.8.2-19.el5_10", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 6", - "version": { - "version_data": [ - { - "version_value": "0:3.9.4-10.el6_5", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -120,51 +108,11 @@ "refsource": "MISC", "name": "http://www.securityfocus.com/bid/59607" }, - { - "url": "https://access.redhat.com/errata/RHSA-2014:0222", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2014:0222" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2014:0223", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2014:0223" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2013-1961", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2013-1961" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952131", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=952131" } ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "MEDIUM", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 4.3, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", - "version": "2.0" - } - ] } } \ No newline at end of file diff --git a/2013/1xxx/CVE-2013-1962.json b/2013/1xxx/CVE-2013-1962.json index e12acff6417..ab8fd12a0fa 100644 --- a/2013/1xxx/CVE-2013-1962.json +++ b/2013/1xxx/CVE-2013-1962.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1962", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,82 +27,106 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "FEDORA-2013-8635", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106906.html" + "url": "http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=ca697e90d5bd6a6dfb94bfb6d4438bdf9a44b739", + "refsource": "MISC", + "name": "http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=ca697e90d5bd6a6dfb94bfb6d4438bdf9a44b739" }, { - "name": "http://libvirt.org/git/?p=libvirt.git;a=commit;h=ca697e90d5bd6a6dfb94bfb6d4438bdf9a44b739", - "refsource": "CONFIRM", - "url": "http://libvirt.org/git/?p=libvirt.git;a=commit;h=ca697e90d5bd6a6dfb94bfb6d4438bdf9a44b739" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106906.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106906.html" }, { - "name": "[oss-security] 20130516 CVE-2013-1962 libvirt: DoS (max count of open files exhaustion) due sockets leak in the storage pool", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/05/16/9" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106921.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106921.html" }, { - "name": "FEDORA-2013-8681", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106921.html" + "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00022.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00022.html" }, { - "name": "93451", - "refsource": "OSVDB", - "url": "http://osvdb.org/93451" + "url": "http://osvdb.org/93451", + "refsource": "MISC", + "name": "http://osvdb.org/93451" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=953107", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953107" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0831.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0831.html" }, { - "name": "USN-1895-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1895-1" + "url": "http://secunia.com/advisories/53440", + "refsource": "MISC", + "name": "http://secunia.com/advisories/53440" }, { - "name": "59937", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/59937" + "url": "http://secunia.com/advisories/53475", + "refsource": "MISC", + "name": "http://secunia.com/advisories/53475" }, { - "name": "53475", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/53475" + "url": "http://www.openwall.com/lists/oss-security/2013/05/16/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/05/16/9" }, { - "name": "53440", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/53440" + "url": "http://www.securityfocus.com/bid/59937", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/59937" }, { - "name": "RHSA-2013:0831", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0831.html" + "url": "http://www.securitytracker.com/id/1028577", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id/1028577" }, { - "name": "1028577", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id/1028577" + "url": "http://www.ubuntu.com/usn/USN-1895-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1895-1" }, { - "name": "openSUSE-SU-2013:0885", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00022.html" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84341", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84341" }, { - "name": "libvirt-cve20131962-dos(84341)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84341" + "url": "https://www.redhat.com/archives/libvir-list/2013-May/msg01222.html", + "refsource": "MISC", + "name": "https://www.redhat.com/archives/libvir-list/2013-May/msg01222.html" }, { - "name": "[libvir-list] 20130516 [libvirt] [PATCH] daemon: fix leak after listing all volumes", - "refsource": "MLIST", - "url": "https://www.redhat.com/archives/libvir-list/2013-May/msg01222.html" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953107", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=953107" } ] } diff --git a/2013/1xxx/CVE-2013-1963.json b/2013/1xxx/CVE-2013-1963.json index de2b999ba11..cd78a33592f 100644 --- a/2013/1xxx/CVE-2013-1963.json +++ b/2013/1xxx/CVE-2013-1963.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1963", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,12 +27,36 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://owncloud.org/about/security/advisories/oC-SA-2013-018/", - "refsource": "CONFIRM", - "url": "http://owncloud.org/about/security/advisories/oC-SA-2013-018/" + "url": "http://owncloud.org/about/security/advisories/oC-SA-2013-018/", + "refsource": "MISC", + "name": "http://owncloud.org/about/security/advisories/oC-SA-2013-018/" } ] } diff --git a/2013/1xxx/CVE-2013-1964.json b/2013/1xxx/CVE-2013-1964.json index a3fb2d1fcc2..86305e61f10 100644 --- a/2013/1xxx/CVE-2013-1964.json +++ b/2013/1xxx/CVE-2013-1964.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1964", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,47 +27,71 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "59293", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/59293" + "url": "http://secunia.com/advisories/55082", + "refsource": "MISC", + "name": "http://secunia.com/advisories/55082" }, { - "name": "55082", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/55082" + "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml", + "refsource": "MISC", + "name": "http://security.gentoo.org/glsa/glsa-201309-24.xml" }, { - "name": "[oss-security] 20130418 Xen Security Advisory 50 (CVE-2013-1964) - grant table hypercall acquire/release imbalance", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/04/18/9" + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" }, { - "name": "GLSA-201309-24", - "refsource": "GENTOO", - "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104537.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104537.html" }, { - "name": "DSA-2666", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2013/dsa-2666" + "url": "http://www.debian.org/security/2013/dsa-2666", + "refsource": "MISC", + "name": "http://www.debian.org/security/2013/dsa-2666" }, { - "name": "1028459", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id/1028459" + "url": "http://www.openwall.com/lists/oss-security/2013/04/18/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/04/18/9" }, { - "name": "SUSE-SU-2014:0446", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" + "url": "http://www.securityfocus.com/bid/59293", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/59293" }, { - "name": "FEDORA-2013-6723", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104537.html" + "url": "http://www.securitytracker.com/id/1028459", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id/1028459" } ] } diff --git a/2013/1xxx/CVE-2013-1967.json b/2013/1xxx/CVE-2013-1967.json index 7b4c42cc115..8274c66f2cf 100644 --- a/2013/1xxx/CVE-2013-1967.json +++ b/2013/1xxx/CVE-2013-1967.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1967", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,47 +27,71 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "mediaelementjs-flashmediaelement-xss(83647)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83647" + "url": "http://owncloud.org/about/security/advisories/oC-SA-2013-017", + "refsource": "MISC", + "name": "http://owncloud.org/about/security/advisories/oC-SA-2013-017" }, { - "name": "https://github.com/johndyer/mediaelement/commit/9223dc6bfc50251a9a3cba0210e71be80fc38ecd", - "refsource": "CONFIRM", - "url": "https://github.com/johndyer/mediaelement/commit/9223dc6bfc50251a9a3cba0210e71be80fc38ecd" + "url": "http://seclists.org/oss-sec/2013/q2/111", + "refsource": "MISC", + "name": "http://seclists.org/oss-sec/2013/q2/111" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=955307", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=955307" + "url": "http://seclists.org/oss-sec/2013/q2/133", + "refsource": "MISC", + "name": "http://seclists.org/oss-sec/2013/q2/133" }, { - "name": "[oss-security] 20130417 Fwd: Re: CVE Request: ownCloud 5.0.5 and 4.5.10", - "refsource": "MLIST", - "url": "http://seclists.org/oss-sec/2013/q2/111" + "url": "http://secunia.com/advisories/53079", + "refsource": "MISC", + "name": "http://secunia.com/advisories/53079" }, { - "name": "53079", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/53079" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83647", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83647" }, { - "name": "http://owncloud.org/about/security/advisories/oC-SA-2013-017", - "refsource": "CONFIRM", - "url": "http://owncloud.org/about/security/advisories/oC-SA-2013-017" + "url": "https://github.com/johndyer/mediaelement/commit/9223dc6bfc50251a9a3cba0210e71be80fc38ecd", + "refsource": "MISC", + "name": "https://github.com/johndyer/mediaelement/commit/9223dc6bfc50251a9a3cba0210e71be80fc38ecd" }, { - "name": "[oss-security] 20130421 ownCloud Security Advisories (2013-017, 2013-018)", - "refsource": "MLIST", - "url": "http://seclists.org/oss-sec/2013/q2/133" + "url": "https://github.com/johndyer/mediaelement/tree/2.11.1", + "refsource": "MISC", + "name": "https://github.com/johndyer/mediaelement/tree/2.11.1" }, { - "name": "https://github.com/johndyer/mediaelement/tree/2.11.1", - "refsource": "CONFIRM", - "url": "https://github.com/johndyer/mediaelement/tree/2.11.1" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=955307", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=955307" } ] } diff --git a/2013/4xxx/CVE-2013-4441.json b/2013/4xxx/CVE-2013-4441.json index 91c2179650a..1c5df6ba463 100644 --- a/2013/4xxx/CVE-2013-4441.json +++ b/2013/4xxx/CVE-2013-4441.json @@ -1,12 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4441", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -39,6 +39,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "2.06" } ] @@ -53,24 +54,24 @@ "references": { "reference_data": [ { + "url": "http://www.openwall.com/lists/oss-security/2013/06/06/1", "refsource": "MISC", - "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726578", - "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726578" + "name": "http://www.openwall.com/lists/oss-security/2013/06/06/1" }, { + "url": "http://www.openwall.com/lists/oss-security/2013/10/16/15", "refsource": "MISC", - "name": "http://www.openwall.com/lists/oss-security/2013/06/06/1", - "url": "http://www.openwall.com/lists/oss-security/2013/06/06/1" + "name": "http://www.openwall.com/lists/oss-security/2013/10/16/15" }, { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726578", "refsource": "MISC", - "name": "http://www.openwall.com/lists/oss-security/2013/10/16/15", - "url": "http://www.openwall.com/lists/oss-security/2013/10/16/15" + "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726578" }, { + "url": "https://www.openwall.com/lists/oss-security/2012/01/22/6", "refsource": "MISC", - "name": "https://www.openwall.com/lists/oss-security/2012/01/22/6", - "url": "https://www.openwall.com/lists/oss-security/2012/01/22/6" + "name": "https://www.openwall.com/lists/oss-security/2012/01/22/6" } ] } diff --git a/2013/4xxx/CVE-2013-4442.json b/2013/4xxx/CVE-2013-4442.json index 5c08e0591ee..46f7b44fbfe 100644 --- a/2013/4xxx/CVE-2013-4442.json +++ b/2013/4xxx/CVE-2013-4442.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4442", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,52 +27,76 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[oss-security] 20140606 Re: CVE Request: pwgen", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/06/06/1" - }, - { - "name": "http://sourceforge.net/p/pwgen/code/ci/00118ccac4656adb028504639b313d7b09e62b79/", - "refsource": "CONFIRM", - "url": "http://sourceforge.net/p/pwgen/code/ci/00118ccac4656adb028504639b313d7b09e62b79/" - }, - { - "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=672241", + "url": "http://advisories.mageia.org/MGASA-2014-0535.html", "refsource": "MISC", - "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=672241" + "name": "http://advisories.mageia.org/MGASA-2014-0535.html" }, { - "name": "FEDORA-2014-16406", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146237.html" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146015.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146015.html" }, { - "name": "FEDORA-2014-16368", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146015.html" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146237.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146237.html" }, { - "name": "[oss-security] 20141015 Re: RESEND: CVE Request: pwgen", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/10/16/15" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146285.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146285.html" }, { - "name": "MDVSA-2015:008", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:008" + "url": "http://sourceforge.net/p/pwgen/code/ci/00118ccac4656adb028504639b313d7b09e62b79/", + "refsource": "MISC", + "name": "http://sourceforge.net/p/pwgen/code/ci/00118ccac4656adb028504639b313d7b09e62b79/" }, { - "name": "FEDORA-2014-16473", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146285.html" + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:008", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:008" }, { - "name": "http://advisories.mageia.org/MGASA-2014-0535.html", - "refsource": "CONFIRM", - "url": "http://advisories.mageia.org/MGASA-2014-0535.html" + "url": "http://www.openwall.com/lists/oss-security/2013/06/06/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/06/06/1" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2013/10/16/15", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/10/16/15" + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=672241", + "refsource": "MISC", + "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=672241" } ] } diff --git a/2013/4xxx/CVE-2013-4449.json b/2013/4xxx/CVE-2013-4449.json index a8a075b0c6b..4c0e4cba26e 100644 --- a/2013/4xxx/CVE-2013-4449.json +++ b/2013/4xxx/CVE-2013-4449.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4449", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,87 +27,111 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", - "refsource": "CONFIRM", - "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705", + "refsource": "MISC", + "name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705" }, { - "name": "http://www.openldap.org/its/index.cgi/Incoming?id=7723", - "refsource": "CONFIRM", - "url": "http://www.openldap.org/its/index.cgi/Incoming?id=7723" + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735", + "refsource": "MISC", + "name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735" }, { - "name": "MDVSA-2014:026", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:026" + "url": "http://seclists.org/fulldisclosure/2019/Dec/26", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2019/Dec/26" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1019490", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019490" + "url": "https://seclists.org/bugtraq/2019/Dec/23", + "refsource": "MISC", + "name": "https://seclists.org/bugtraq/2019/Dec/23" }, { - "name": "DSA-3209", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2015/dsa-3209" + "url": "https://support.apple.com/kb/HT210788", + "refsource": "MISC", + "name": "https://support.apple.com/kb/HT210788" }, { - "name": "RHSA-2014:0126", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2014-0126.html" + "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", + "refsource": "MISC", + "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { - "name": "[oss-security] 20131018 Re: CVE request: slapd segfaults on certain queries with rwm overlay enabled", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/10/19/3" + "url": "http://rhn.redhat.com/errata/RHSA-2014-0126.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2014-0126.html" }, { - "name": "RHSA-2014:0206", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2014-0206.html" + "url": "http://rhn.redhat.com/errata/RHSA-2014-0206.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2014-0206.html" }, { - "name": "63190", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/63190" + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-4449", + "refsource": "MISC", + "name": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-4449" }, { - "name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705", - "refsource": "CONFIRM", - "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705" + "url": "http://www.debian.org/security/2015/dsa-3209", + "refsource": "MISC", + "name": "http://www.debian.org/security/2015/dsa-3209" }, { - "name": "1029711", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id/1029711" + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:026", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:026" }, { - "name": "20140401 Cisco Unified Communications Manager Denial of Service Vulnerability", - "refsource": "CISCO", - "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-4449" + "url": "http://www.openldap.org/its/index.cgi/Incoming?id=7723", + "refsource": "MISC", + "name": "http://www.openldap.org/its/index.cgi/Incoming?id=7723" }, { - "name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735", - "refsource": "CONFIRM", - "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735" + "url": "http://www.openwall.com/lists/oss-security/2013/10/19/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/10/19/3" }, { - "refsource": "CONFIRM", - "name": "https://support.apple.com/kb/HT210788", - "url": "https://support.apple.com/kb/HT210788" + "url": "http://www.securityfocus.com/bid/63190", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/63190" }, { - "refsource": "BUGTRAQ", - "name": "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", - "url": "https://seclists.org/bugtraq/2019/Dec/23" + "url": "http://www.securitytracker.com/id/1029711", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id/1029711" }, { - "refsource": "FULLDISC", - "name": "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", - "url": "http://seclists.org/fulldisclosure/2019/Dec/26" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019490", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1019490" } ] } diff --git a/2013/4xxx/CVE-2013-4452.json b/2013/4xxx/CVE-2013-4452.json index c2f3899ccdb..0ea38576a4f 100644 --- a/2013/4xxx/CVE-2013-4452.json +++ b/2013/4xxx/CVE-2013-4452.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4452", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "1029390", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id/1029390" + "url": "http://rhn.redhat.com/errata/RHSA-2013-1762.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-1762.html" }, { - "name": "63916", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/63916" + "url": "http://secunia.com/advisories/55852", + "refsource": "MISC", + "name": "http://secunia.com/advisories/55852" }, { - "name": "55852", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/55852" + "url": "http://www.securityfocus.com/bid/63916", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/63916" }, { - "name": "RHSA-2013:1762", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-1762.html" + "url": "http://www.securitytracker.com/id/1029390", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id/1029390" } ] } diff --git a/2013/4xxx/CVE-2013-4458.json b/2013/4xxx/CVE-2013-4458.json index 0a1ac560633..08a0629550e 100644 --- a/2013/4xxx/CVE-2013-4458.json +++ b/2013/4xxx/CVE-2013-4458.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "It was found that getaddrinfo() did not limit the amount of stack memory used during name resolution. An attacker able to make an application resolve an attacker-controlled hostname or IP address could possibly cause the application to exhaust all stack memory and crash." + "value": "Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6 address results. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1914." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Stack-based Buffer Overflow", - "cweId": "CWE-121" + "value": "n/a" } ] } @@ -32,16 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 6", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:2.12-1.149.el6", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -74,21 +73,6 @@ "refsource": "MISC", "name": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" }, - { - "url": "https://access.redhat.com/errata/RHSA-2014:1391", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2014:1391" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2013-4458", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2013-4458" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1022280", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1022280" - }, { "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=16072", "refsource": "MISC", @@ -100,30 +84,5 @@ "name": "https://sourceware.org/ml/libc-alpha/2013-10/msg00733.html" } ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "MEDIUM", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 4.3, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", - "version": "2.0" - } - ] } } \ No newline at end of file diff --git a/2013/4xxx/CVE-2013-4459.json b/2013/4xxx/CVE-2013-4459.json index 3ddf755ad7e..62b6e6be20b 100644 --- a/2013/4xxx/CVE-2013-4459.json +++ b/2013/4xxx/CVE-2013-4459.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4459", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "USN-2012-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-2012-1" - }, - { - "name": "https://bugs.launchpad.net/ubuntu/%2Bsource/lightdm/%2Bbug/1243339", + "url": "http://lists.freedesktop.org/archives/lightdm/2013-October/000471.html", "refsource": "MISC", - "url": "https://bugs.launchpad.net/ubuntu/%2Bsource/lightdm/%2Bbug/1243339" + "name": "http://lists.freedesktop.org/archives/lightdm/2013-October/000471.html" }, { - "name": "[LightDM] 20131030 lightdm 1.9.2 released", - "refsource": "MLIST", - "url": "http://lists.freedesktop.org/archives/lightdm/2013-October/000471.html" + "url": "http://lists.freedesktop.org/archives/lightdm/2013-October/000472.html", + "refsource": "MISC", + "name": "http://lists.freedesktop.org/archives/lightdm/2013-October/000472.html" }, { - "name": "[LightDM] 20131031 lightdm 1.8.4 released", - "refsource": "MLIST", - "url": "http://lists.freedesktop.org/archives/lightdm/2013-October/000472.html" + "url": "http://www.ubuntu.com/usn/USN-2012-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-2012-1" + }, + { + "url": "https://bugs.launchpad.net/ubuntu/%2Bsource/lightdm/%2Bbug/1243339", + "refsource": "MISC", + "name": "https://bugs.launchpad.net/ubuntu/%2Bsource/lightdm/%2Bbug/1243339" } ] } diff --git a/2013/4xxx/CVE-2013-4460.json b/2013/4xxx/CVE-2013-4460.json index 4930fdb1fb5..45bfe3d32f4 100644 --- a/2013/4xxx/CVE-2013-4460.json +++ b/2013/4xxx/CVE-2013-4460.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4460", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,32 +27,56 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://www.mantisbt.org/bugs/view.php?id=16513", - "refsource": "CONFIRM", - "url": "http://www.mantisbt.org/bugs/view.php?id=16513" + "url": "http://osvdb.org/98823", + "refsource": "MISC", + "name": "http://osvdb.org/98823" }, { - "name": "98823", - "refsource": "OSVDB", - "url": "http://osvdb.org/98823" + "url": "http://seclists.org/oss-sec/2013/q4/168", + "refsource": "MISC", + "name": "http://seclists.org/oss-sec/2013/q4/168" }, { - "name": "https://github.com/mantisbt/mantisbt/commit/0002d106a6cd35cb0a6fe03246531a4e3f32c9d0#diff-4122320b011a3291cd45da074a867076", - "refsource": "CONFIRM", - "url": "https://github.com/mantisbt/mantisbt/commit/0002d106a6cd35cb0a6fe03246531a4e3f32c9d0#diff-4122320b011a3291cd45da074a867076" + "url": "http://secunia.com/advisories/55305", + "refsource": "MISC", + "name": "http://secunia.com/advisories/55305" }, { - "name": "[oss-security] 20131022 Re: CVE Request: MantisBT before 1.2.16 XSS vulnerability", - "refsource": "MLIST", - "url": "http://seclists.org/oss-sec/2013/q4/168" + "url": "http://www.mantisbt.org/bugs/view.php?id=16513", + "refsource": "MISC", + "name": "http://www.mantisbt.org/bugs/view.php?id=16513" }, { - "name": "55305", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/55305" + "url": "https://github.com/mantisbt/mantisbt/commit/0002d106a6cd35cb0a6fe03246531a4e3f32c9d0#diff-4122320b011a3291cd45da074a867076", + "refsource": "MISC", + "name": "https://github.com/mantisbt/mantisbt/commit/0002d106a6cd35cb0a6fe03246531a4e3f32c9d0#diff-4122320b011a3291cd45da074a867076" } ] } diff --git a/2013/4xxx/CVE-2013-4461.json b/2013/4xxx/CVE-2013-4461.json index 75f4ce19f5f..a0b589723bd 100644 --- a/2013/4xxx/CVE-2013-4461.json +++ b/2013/4xxx/CVE-2013-4461.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4461", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,22 +27,46 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1016263", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1016263" + "url": "http://rhn.redhat.com/errata/RHSA-2013-1851.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-1851.html" }, { - "name": "RHSA-2013:1851", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-1851.html" + "url": "http://rhn.redhat.com/errata/RHSA-2013-1852.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-1852.html" }, { - "name": "RHSA-2013:1852", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-1852.html" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1016263", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1016263" } ] } diff --git a/2013/4xxx/CVE-2013-4463.json b/2013/4xxx/CVE-2013-4463.json index dfb7dd99ce2..2f65ca83f2d 100644 --- a/2013/4xxx/CVE-2013-4463.json +++ b/2013/4xxx/CVE-2013-4463.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4463", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "OpenStack Compute (Nova) Folsom, Grizzly, and Havana does not properly verify the virtual size of a QCOW2 image, which allows local users to cause a denial of service (host file system disk consumption) via a compressed QCOW2 image. NOTE: this issue is due to an incomplete fix for CVE-2013-2096." + "value": "OpenStack Compute (Nova) Folsom, Grizzly, and Havana does not properly verify the virtual size of a QCOW2 image, which allows local users to cause a denial of service (host file system disk consumption) via a compressed QCOW2 image. NOTE: this issue is due to an incomplete fix for CVE-2013-2096." } ] }, @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugs.launchpad.net/nova/+bug/1206081", - "refsource": "CONFIRM", - "url": "https://bugs.launchpad.net/nova/+bug/1206081" + "url": "http://rhn.redhat.com/errata/RHSA-2014-0112.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2014-0112.html" }, { - "name": "[oss-security] 20131031 [OSSA 2013-029] Potential Nova denial of service through compressed disk images (CVE-2013-4463, CVE-2013-4469)", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/10/31/3" + "url": "http://www.openwall.com/lists/oss-security/2013/10/31/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/10/31/3" }, { - "name": "USN-2247-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-2247-1" + "url": "http://www.ubuntu.com/usn/USN-2247-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-2247-1" }, { - "name": "RHSA-2014:0112", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2014-0112.html" + "url": "https://bugs.launchpad.net/nova/+bug/1206081", + "refsource": "MISC", + "name": "https://bugs.launchpad.net/nova/+bug/1206081" } ] } diff --git a/2013/4xxx/CVE-2013-4469.json b/2013/4xxx/CVE-2013-4469.json index 1fed71a5e50..fefe19a130f 100644 --- a/2013/4xxx/CVE-2013-4469.json +++ b/2013/4xxx/CVE-2013-4469.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4469", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "OpenStack Compute (Nova) Folsom, Grizzly, and Havana, when use_cow_images is set to False, does not verify the virtual size of a QCOW2 image, which allows local users to cause a denial of service (host file system disk consumption) by transferring an image with a large virtual size that does not contain a large amount of data from Glance. NOTE: this issue is due to an incomplete fix for CVE-2013-2096." + "value": "OpenStack Compute (Nova) Folsom, Grizzly, and Havana, when use_cow_images is set to False, does not verify the virtual size of a QCOW2 image, which allows local users to cause a denial of service (host file system disk consumption) by transferring an image with a large virtual size that does not contain a large amount of data from Glance. NOTE: this issue is due to an incomplete fix for CVE-2013-2096." } ] }, @@ -50,22 +27,46 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugs.launchpad.net/nova/+bug/1206081", - "refsource": "CONFIRM", - "url": "https://bugs.launchpad.net/nova/+bug/1206081" + "url": "http://www.openwall.com/lists/oss-security/2013/10/31/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/10/31/3" }, { - "name": "[oss-security] 20131031 [OSSA 2013-029] Potential Nova denial of service through compressed disk images (CVE-2013-4463, CVE-2013-4469)", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/10/31/3" + "url": "http://www.ubuntu.com/usn/USN-2247-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-2247-1" }, { - "name": "USN-2247-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-2247-1" + "url": "https://bugs.launchpad.net/nova/+bug/1206081", + "refsource": "MISC", + "name": "https://bugs.launchpad.net/nova/+bug/1206081" } ] }