"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-02-13 04:02:07 +00:00
parent 8f640a9f38
commit b48a1cda6c
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
30 changed files with 1556 additions and 1684 deletions

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4524", "ID": "CVE-2012-4524",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "xlockmore",
"product": {
"product_data": [
{
"product_name": "xlockmore",
"version": {
"version_data": [
{
"version_value": "< 5.43"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,17 +27,61 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "xlockmore",
"product": {
"product_data": [
{
"product_name": "xlockmore",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "< 5.43"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://security-tracker.debian.org/tracker/CVE-2012-4524", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091108.html",
"refsource": "MISC", "refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2012-4524" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091108.html"
}, },
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4524", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091150.html",
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4524" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091150.html"
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091709.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091709.html"
},
{
"url": "http://security.gentoo.org/glsa/glsa-201309-03.xml",
"refsource": "MISC",
"name": "http://security.gentoo.org/glsa/glsa-201309-03.xml"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/10/17/12",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/10/17/12"
},
{
"url": "http://www.securityfocus.com/bid/56169",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/56169"
}, },
{ {
"url": "https://access.redhat.com/security/cve/cve-2012-4524", "url": "https://access.redhat.com/security/cve/cve-2012-4524",
@ -68,39 +89,19 @@
"name": "https://access.redhat.com/security/cve/cve-2012-4524" "name": "https://access.redhat.com/security/cve/cve-2012-4524"
}, },
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4524",
"refsource": "MISC", "refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79558", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4524"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79558"
}, },
{ {
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79558",
"refsource": "MISC", "refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091108.html", "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79558"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091108.html"
}, },
{ {
"url": "https://security-tracker.debian.org/tracker/CVE-2012-4524",
"refsource": "MISC", "refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091150.html", "name": "https://security-tracker.debian.org/tracker/CVE-2012-4524"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091150.html"
},
{
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091709.html",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091709.html"
},
{
"refsource": "MISC",
"name": "http://security.gentoo.org/glsa/glsa-201309-03.xml",
"url": "http://security.gentoo.org/glsa/glsa-201309-03.xml"
},
{
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/10/17/12",
"url": "http://www.openwall.com/lists/oss-security/2012/10/17/12"
},
{
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/56169",
"url": "http://www.securityfocus.com/bid/56169"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4527", "ID": "CVE-2012-4527",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,52 +27,76 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "FEDORA-2012-17290", "vendor_name": "n/a",
"refsource": "FEDORA", "product": {
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091206.html" "product_data": [
},
{ {
"name": "openSUSE-SU-2012:1440", "product_name": "n/a",
"refsource": "SUSE", "version": {
"url": "http://lists.opensuse.org/opensuse-updates/2012-11/msg00003.html" "version_data": [
},
{ {
"name": "FEDORA-2012-17318", "version_affected": "=",
"refsource": "FEDORA", "version_value": "n/a"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091173.html" }
}, ]
{ }
"name": "FEDORA-2012-17339", }
"refsource": "FEDORA", ]
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091377.html" }
}, }
{ ]
"name": "56114", }
"refsource": "BID", },
"url": "http://www.securityfocus.com/bid/56114" "references": {
}, "reference_data": [
{ {
"name": "[oss-security] 20121018 Re: CVE Request -- mcrypt: stack-based buffer overflow by encryption / decryption of overly long file names", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091173.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2012/10/18/12" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091173.html"
}, },
{ {
"name": "[oss-security] 20121119 Re: CVE Request -- mcrypt: stack-based buffer overflow by encryption / decryption of overly long file names", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091206.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2012/11/20/1" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091206.html"
}, },
{ {
"name": "[oss-security] 20121018 CVE Request -- mcrypt: stack-based buffer overflow by encryption / decryption of overly long file names", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091377.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2012/10/18/9" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091377.html"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=867790", "url": "http://lists.opensuse.org/opensuse-updates/2012-11/msg00003.html",
"refsource": "MISC", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867790" "name": "http://lists.opensuse.org/opensuse-updates/2012-11/msg00003.html"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/10/18/12",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/10/18/12"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/10/18/9",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/10/18/9"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/11/20/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/11/20/1"
},
{
"url": "http://www.securityfocus.com/bid/56114",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/56114"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867790",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=867790"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4528", "ID": "CVE-2012-4528",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,57 +27,81 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "openSUSE-SU-2013:1342", "vendor_name": "n/a",
"refsource": "SUSE", "product": {
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html" "product_data": [
},
{ {
"name": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20121017-0_mod_security_ruleset_bypass.txt", "product_name": "n/a",
"refsource": "MISC", "version": {
"url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20121017-0_mod_security_ruleset_bypass.txt" "version_data": [
},
{ {
"name": "http://mod-security.svn.sourceforge.net/viewvc/mod-security?view=revision&sortby=date&revision=2081", "version_affected": "=",
"refsource": "CONFIRM", "version_value": "n/a"
"url": "http://mod-security.svn.sourceforge.net/viewvc/mod-security?view=revision&sortby=date&revision=2081" }
}, ]
{ }
"name": "openSUSE-SU-2013:1331", }
"refsource": "SUSE", ]
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html" }
}, }
{ ]
"name": "http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/branches/2.7.x/CHANGES", }
"refsource": "CONFIRM", },
"url": "http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/branches/2.7.x/CHANGES" "references": {
}, "reference_data": [
{ {
"name": "http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/trunk/apache2/msc_multipart.c?sortby=date&r1=2081&r2=2080&pathrev=2081", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/trunk/apache2/msc_multipart.c?sortby=date&r1=2081&r2=2080&pathrev=2081" "name": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html"
}, },
{ {
"name": "20121017 SEC Consult SA-20121017-0 :: ModSecurity multipart/invalid part ruleset bypass", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html",
"refsource": "FULLDISC", "refsource": "MISC",
"url": "http://seclists.org/fulldisclosure/2012/Oct/113" "name": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html"
}, },
{ {
"name": "FEDORA-2012-18278", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html",
"refsource": "FEDORA", "refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093011.html" "name": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html"
}, },
{ {
"name": "[oss-security] 20121018 Re: CVE request: Fwd: [Full-disclosure] SEC Consult SA-20121017-0 :: ModSecurity multipart/invalid part ruleset bypass", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093011.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2012/10/18/14" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093011.html"
}, },
{ {
"name": "openSUSE-SU-2013:1336", "url": "http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/branches/2.7.x/CHANGES",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html" "name": "http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/branches/2.7.x/CHANGES"
},
{
"url": "http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/trunk/apache2/msc_multipart.c?sortby=date&r1=2081&r2=2080&pathrev=2081",
"refsource": "MISC",
"name": "http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/trunk/apache2/msc_multipart.c?sortby=date&r1=2081&r2=2080&pathrev=2081"
},
{
"url": "http://mod-security.svn.sourceforge.net/viewvc/mod-security?view=revision&sortby=date&revision=2081",
"refsource": "MISC",
"name": "http://mod-security.svn.sourceforge.net/viewvc/mod-security?view=revision&sortby=date&revision=2081"
},
{
"url": "http://seclists.org/fulldisclosure/2012/Oct/113",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2012/Oct/113"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/10/18/14",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/10/18/14"
},
{
"url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20121017-0_mod_security_ruleset_bypass.txt",
"refsource": "MISC",
"name": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20121017-0_mod_security_ruleset_bypass.txt"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4530", "ID": "CVE-2012-4530",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,42 +27,66 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "RHSA-2013:0223", "vendor_name": "n/a",
"refsource": "REDHAT", "product": {
"url": "http://rhn.redhat.com/errata/RHSA-2013-0223.html" "product_data": [
},
{ {
"name": "[oss-security] 20121019 Re: CVE Request -- kernel stack disclosure in binfmt_script load_script()", "product_name": "n/a",
"refsource": "MLIST", "version": {
"url": "http://www.openwall.com/lists/oss-security/2012/10/19/3" "version_data": [
},
{ {
"name": "https://github.com/torvalds/linux/commit/b66c5984017533316fd1951770302649baf1aa33", "version_affected": "=",
"refsource": "CONFIRM", "version_value": "n/a"
"url": "https://github.com/torvalds/linux/commit/b66c5984017533316fd1951770302649baf1aa33" }
}, ]
{ }
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.2", }
"refsource": "CONFIRM", ]
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.2" }
}, }
{ ]
"name": "SUSE-SU-2013:0674", }
"refsource": "SUSE", },
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html" "references": {
}, "reference_data": [
{ {
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b66c5984017533316fd1951770302649baf1aa33", "url": "http://rhn.redhat.com/errata/RHSA-2013-0223.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b66c5984017533316fd1951770302649baf1aa33" "name": "http://rhn.redhat.com/errata/RHSA-2013-0223.html"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=868285", "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.2",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=868285" "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.2"
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b66c5984017533316fd1951770302649baf1aa33",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b66c5984017533316fd1951770302649baf1aa33"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/10/19/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/10/19/3"
},
{
"url": "https://github.com/torvalds/linux/commit/b66c5984017533316fd1951770302649baf1aa33",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/b66c5984017533316fd1951770302649baf1aa33"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=868285",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=868285"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4534", "ID": "CVE-2012-4534",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,112 +27,126 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "SSRT101139", "vendor_name": "n/a",
"refsource": "HP", "product": {
"url": "http://marc.info/?l=bugtraq&m=136612293908376&w=2" "product_data": [
},
{ {
"name": "http://svn.apache.org/viewvc?view=revision&revision=1340218", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "http://svn.apache.org/viewvc?view=revision&revision=1340218" "version_data": [
},
{ {
"name": "openSUSE-SU-2013:0161", "version_affected": "=",
"refsource": "SUSE", "version_value": "n/a"
"url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00051.html" }
}, ]
{ }
"name": "USN-1685-1", }
"refsource": "UBUNTU", ]
"url": "http://www.ubuntu.com/usn/USN-1685-1" }
}, }
{ ]
"name": "1027836", }
"refsource": "SECTRACK", },
"url": "http://www.securitytracker.com/id?1027836" "references": {
}, "reference_data": [
{ {
"name": "openSUSE-SU-2013:0192", "url": "http://tomcat.apache.org/security-6.html",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00080.html" "name": "http://tomcat.apache.org/security-6.html"
}, },
{ {
"name": "SSRT101182", "url": "http://tomcat.apache.org/security-7.html",
"refsource": "HP", "refsource": "MISC",
"url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03748878" "name": "http://tomcat.apache.org/security-7.html"
}, },
{ {
"name": "https://issues.apache.org/bugzilla/show_bug.cgi?id=52858", "url": "http://marc.info/?l=bugtraq&m=139344343412337&w=2",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=52858" "name": "http://marc.info/?l=bugtraq&m=139344343412337&w=2"
}, },
{ {
"name": "openSUSE-SU-2013:0170", "url": "http://secunia.com/advisories/57126",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00061.html" "name": "http://secunia.com/advisories/57126"
}, },
{ {
"name": "http://tomcat.apache.org/security-7.html", "url": "http://marc.info/?l=bugtraq&m=136612293908376&w=2",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://tomcat.apache.org/security-7.html" "name": "http://marc.info/?l=bugtraq&m=136612293908376&w=2"
}, },
{ {
"name": "HPSBMU02873", "url": "http://rhn.redhat.com/errata/RHSA-2013-0623.html",
"refsource": "HP", "refsource": "MISC",
"url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03748878" "name": "http://rhn.redhat.com/errata/RHSA-2013-0623.html"
}, },
{ {
"name": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/tomcat/util/net/NioEndpoint.java?r1=1340218&r2=1340217&pathrev=1340218", "url": "http://www.ubuntu.com/usn/USN-1685-1",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/tomcat/util/net/NioEndpoint.java?r1=1340218&r2=1340217&pathrev=1340218" "name": "http://www.ubuntu.com/usn/USN-1685-1"
}, },
{ {
"name": "http://tomcat.apache.org/security-6.html", "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03748878",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://tomcat.apache.org/security-6.html" "name": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03748878"
}, },
{ {
"name": "57126", "url": "http://archives.neohapsis.com/archives/bugtraq/2012-12/0043.html",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/57126" "name": "http://archives.neohapsis.com/archives/bugtraq/2012-12/0043.html"
}, },
{ {
"name": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/webapps/docs/changelog.xml?r1=1340218&r2=1340217&pathrev=1340218", "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00051.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/webapps/docs/changelog.xml?r1=1340218&r2=1340217&pathrev=1340218" "name": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00051.html"
}, },
{ {
"name": "RHSA-2013:0623", "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00061.html",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0623.html" "name": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00061.html"
}, },
{ {
"name": "20121204 CVE-2012-4534 Apache Tomcat denial of service", "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00080.html",
"refsource": "BUGTRAQ", "refsource": "MISC",
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-12/0043.html" "name": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00080.html"
}, },
{ {
"name": "oval:org.mitre.oval:def:19398", "url": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/tomcat/util/net/NioEndpoint.java?r1=1340218&r2=1340217&pathrev=1340218",
"refsource": "OVAL", "refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19398" "name": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/tomcat/util/net/NioEndpoint.java?r1=1340218&r2=1340217&pathrev=1340218"
}, },
{ {
"name": "56813", "url": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/webapps/docs/changelog.xml?r1=1340218&r2=1340217&pathrev=1340218",
"refsource": "BID", "refsource": "MISC",
"url": "http://www.securityfocus.com/bid/56813" "name": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/webapps/docs/changelog.xml?r1=1340218&r2=1340217&pathrev=1340218"
}, },
{ {
"name": "HPSBUX02866", "url": "http://svn.apache.org/viewvc?view=revision&revision=1340218",
"refsource": "HP", "refsource": "MISC",
"url": "http://marc.info/?l=bugtraq&m=136612293908376&w=2" "name": "http://svn.apache.org/viewvc?view=revision&revision=1340218"
}, },
{ {
"name": "HPSBST02955", "url": "http://www.securityfocus.com/bid/56813",
"refsource": "HP", "refsource": "MISC",
"url": "http://marc.info/?l=bugtraq&m=139344343412337&w=2" "name": "http://www.securityfocus.com/bid/56813"
},
{
"url": "http://www.securitytracker.com/id?1027836",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1027836"
},
{
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=52858",
"refsource": "MISC",
"name": "https://issues.apache.org/bugzilla/show_bug.cgi?id=52858"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19398",
"refsource": "MISC",
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19398"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4535", "ID": "CVE-2012-4535",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,122 +27,146 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "RHSA-2012:1540", "vendor_name": "n/a",
"refsource": "REDHAT", "product": {
"url": "http://rhn.redhat.com/errata/RHSA-2012-1540.html" "product_data": [
},
{ {
"name": "SUSE-SU-2014:0470", "product_name": "n/a",
"refsource": "SUSE", "version": {
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" "version_data": [
},
{ {
"name": "55082", "version_affected": "=",
"refsource": "SECUNIA", "version_value": "n/a"
"url": "http://secunia.com/advisories/55082" }
}, ]
{ }
"name": "1027759", }
"refsource": "SECTRACK", ]
"url": "http://www.securitytracker.com/id?1027759" }
}, }
{ ]
"name": "[Xen-announce] 20121113 Xen Security Advisory 20 (CVE-2012-4535) - Timer overflow DoS vulnerability", }
"refsource": "MLIST", },
"url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00001.html" "references": {
}, "reference_data": [
{ {
"name": "51413", "url": "http://secunia.com/advisories/55082",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/51413" "name": "http://secunia.com/advisories/55082"
}, },
{ {
"name": "51200", "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/51200" "name": "http://security.gentoo.org/glsa/glsa-201309-24.xml"
}, },
{ {
"name": "GLSA-201309-24", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html",
"refsource": "GENTOO", "refsource": "MISC",
"url": "http://security.gentoo.org/glsa/glsa-201309-24.xml" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html"
}, },
{ {
"name": "DSA-2582", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html",
"refsource": "DEBIAN", "refsource": "MISC",
"url": "http://www.debian.org/security/2012/dsa-2582" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html"
}, },
{ {
"name": "87298", "url": "http://secunia.com/advisories/51413",
"refsource": "OSVDB", "refsource": "MISC",
"url": "http://osvdb.org/87298" "name": "http://secunia.com/advisories/51413"
}, },
{ {
"name": "SUSE-SU-2012:1486", "url": "https://security.gentoo.org/glsa/201604-03",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" "name": "https://security.gentoo.org/glsa/201604-03"
}, },
{ {
"name": "[oss-security] 20121113 Xen Security Advisory 20 (CVE-2012-4535) - Timer overflow DoS vulnerability", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2012/11/13/1" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html"
}, },
{ {
"name": "openSUSE-SU-2012:1572", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html"
}, },
{ {
"name": "51468", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/51468" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html"
}, },
{ {
"name": "xen-vcpu-dos(80022)", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html",
"refsource": "XF", "refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80022" "name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
}, },
{ {
"name": "SUSE-SU-2012:1487", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" "name": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html"
}, },
{ {
"name": "SUSE-SU-2014:0446", "url": "http://rhn.redhat.com/errata/RHSA-2012-1540.html",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" "name": "http://rhn.redhat.com/errata/RHSA-2012-1540.html"
}, },
{ {
"name": "51352", "url": "http://secunia.com/advisories/51200",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/51352" "name": "http://secunia.com/advisories/51200"
}, },
{ {
"name": "51324", "url": "http://secunia.com/advisories/51324",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/51324" "name": "http://secunia.com/advisories/51324"
}, },
{ {
"name": "GLSA-201604-03", "url": "http://secunia.com/advisories/51352",
"refsource": "GENTOO", "refsource": "MISC",
"url": "https://security.gentoo.org/glsa/201604-03" "name": "http://secunia.com/advisories/51352"
}, },
{ {
"name": "56498", "url": "http://secunia.com/advisories/51468",
"refsource": "BID", "refsource": "MISC",
"url": "http://www.securityfocus.com/bid/56498" "name": "http://secunia.com/advisories/51468"
}, },
{ {
"name": "SUSE-SU-2012:1615", "url": "http://www.debian.org/security/2012/dsa-2582",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" "name": "http://www.debian.org/security/2012/dsa-2582"
}, },
{ {
"name": "openSUSE-SU-2012:1573", "url": "http://www.securityfocus.com/bid/56498",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" "name": "http://www.securityfocus.com/bid/56498"
},
{
"url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00001.html",
"refsource": "MISC",
"name": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00001.html"
},
{
"url": "http://osvdb.org/87298",
"refsource": "MISC",
"name": "http://osvdb.org/87298"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/11/13/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/11/13/1"
},
{
"url": "http://www.securitytracker.com/id?1027759",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1027759"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80022",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80022"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4536", "ID": "CVE-2012-4536",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,92 +27,116 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "55082", "vendor_name": "n/a",
"refsource": "SECUNIA", "product": {
"url": "http://secunia.com/advisories/55082" "product_data": [
},
{ {
"name": "51413", "product_name": "n/a",
"refsource": "SECUNIA", "version": {
"url": "http://secunia.com/advisories/51413" "version_data": [
},
{ {
"name": "51200", "version_affected": "=",
"refsource": "SECUNIA", "version_value": "n/a"
"url": "http://secunia.com/advisories/51200" }
}, ]
{ }
"name": "GLSA-201309-24", }
"refsource": "GENTOO", ]
"url": "http://security.gentoo.org/glsa/glsa-201309-24.xml" }
}, }
{ ]
"name": "SUSE-SU-2012:1486", }
"refsource": "SUSE", },
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" "references": {
}, "reference_data": [
{ {
"name": "xen-domainpirqtoemuirq-dos(80023)", "url": "http://secunia.com/advisories/55082",
"refsource": "XF", "refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80023" "name": "http://secunia.com/advisories/55082"
}, },
{ {
"name": "[Xen-announce] 20121113 Xen Security Advisory 21 (CVE-2012-4536) - pirq range check DoS vulnerability", "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00003.html" "name": "http://security.gentoo.org/glsa/glsa-201309-24.xml"
}, },
{ {
"name": "[oss-security] 20121113 Xen Security Advisory 21 (CVE-2012-4536) - pirq range check DoS vulnerability", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2012/11/13/2" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html"
}, },
{ {
"name": "1027760", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html",
"refsource": "SECTRACK", "refsource": "MISC",
"url": "http://www.securitytracker.com/id?1027760" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html"
}, },
{ {
"name": "87297", "url": "http://secunia.com/advisories/51413",
"refsource": "OSVDB", "refsource": "MISC",
"url": "http://osvdb.org/87297" "name": "http://secunia.com/advisories/51413"
}, },
{ {
"name": "openSUSE-SU-2012:1572", "url": "https://security.gentoo.org/glsa/201604-03",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" "name": "https://security.gentoo.org/glsa/201604-03"
}, },
{ {
"name": "SUSE-SU-2012:1487", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html"
}, },
{ {
"name": "51352", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/51352" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html"
}, },
{ {
"name": "51324", "url": "http://secunia.com/advisories/51200",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/51324" "name": "http://secunia.com/advisories/51200"
}, },
{ {
"name": "GLSA-201604-03", "url": "http://secunia.com/advisories/51324",
"refsource": "GENTOO", "refsource": "MISC",
"url": "https://security.gentoo.org/glsa/201604-03" "name": "http://secunia.com/advisories/51324"
}, },
{ {
"name": "56498", "url": "http://secunia.com/advisories/51352",
"refsource": "BID", "refsource": "MISC",
"url": "http://www.securityfocus.com/bid/56498" "name": "http://secunia.com/advisories/51352"
}, },
{ {
"name": "openSUSE-SU-2012:1573", "url": "http://www.securityfocus.com/bid/56498",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" "name": "http://www.securityfocus.com/bid/56498"
},
{
"url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00003.html",
"refsource": "MISC",
"name": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00003.html"
},
{
"url": "http://osvdb.org/87297",
"refsource": "MISC",
"name": "http://osvdb.org/87297"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/11/13/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/11/13/2"
},
{
"url": "http://www.securitytracker.com/id?1027760",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1027760"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80023",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80023"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4537", "ID": "CVE-2012-4537",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,122 +27,146 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "RHSA-2012:1540", "vendor_name": "n/a",
"refsource": "REDHAT", "product": {
"url": "http://rhn.redhat.com/errata/RHSA-2012-1540.html" "product_data": [
},
{ {
"name": "SUSE-SU-2014:0470", "product_name": "n/a",
"refsource": "SUSE", "version": {
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" "version_data": [
},
{ {
"name": "55082", "version_affected": "=",
"refsource": "SECUNIA", "version_value": "n/a"
"url": "http://secunia.com/advisories/55082" }
}, ]
{ }
"name": "xen-setp2mentry-dos(80024)", }
"refsource": "XF", ]
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80024" }
}, }
{ ]
"name": "[oss-security] 20121113 Xen Security Advisory 22 (CVE-2012-4537) - Memory mapping failure DoS vulnerability", }
"refsource": "MLIST", },
"url": "http://www.openwall.com/lists/oss-security/2012/11/13/6" "references": {
}, "reference_data": [
{ {
"name": "51413", "url": "http://secunia.com/advisories/55082",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/51413" "name": "http://secunia.com/advisories/55082"
}, },
{ {
"name": "51200", "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/51200" "name": "http://security.gentoo.org/glsa/glsa-201309-24.xml"
}, },
{ {
"name": "GLSA-201309-24", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html",
"refsource": "GENTOO", "refsource": "MISC",
"url": "http://security.gentoo.org/glsa/glsa-201309-24.xml" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html"
}, },
{ {
"name": "DSA-2582", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html",
"refsource": "DEBIAN", "refsource": "MISC",
"url": "http://www.debian.org/security/2012/dsa-2582" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html"
}, },
{ {
"name": "SUSE-SU-2012:1486", "url": "http://secunia.com/advisories/51413",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" "name": "http://secunia.com/advisories/51413"
}, },
{ {
"name": "[Xen-announce] 20121113 Xen Security Advisory 22 (CVE-2012-4537) - Memory mapping failure DoS vulnerability", "url": "https://security.gentoo.org/glsa/201604-03",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00005.html" "name": "https://security.gentoo.org/glsa/201604-03"
}, },
{ {
"name": "openSUSE-SU-2012:1572", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html"
}, },
{ {
"name": "51468", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/51468" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html"
}, },
{ {
"name": "SUSE-SU-2012:1487", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html"
}, },
{ {
"name": "SUSE-SU-2014:0446", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" "name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
}, },
{ {
"name": "51352", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/51352" "name": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html"
}, },
{ {
"name": "51324", "url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00005.html",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/51324" "name": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00005.html"
}, },
{ {
"name": "GLSA-201604-03", "url": "http://osvdb.org/87307",
"refsource": "GENTOO", "refsource": "MISC",
"url": "https://security.gentoo.org/glsa/201604-03" "name": "http://osvdb.org/87307"
}, },
{ {
"name": "56498", "url": "http://rhn.redhat.com/errata/RHSA-2012-1540.html",
"refsource": "BID", "refsource": "MISC",
"url": "http://www.securityfocus.com/bid/56498" "name": "http://rhn.redhat.com/errata/RHSA-2012-1540.html"
}, },
{ {
"name": "SUSE-SU-2012:1615", "url": "http://secunia.com/advisories/51200",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" "name": "http://secunia.com/advisories/51200"
}, },
{ {
"name": "openSUSE-SU-2012:1573", "url": "http://secunia.com/advisories/51324",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" "name": "http://secunia.com/advisories/51324"
}, },
{ {
"name": "87307", "url": "http://secunia.com/advisories/51352",
"refsource": "OSVDB", "refsource": "MISC",
"url": "http://osvdb.org/87307" "name": "http://secunia.com/advisories/51352"
}, },
{ {
"name": "1027761", "url": "http://secunia.com/advisories/51468",
"refsource": "SECTRACK", "refsource": "MISC",
"url": "http://www.securitytracker.com/id?1027761" "name": "http://secunia.com/advisories/51468"
},
{
"url": "http://www.debian.org/security/2012/dsa-2582",
"refsource": "MISC",
"name": "http://www.debian.org/security/2012/dsa-2582"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/11/13/6",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/11/13/6"
},
{
"url": "http://www.securityfocus.com/bid/56498",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/56498"
},
{
"url": "http://www.securitytracker.com/id?1027761",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1027761"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80024",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80024"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4538", "ID": "CVE-2012-4538",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,112 +27,136 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "55082", "vendor_name": "n/a",
"refsource": "SECUNIA", "product": {
"url": "http://secunia.com/advisories/55082" "product_data": [
},
{ {
"name": "51413", "product_name": "n/a",
"refsource": "SECUNIA", "version": {
"url": "http://secunia.com/advisories/51413" "version_data": [
},
{ {
"name": "51200", "version_affected": "=",
"refsource": "SECUNIA", "version_value": "n/a"
"url": "http://secunia.com/advisories/51200" }
}, ]
{ }
"name": "1027762", }
"refsource": "SECTRACK", ]
"url": "http://www.securitytracker.com/id?1027762" }
}, }
{ ]
"name": "GLSA-201309-24", }
"refsource": "GENTOO", },
"url": "http://security.gentoo.org/glsa/glsa-201309-24.xml" "references": {
}, "reference_data": [
{ {
"name": "DSA-2582", "url": "http://secunia.com/advisories/55082",
"refsource": "DEBIAN", "refsource": "MISC",
"url": "http://www.debian.org/security/2012/dsa-2582" "name": "http://secunia.com/advisories/55082"
}, },
{ {
"name": "SUSE-SU-2012:1486", "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" "name": "http://security.gentoo.org/glsa/glsa-201309-24.xml"
}, },
{ {
"name": "87306", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html",
"refsource": "OSVDB", "refsource": "MISC",
"url": "http://osvdb.org/87306" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html"
}, },
{ {
"name": "openSUSE-SU-2012:1572", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html"
}, },
{ {
"name": "51468", "url": "http://secunia.com/advisories/51413",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/51468" "name": "http://secunia.com/advisories/51413"
}, },
{ {
"name": "SUSE-SU-2012:1487", "url": "https://security.gentoo.org/glsa/201604-03",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" "name": "https://security.gentoo.org/glsa/201604-03"
}, },
{ {
"name": "xen-hvmop-dos(80025)", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html",
"refsource": "XF", "refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80025" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html"
}, },
{ {
"name": "SUSE-SU-2014:0446", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html"
}, },
{ {
"name": "51352", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/51352" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html"
}, },
{ {
"name": "51324", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/51324" "name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
}, },
{ {
"name": "GLSA-201604-03", "url": "http://secunia.com/advisories/51200",
"refsource": "GENTOO", "refsource": "MISC",
"url": "https://security.gentoo.org/glsa/201604-03" "name": "http://secunia.com/advisories/51200"
}, },
{ {
"name": "[oss-security] 20121113 Xen Security Advisory 23 (CVE-2012-4538) - Unhooking empty PAE entries DoS vulnerability", "url": "http://secunia.com/advisories/51324",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2012/11/13/3" "name": "http://secunia.com/advisories/51324"
}, },
{ {
"name": "56498", "url": "http://secunia.com/advisories/51352",
"refsource": "BID", "refsource": "MISC",
"url": "http://www.securityfocus.com/bid/56498" "name": "http://secunia.com/advisories/51352"
}, },
{ {
"name": "SUSE-SU-2012:1615", "url": "http://secunia.com/advisories/51468",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" "name": "http://secunia.com/advisories/51468"
}, },
{ {
"name": "openSUSE-SU-2012:1573", "url": "http://www.debian.org/security/2012/dsa-2582",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" "name": "http://www.debian.org/security/2012/dsa-2582"
}, },
{ {
"name": "[Xen-announce] 20121113 Xen Security Advisory 23 (CVE-2012-4538) - Unhooking empty PAE entries DoS vulnerability", "url": "http://www.securityfocus.com/bid/56498",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00004.html" "name": "http://www.securityfocus.com/bid/56498"
},
{
"url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00004.html",
"refsource": "MISC",
"name": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00004.html"
},
{
"url": "http://osvdb.org/87306",
"refsource": "MISC",
"name": "http://osvdb.org/87306"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/11/13/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/11/13/3"
},
{
"url": "http://www.securitytracker.com/id?1027762",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1027762"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80025",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80025"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4544", "ID": "CVE-2012-4544",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,112 +27,136 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "SUSE-SU-2014:0470", "vendor_name": "n/a",
"refsource": "SUSE", "product": {
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" "product_data": [
},
{ {
"name": "51071", "product_name": "n/a",
"refsource": "SECUNIA", "version": {
"url": "http://secunia.com/advisories/51071" "version_data": [
},
{ {
"name": "[oss-security] 20121026 Xen Security Advisory 25 (CVE-2012-4544) - Xen domain builder Out-of-memory due to malicious kernel/ramdisk", "version_affected": "=",
"refsource": "MLIST", "version_value": "n/a"
"url": "http://www.openwall.com/lists/oss-security/2012/10/26/3" }
}, ]
{ }
"name": "FEDORA-2012-17408", }
"refsource": "FEDORA", ]
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091832.html" }
}, }
{ ]
"name": "51413", }
"refsource": "SECUNIA", },
"url": "http://secunia.com/advisories/51413" "references": {
}, "reference_data": [
{ {
"name": "FEDORA-2012-17204", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html",
"refsource": "FEDORA", "refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091844.html" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html"
}, },
{ {
"name": "SUSE-SU-2012:1486", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html"
}, },
{ {
"name": "DSA-2636", "url": "http://secunia.com/advisories/51413",
"refsource": "DEBIAN", "refsource": "MISC",
"url": "http://www.debian.org/security/2013/dsa-2636" "name": "http://secunia.com/advisories/51413"
}, },
{ {
"name": "xen-pvdomainbuilder-dos(79617)", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html",
"refsource": "XF", "refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79617" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html"
}, },
{ {
"name": "FEDORA-2012-17135", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html",
"refsource": "FEDORA", "refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092050.html" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html"
}, },
{ {
"name": "56289", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html",
"refsource": "BID", "refsource": "MISC",
"url": "http://www.securityfocus.com/bid/56289" "name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
}, },
{ {
"name": "1027699", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html",
"refsource": "SECTRACK", "refsource": "MISC",
"url": "http://www.securitytracker.com/id?1027699" "name": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html"
}, },
{ {
"name": "RHSA-2013:0241", "url": "http://secunia.com/advisories/51324",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0241.html" "name": "http://secunia.com/advisories/51324"
}, },
{ {
"name": "openSUSE-SU-2012:1572", "url": "http://secunia.com/advisories/51352",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" "name": "http://secunia.com/advisories/51352"
}, },
{ {
"name": "86619", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091832.html",
"refsource": "OSVDB", "refsource": "MISC",
"url": "http://osvdb.org/86619" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091832.html"
}, },
{ {
"name": "SUSE-SU-2012:1487", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091844.html",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091844.html"
}, },
{ {
"name": "SUSE-SU-2014:0446", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092050.html",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092050.html"
}, },
{ {
"name": "51352", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/51352" "name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html"
}, },
{ {
"name": "51324", "url": "http://osvdb.org/86619",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/51324" "name": "http://osvdb.org/86619"
}, },
{ {
"name": "SUSE-SU-2014:0411", "url": "http://rhn.redhat.com/errata/RHSA-2013-0241.html",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html" "name": "http://rhn.redhat.com/errata/RHSA-2013-0241.html"
}, },
{ {
"name": "openSUSE-SU-2012:1573", "url": "http://secunia.com/advisories/51071",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" "name": "http://secunia.com/advisories/51071"
},
{
"url": "http://www.debian.org/security/2013/dsa-2636",
"refsource": "MISC",
"name": "http://www.debian.org/security/2013/dsa-2636"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/10/26/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/10/26/3"
},
{
"url": "http://www.securityfocus.com/bid/56289",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/56289"
},
{
"url": "http://www.securitytracker.com/id?1027699",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1027699"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79617",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79617"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1953", "ID": "CVE-2013-1953",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,22 +27,46 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=951257", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=951257" "product_data": [
},
{ {
"name": "[oss-security] 20130316 Re: autotrace: stack-based buffer overflow in bmp parser", "product_name": "n/a",
"refsource": "MLIST", "version": {
"url": "http://www.openwall.com/lists/oss-security/2013/04/16/3" "version_data": [
},
{ {
"name": "MDVSA-2013:190", "version_affected": "=",
"refsource": "MANDRIVA", "version_value": "n/a"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:190" }
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:190",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:190"
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/04/16/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/04/16/3"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=951257",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=951257"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1957", "ID": "CVE-2013-1957",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,27 +27,51 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=132c94e31b8bca8ea921f9f96a57d684fa4ae0a9", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=132c94e31b8bca8ea921f9f96a57d684fa4ae0a9" "product_data": [
},
{ {
"name": "[oss-security] 20130416 Re: Re: Summary of security bugs (now fixed) in user namespaces", "product_name": "n/a",
"refsource": "MLIST", "version": {
"url": "http://www.openwall.com/lists/oss-security/2013/04/16/11" "version_data": [
},
{ {
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.6", "version_affected": "=",
"refsource": "CONFIRM", "version_value": "n/a"
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.6" }
}, ]
{ }
"name": "https://github.com/torvalds/linux/commit/132c94e31b8bca8ea921f9f96a57d684fa4ae0a9", }
"refsource": "CONFIRM", ]
"url": "https://github.com/torvalds/linux/commit/132c94e31b8bca8ea921f9f96a57d684fa4ae0a9" }
}
]
}
},
"references": {
"reference_data": [
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=132c94e31b8bca8ea921f9f96a57d684fa4ae0a9",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=132c94e31b8bca8ea921f9f96a57d684fa4ae0a9"
},
{
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.6",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.6"
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/04/16/11",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/04/16/11"
},
{
"url": "https://github.com/torvalds/linux/commit/132c94e31b8bca8ea921f9f96a57d684fa4ae0a9",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/132c94e31b8bca8ea921f9f96a57d684fa4ae0a9"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1958", "ID": "CVE-2013-1958",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,27 +27,51 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=92f28d973cce45ef5823209aab3138eb45d8b349", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=92f28d973cce45ef5823209aab3138eb45d8b349" "product_data": [
},
{ {
"name": "[oss-security] 20130416 Re: Re: Summary of security bugs (now fixed) in user namespaces", "product_name": "n/a",
"refsource": "MLIST", "version": {
"url": "http://www.openwall.com/lists/oss-security/2013/04/16/11" "version_data": [
},
{ {
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.6", "version_affected": "=",
"refsource": "CONFIRM", "version_value": "n/a"
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.6" }
}, ]
{ }
"name": "https://github.com/torvalds/linux/commit/92f28d973cce45ef5823209aab3138eb45d8b349", }
"refsource": "CONFIRM", ]
"url": "https://github.com/torvalds/linux/commit/92f28d973cce45ef5823209aab3138eb45d8b349" }
}
]
}
},
"references": {
"reference_data": [
{
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.6",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.6"
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/04/16/11",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/04/16/11"
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=92f28d973cce45ef5823209aab3138eb45d8b349",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=92f28d973cce45ef5823209aab3138eb45d8b349"
},
{
"url": "https://github.com/torvalds/linux/commit/92f28d973cce45ef5823209aab3138eb45d8b349",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/92f28d973cce45ef5823209aab3138eb45d8b349"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1959", "ID": "CVE-2013-1959",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,42 +27,66 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "https://github.com/torvalds/linux/commit/e3211c120a85b792978bcb4be7b2886df18d27f0", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "https://github.com/torvalds/linux/commit/e3211c120a85b792978bcb4be7b2886df18d27f0" "product_data": [
},
{ {
"name": "https://github.com/torvalds/linux/commit/6708075f104c3c9b04b23336bb0366ca30c3931b", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "https://github.com/torvalds/linux/commit/6708075f104c3c9b04b23336bb0366ca30c3931b" "version_data": [
},
{ {
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6708075f104c3c9b04b23336bb0366ca30c3931b", "version_affected": "=",
"refsource": "CONFIRM", "version_value": "n/a"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6708075f104c3c9b04b23336bb0366ca30c3931b" }
}, ]
{ }
"name": "[oss-security] 20130428 Multiple Linux setuid output redirection vulnerabilities", }
"refsource": "MLIST", ]
"url": "http://www.openwall.com/lists/oss-security/2013/04/29/1" }
}, }
{ ]
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.9", }
"refsource": "CONFIRM", },
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.9" "references": {
}, "reference_data": [
{ {
"name": "25307", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6708075f104c3c9b04b23336bb0366ca30c3931b",
"refsource": "EXPLOIT-DB", "refsource": "MISC",
"url": "http://www.exploit-db.com/exploits/25307" "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6708075f104c3c9b04b23336bb0366ca30c3931b"
}, },
{ {
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e3211c120a85b792978bcb4be7b2886df18d27f0", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e3211c120a85b792978bcb4be7b2886df18d27f0",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e3211c120a85b792978bcb4be7b2886df18d27f0" "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e3211c120a85b792978bcb4be7b2886df18d27f0"
},
{
"url": "http://www.exploit-db.com/exploits/25307",
"refsource": "MISC",
"name": "http://www.exploit-db.com/exploits/25307"
},
{
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.9",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.9"
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/04/29/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/04/29/1"
},
{
"url": "https://github.com/torvalds/linux/commit/6708075f104c3c9b04b23336bb0366ca30c3931b",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/6708075f104c3c9b04b23336bb0366ca30c3931b"
},
{
"url": "https://github.com/torvalds/linux/commit/e3211c120a85b792978bcb4be7b2886df18d27f0",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/e3211c120a85b792978bcb4be7b2886df18d27f0"
} }
] ]
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "CVE-2013-1960 libtiff (tiff2pdf): Heap-based buffer overflow in t2_process_jpeg_strip()" "value": "Heap-based buffer overflow in the t2p_process_jpeg_strip function in tiff2pdf in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image file."
} }
] ]
}, },
@ -21,8 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "Heap-based Buffer Overflow", "value": "n/a"
"cweId": "CWE-122"
} }
] ]
} }
@ -32,27 +31,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "n/a",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "Red Hat Enterprise Linux 5", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "0:3.8.2-19.el5_10", "version_affected": "=",
"version_affected": "!" "version_value": "n/a"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:3.9.4-10.el6_5",
"version_affected": "!"
} }
] ]
} }
@ -115,56 +103,16 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.debian.org/security/2013/dsa-2698" "name": "http://www.debian.org/security/2013/dsa-2698"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2014:0222",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2014:0222"
},
{
"url": "https://access.redhat.com/errata/RHSA-2014:0223",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2014:0223"
},
{ {
"url": "http://www.securityfocus.com/bid/59609", "url": "http://www.securityfocus.com/bid/59609",
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.securityfocus.com/bid/59609" "name": "http://www.securityfocus.com/bid/59609"
}, },
{
"url": "https://access.redhat.com/security/cve/CVE-2013-1960",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2013-1960"
},
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952158",
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=952158" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=952158"
} }
] ]
},
"impact": {
"cvss": [
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.1,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
} }
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "CVE-2013-1961 libtiff (tiff2pdf): Stack-based buffer overflow with malformed image-length and resolution" "value": "Stack-based buffer overflow in the t2p_write_pdf_page function in tiff2pdf in libtiff before 4.0.3 allows remote attackers to cause a denial of service (application crash) via a crafted image length and resolution in a TIFF image file."
} }
] ]
}, },
@ -21,8 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "Stack-based Buffer Overflow", "value": "n/a"
"cweId": "CWE-121"
} }
] ]
} }
@ -32,27 +31,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "n/a",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "Red Hat Enterprise Linux 5", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "0:3.8.2-19.el5_10", "version_affected": "=",
"version_affected": "!" "version_value": "n/a"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:3.9.4-10.el6_5",
"version_affected": "!"
} }
] ]
} }
@ -120,51 +108,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.securityfocus.com/bid/59607" "name": "http://www.securityfocus.com/bid/59607"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2014:0222",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2014:0222"
},
{
"url": "https://access.redhat.com/errata/RHSA-2014:0223",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2014:0223"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2013-1961",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2013-1961"
},
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952131", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952131",
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=952131" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=952131"
} }
] ]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.3,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
}
]
} }
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1962", "ID": "CVE-2013-1962",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,82 +27,106 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "FEDORA-2013-8635", "vendor_name": "n/a",
"refsource": "FEDORA", "product": {
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106906.html" "product_data": [
},
{ {
"name": "http://libvirt.org/git/?p=libvirt.git;a=commit;h=ca697e90d5bd6a6dfb94bfb6d4438bdf9a44b739", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "http://libvirt.org/git/?p=libvirt.git;a=commit;h=ca697e90d5bd6a6dfb94bfb6d4438bdf9a44b739" "version_data": [
},
{ {
"name": "[oss-security] 20130516 CVE-2013-1962 libvirt: DoS (max count of open files exhaustion) due sockets leak in the storage pool", "version_affected": "=",
"refsource": "MLIST", "version_value": "n/a"
"url": "http://www.openwall.com/lists/oss-security/2013/05/16/9" }
}, ]
{ }
"name": "FEDORA-2013-8681", }
"refsource": "FEDORA", ]
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106921.html" }
}, }
{ ]
"name": "93451", }
"refsource": "OSVDB", },
"url": "http://osvdb.org/93451" "references": {
}, "reference_data": [
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=953107", "url": "http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=ca697e90d5bd6a6dfb94bfb6d4438bdf9a44b739",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953107" "name": "http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=ca697e90d5bd6a6dfb94bfb6d4438bdf9a44b739"
}, },
{ {
"name": "USN-1895-1", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106906.html",
"refsource": "UBUNTU", "refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-1895-1" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106906.html"
}, },
{ {
"name": "59937", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106921.html",
"refsource": "BID", "refsource": "MISC",
"url": "http://www.securityfocus.com/bid/59937" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106921.html"
}, },
{ {
"name": "53475", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00022.html",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/53475" "name": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00022.html"
}, },
{ {
"name": "53440", "url": "http://osvdb.org/93451",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/53440" "name": "http://osvdb.org/93451"
}, },
{ {
"name": "RHSA-2013:0831", "url": "http://rhn.redhat.com/errata/RHSA-2013-0831.html",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0831.html" "name": "http://rhn.redhat.com/errata/RHSA-2013-0831.html"
}, },
{ {
"name": "1028577", "url": "http://secunia.com/advisories/53440",
"refsource": "SECTRACK", "refsource": "MISC",
"url": "http://www.securitytracker.com/id/1028577" "name": "http://secunia.com/advisories/53440"
}, },
{ {
"name": "openSUSE-SU-2013:0885", "url": "http://secunia.com/advisories/53475",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00022.html" "name": "http://secunia.com/advisories/53475"
}, },
{ {
"name": "libvirt-cve20131962-dos(84341)", "url": "http://www.openwall.com/lists/oss-security/2013/05/16/9",
"refsource": "XF", "refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84341" "name": "http://www.openwall.com/lists/oss-security/2013/05/16/9"
}, },
{ {
"name": "[libvir-list] 20130516 [libvirt] [PATCH] daemon: fix leak after listing all volumes", "url": "http://www.securityfocus.com/bid/59937",
"refsource": "MLIST", "refsource": "MISC",
"url": "https://www.redhat.com/archives/libvir-list/2013-May/msg01222.html" "name": "http://www.securityfocus.com/bid/59937"
},
{
"url": "http://www.securitytracker.com/id/1028577",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id/1028577"
},
{
"url": "http://www.ubuntu.com/usn/USN-1895-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1895-1"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84341",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84341"
},
{
"url": "https://www.redhat.com/archives/libvir-list/2013-May/msg01222.html",
"refsource": "MISC",
"name": "https://www.redhat.com/archives/libvir-list/2013-May/msg01222.html"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953107",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=953107"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1963", "ID": "CVE-2013-1963",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,12 +27,36 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "http://owncloud.org/about/security/advisories/oC-SA-2013-018/", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "http://owncloud.org/about/security/advisories/oC-SA-2013-018/" "product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "http://owncloud.org/about/security/advisories/oC-SA-2013-018/",
"refsource": "MISC",
"name": "http://owncloud.org/about/security/advisories/oC-SA-2013-018/"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1964", "ID": "CVE-2013-1964",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,47 +27,71 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "59293", "vendor_name": "n/a",
"refsource": "BID", "product": {
"url": "http://www.securityfocus.com/bid/59293" "product_data": [
},
{ {
"name": "55082", "product_name": "n/a",
"refsource": "SECUNIA", "version": {
"url": "http://secunia.com/advisories/55082" "version_data": [
},
{ {
"name": "[oss-security] 20130418 Xen Security Advisory 50 (CVE-2013-1964) - grant table hypercall acquire/release imbalance", "version_affected": "=",
"refsource": "MLIST", "version_value": "n/a"
"url": "http://www.openwall.com/lists/oss-security/2013/04/18/9" }
}, ]
{ }
"name": "GLSA-201309-24", }
"refsource": "GENTOO", ]
"url": "http://security.gentoo.org/glsa/glsa-201309-24.xml" }
}, }
{ ]
"name": "DSA-2666", }
"refsource": "DEBIAN", },
"url": "http://www.debian.org/security/2013/dsa-2666" "references": {
}, "reference_data": [
{ {
"name": "1028459", "url": "http://secunia.com/advisories/55082",
"refsource": "SECTRACK", "refsource": "MISC",
"url": "http://www.securitytracker.com/id/1028459" "name": "http://secunia.com/advisories/55082"
}, },
{ {
"name": "SUSE-SU-2014:0446", "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" "name": "http://security.gentoo.org/glsa/glsa-201309-24.xml"
}, },
{ {
"name": "FEDORA-2013-6723", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html",
"refsource": "FEDORA", "refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104537.html" "name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104537.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104537.html"
},
{
"url": "http://www.debian.org/security/2013/dsa-2666",
"refsource": "MISC",
"name": "http://www.debian.org/security/2013/dsa-2666"
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/04/18/9",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/04/18/9"
},
{
"url": "http://www.securityfocus.com/bid/59293",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/59293"
},
{
"url": "http://www.securitytracker.com/id/1028459",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id/1028459"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1967", "ID": "CVE-2013-1967",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,47 +27,71 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "mediaelementjs-flashmediaelement-xss(83647)", "vendor_name": "n/a",
"refsource": "XF", "product": {
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83647" "product_data": [
},
{ {
"name": "https://github.com/johndyer/mediaelement/commit/9223dc6bfc50251a9a3cba0210e71be80fc38ecd", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "https://github.com/johndyer/mediaelement/commit/9223dc6bfc50251a9a3cba0210e71be80fc38ecd" "version_data": [
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=955307", "version_affected": "=",
"refsource": "CONFIRM", "version_value": "n/a"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=955307" }
}, ]
{ }
"name": "[oss-security] 20130417 Fwd: Re: CVE Request: ownCloud 5.0.5 and 4.5.10", }
"refsource": "MLIST", ]
"url": "http://seclists.org/oss-sec/2013/q2/111" }
}, }
{ ]
"name": "53079", }
"refsource": "SECUNIA", },
"url": "http://secunia.com/advisories/53079" "references": {
}, "reference_data": [
{ {
"name": "http://owncloud.org/about/security/advisories/oC-SA-2013-017", "url": "http://owncloud.org/about/security/advisories/oC-SA-2013-017",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://owncloud.org/about/security/advisories/oC-SA-2013-017" "name": "http://owncloud.org/about/security/advisories/oC-SA-2013-017"
}, },
{ {
"name": "[oss-security] 20130421 ownCloud Security Advisories (2013-017, 2013-018)", "url": "http://seclists.org/oss-sec/2013/q2/111",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://seclists.org/oss-sec/2013/q2/133" "name": "http://seclists.org/oss-sec/2013/q2/111"
}, },
{ {
"name": "https://github.com/johndyer/mediaelement/tree/2.11.1", "url": "http://seclists.org/oss-sec/2013/q2/133",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://github.com/johndyer/mediaelement/tree/2.11.1" "name": "http://seclists.org/oss-sec/2013/q2/133"
},
{
"url": "http://secunia.com/advisories/53079",
"refsource": "MISC",
"name": "http://secunia.com/advisories/53079"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83647",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83647"
},
{
"url": "https://github.com/johndyer/mediaelement/commit/9223dc6bfc50251a9a3cba0210e71be80fc38ecd",
"refsource": "MISC",
"name": "https://github.com/johndyer/mediaelement/commit/9223dc6bfc50251a9a3cba0210e71be80fc38ecd"
},
{
"url": "https://github.com/johndyer/mediaelement/tree/2.11.1",
"refsource": "MISC",
"name": "https://github.com/johndyer/mediaelement/tree/2.11.1"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=955307",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=955307"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4441", "ID": "CVE-2013-4441",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -39,6 +39,7 @@
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_affected": "=",
"version_value": "2.06" "version_value": "2.06"
} }
] ]
@ -53,24 +54,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "http://www.openwall.com/lists/oss-security/2013/06/06/1",
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726578", "name": "http://www.openwall.com/lists/oss-security/2013/06/06/1"
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726578"
}, },
{ {
"url": "http://www.openwall.com/lists/oss-security/2013/10/16/15",
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/06/06/1", "name": "http://www.openwall.com/lists/oss-security/2013/10/16/15"
"url": "http://www.openwall.com/lists/oss-security/2013/06/06/1"
}, },
{ {
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726578",
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/10/16/15", "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726578"
"url": "http://www.openwall.com/lists/oss-security/2013/10/16/15"
}, },
{ {
"url": "https://www.openwall.com/lists/oss-security/2012/01/22/6",
"refsource": "MISC", "refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2012/01/22/6", "name": "https://www.openwall.com/lists/oss-security/2012/01/22/6"
"url": "https://www.openwall.com/lists/oss-security/2012/01/22/6"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4442", "ID": "CVE-2013-4442",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,52 +27,76 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "[oss-security] 20140606 Re: CVE Request: pwgen", "vendor_name": "n/a",
"refsource": "MLIST", "product": {
"url": "http://www.openwall.com/lists/oss-security/2013/06/06/1" "product_data": [
},
{ {
"name": "http://sourceforge.net/p/pwgen/code/ci/00118ccac4656adb028504639b313d7b09e62b79/", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "http://sourceforge.net/p/pwgen/code/ci/00118ccac4656adb028504639b313d7b09e62b79/" "version_data": [
},
{ {
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=672241", "version_affected": "=",
"refsource": "MISC", "version_value": "n/a"
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=672241" }
}, ]
{ }
"name": "FEDORA-2014-16406", }
"refsource": "FEDORA", ]
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146237.html" }
}, }
{ ]
"name": "FEDORA-2014-16368", }
"refsource": "FEDORA", },
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146015.html" "references": {
}, "reference_data": [
{ {
"name": "[oss-security] 20141015 Re: RESEND: CVE Request: pwgen", "url": "http://advisories.mageia.org/MGASA-2014-0535.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2013/10/16/15" "name": "http://advisories.mageia.org/MGASA-2014-0535.html"
}, },
{ {
"name": "MDVSA-2015:008", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146015.html",
"refsource": "MANDRIVA", "refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:008" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146015.html"
}, },
{ {
"name": "FEDORA-2014-16473", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146237.html",
"refsource": "FEDORA", "refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146285.html" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146237.html"
}, },
{ {
"name": "http://advisories.mageia.org/MGASA-2014-0535.html", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146285.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://advisories.mageia.org/MGASA-2014-0535.html" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146285.html"
},
{
"url": "http://sourceforge.net/p/pwgen/code/ci/00118ccac4656adb028504639b313d7b09e62b79/",
"refsource": "MISC",
"name": "http://sourceforge.net/p/pwgen/code/ci/00118ccac4656adb028504639b313d7b09e62b79/"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:008",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:008"
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/06/06/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/06/06/1"
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/10/16/15",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/10/16/15"
},
{
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=672241",
"refsource": "MISC",
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=672241"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4449", "ID": "CVE-2013-4449",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,87 +27,111 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" "product_data": [
},
{ {
"name": "http://www.openldap.org/its/index.cgi/Incoming?id=7723", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "http://www.openldap.org/its/index.cgi/Incoming?id=7723" "version_data": [
},
{ {
"name": "MDVSA-2014:026", "version_affected": "=",
"refsource": "MANDRIVA", "version_value": "n/a"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:026" }
}, ]
{ }
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1019490", }
"refsource": "CONFIRM", ]
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019490" }
}, }
{ ]
"name": "DSA-3209", }
"refsource": "DEBIAN", },
"url": "http://www.debian.org/security/2015/dsa-3209" "references": {
}, "reference_data": [
{ {
"name": "RHSA-2014:0126", "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0126.html" "name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
}, },
{ {
"name": "[oss-security] 20131018 Re: CVE request: slapd segfaults on certain queries with rwm overlay enabled", "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2013/10/19/3" "name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735"
}, },
{ {
"name": "RHSA-2014:0206", "url": "http://seclists.org/fulldisclosure/2019/Dec/26",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0206.html" "name": "http://seclists.org/fulldisclosure/2019/Dec/26"
}, },
{ {
"name": "63190", "url": "https://seclists.org/bugtraq/2019/Dec/23",
"refsource": "BID", "refsource": "MISC",
"url": "http://www.securityfocus.com/bid/63190" "name": "https://seclists.org/bugtraq/2019/Dec/23"
}, },
{ {
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705", "url": "https://support.apple.com/kb/HT210788",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705" "name": "https://support.apple.com/kb/HT210788"
}, },
{ {
"name": "1029711", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "SECTRACK", "refsource": "MISC",
"url": "http://www.securitytracker.com/id/1029711" "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
}, },
{ {
"name": "20140401 Cisco Unified Communications Manager Denial of Service Vulnerability", "url": "http://rhn.redhat.com/errata/RHSA-2014-0126.html",
"refsource": "CISCO", "refsource": "MISC",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-4449" "name": "http://rhn.redhat.com/errata/RHSA-2014-0126.html"
}, },
{ {
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735", "url": "http://rhn.redhat.com/errata/RHSA-2014-0206.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735" "name": "http://rhn.redhat.com/errata/RHSA-2014-0206.html"
}, },
{ {
"refsource": "CONFIRM", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-4449",
"name": "https://support.apple.com/kb/HT210788", "refsource": "MISC",
"url": "https://support.apple.com/kb/HT210788" "name": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-4449"
}, },
{ {
"refsource": "BUGTRAQ", "url": "http://www.debian.org/security/2015/dsa-3209",
"name": "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "refsource": "MISC",
"url": "https://seclists.org/bugtraq/2019/Dec/23" "name": "http://www.debian.org/security/2015/dsa-3209"
}, },
{ {
"refsource": "FULLDISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:026",
"name": "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "refsource": "MISC",
"url": "http://seclists.org/fulldisclosure/2019/Dec/26" "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:026"
},
{
"url": "http://www.openldap.org/its/index.cgi/Incoming?id=7723",
"refsource": "MISC",
"name": "http://www.openldap.org/its/index.cgi/Incoming?id=7723"
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/10/19/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/10/19/3"
},
{
"url": "http://www.securityfocus.com/bid/63190",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/63190"
},
{
"url": "http://www.securitytracker.com/id/1029711",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id/1029711"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019490",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1019490"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4452", "ID": "CVE-2013-4452",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,27 +27,51 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "1029390", "vendor_name": "n/a",
"refsource": "SECTRACK", "product": {
"url": "http://www.securitytracker.com/id/1029390" "product_data": [
},
{ {
"name": "63916", "product_name": "n/a",
"refsource": "BID", "version": {
"url": "http://www.securityfocus.com/bid/63916" "version_data": [
},
{ {
"name": "55852", "version_affected": "=",
"refsource": "SECUNIA", "version_value": "n/a"
"url": "http://secunia.com/advisories/55852" }
}, ]
{ }
"name": "RHSA-2013:1762", }
"refsource": "REDHAT", ]
"url": "http://rhn.redhat.com/errata/RHSA-2013-1762.html" }
}
]
}
},
"references": {
"reference_data": [
{
"url": "http://rhn.redhat.com/errata/RHSA-2013-1762.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1762.html"
},
{
"url": "http://secunia.com/advisories/55852",
"refsource": "MISC",
"name": "http://secunia.com/advisories/55852"
},
{
"url": "http://www.securityfocus.com/bid/63916",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/63916"
},
{
"url": "http://www.securitytracker.com/id/1029390",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id/1029390"
} }
] ]
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "It was found that getaddrinfo() did not limit the amount of stack memory used during name resolution. An attacker able to make an application resolve an attacker-controlled hostname or IP address could possibly cause the application to exhaust all stack memory and crash." "value": "Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6 address results. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1914."
} }
] ]
}, },
@ -21,8 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "Stack-based Buffer Overflow", "value": "n/a"
"cweId": "CWE-121"
} }
] ]
} }
@ -32,16 +31,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "n/a",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "Red Hat Enterprise Linux 6", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "0:2.12-1.149.el6", "version_affected": "=",
"version_affected": "!" "version_value": "n/a"
} }
] ]
} }
@ -74,21 +73,6 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" "name": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2014:1391",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2014:1391"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2013-4458",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2013-4458"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1022280",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1022280"
},
{ {
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=16072", "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=16072",
"refsource": "MISC", "refsource": "MISC",
@ -100,30 +84,5 @@
"name": "https://sourceware.org/ml/libc-alpha/2013-10/msg00733.html" "name": "https://sourceware.org/ml/libc-alpha/2013-10/msg00733.html"
} }
] ]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.3,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
}
]
} }
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4459", "ID": "CVE-2013-4459",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,27 +27,51 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "USN-2012-1", "vendor_name": "n/a",
"refsource": "UBUNTU", "product": {
"url": "http://www.ubuntu.com/usn/USN-2012-1" "product_data": [
},
{ {
"name": "https://bugs.launchpad.net/ubuntu/%2Bsource/lightdm/%2Bbug/1243339", "product_name": "n/a",
"refsource": "MISC", "version": {
"url": "https://bugs.launchpad.net/ubuntu/%2Bsource/lightdm/%2Bbug/1243339" "version_data": [
},
{ {
"name": "[LightDM] 20131030 lightdm 1.9.2 released", "version_affected": "=",
"refsource": "MLIST", "version_value": "n/a"
"url": "http://lists.freedesktop.org/archives/lightdm/2013-October/000471.html" }
}, ]
{ }
"name": "[LightDM] 20131031 lightdm 1.8.4 released", }
"refsource": "MLIST", ]
"url": "http://lists.freedesktop.org/archives/lightdm/2013-October/000472.html" }
}
]
}
},
"references": {
"reference_data": [
{
"url": "http://lists.freedesktop.org/archives/lightdm/2013-October/000471.html",
"refsource": "MISC",
"name": "http://lists.freedesktop.org/archives/lightdm/2013-October/000471.html"
},
{
"url": "http://lists.freedesktop.org/archives/lightdm/2013-October/000472.html",
"refsource": "MISC",
"name": "http://lists.freedesktop.org/archives/lightdm/2013-October/000472.html"
},
{
"url": "http://www.ubuntu.com/usn/USN-2012-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2012-1"
},
{
"url": "https://bugs.launchpad.net/ubuntu/%2Bsource/lightdm/%2Bbug/1243339",
"refsource": "MISC",
"name": "https://bugs.launchpad.net/ubuntu/%2Bsource/lightdm/%2Bbug/1243339"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4460", "ID": "CVE-2013-4460",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,32 +27,56 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "http://www.mantisbt.org/bugs/view.php?id=16513", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "http://www.mantisbt.org/bugs/view.php?id=16513" "product_data": [
},
{ {
"name": "98823", "product_name": "n/a",
"refsource": "OSVDB", "version": {
"url": "http://osvdb.org/98823" "version_data": [
},
{ {
"name": "https://github.com/mantisbt/mantisbt/commit/0002d106a6cd35cb0a6fe03246531a4e3f32c9d0#diff-4122320b011a3291cd45da074a867076", "version_affected": "=",
"refsource": "CONFIRM", "version_value": "n/a"
"url": "https://github.com/mantisbt/mantisbt/commit/0002d106a6cd35cb0a6fe03246531a4e3f32c9d0#diff-4122320b011a3291cd45da074a867076" }
}, ]
{ }
"name": "[oss-security] 20131022 Re: CVE Request: MantisBT before 1.2.16 XSS vulnerability", }
"refsource": "MLIST", ]
"url": "http://seclists.org/oss-sec/2013/q4/168" }
}, }
{ ]
"name": "55305", }
"refsource": "SECUNIA", },
"url": "http://secunia.com/advisories/55305" "references": {
"reference_data": [
{
"url": "http://osvdb.org/98823",
"refsource": "MISC",
"name": "http://osvdb.org/98823"
},
{
"url": "http://seclists.org/oss-sec/2013/q4/168",
"refsource": "MISC",
"name": "http://seclists.org/oss-sec/2013/q4/168"
},
{
"url": "http://secunia.com/advisories/55305",
"refsource": "MISC",
"name": "http://secunia.com/advisories/55305"
},
{
"url": "http://www.mantisbt.org/bugs/view.php?id=16513",
"refsource": "MISC",
"name": "http://www.mantisbt.org/bugs/view.php?id=16513"
},
{
"url": "https://github.com/mantisbt/mantisbt/commit/0002d106a6cd35cb0a6fe03246531a4e3f32c9d0#diff-4122320b011a3291cd45da074a867076",
"refsource": "MISC",
"name": "https://github.com/mantisbt/mantisbt/commit/0002d106a6cd35cb0a6fe03246531a4e3f32c9d0#diff-4122320b011a3291cd45da074a867076"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4461", "ID": "CVE-2013-4461",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,22 +27,46 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1016263", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1016263" "product_data": [
},
{ {
"name": "RHSA-2013:1851", "product_name": "n/a",
"refsource": "REDHAT", "version": {
"url": "http://rhn.redhat.com/errata/RHSA-2013-1851.html" "version_data": [
},
{ {
"name": "RHSA-2013:1852", "version_affected": "=",
"refsource": "REDHAT", "version_value": "n/a"
"url": "http://rhn.redhat.com/errata/RHSA-2013-1852.html" }
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "http://rhn.redhat.com/errata/RHSA-2013-1851.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1851.html"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2013-1852.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1852.html"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1016263",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1016263"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4463", "ID": "CVE-2013-4463",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,27 +27,51 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "https://bugs.launchpad.net/nova/+bug/1206081", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "https://bugs.launchpad.net/nova/+bug/1206081" "product_data": [
},
{ {
"name": "[oss-security] 20131031 [OSSA 2013-029] Potential Nova denial of service through compressed disk images (CVE-2013-4463, CVE-2013-4469)", "product_name": "n/a",
"refsource": "MLIST", "version": {
"url": "http://www.openwall.com/lists/oss-security/2013/10/31/3" "version_data": [
},
{ {
"name": "USN-2247-1", "version_affected": "=",
"refsource": "UBUNTU", "version_value": "n/a"
"url": "http://www.ubuntu.com/usn/USN-2247-1" }
}, ]
{ }
"name": "RHSA-2014:0112", }
"refsource": "REDHAT", ]
"url": "http://rhn.redhat.com/errata/RHSA-2014-0112.html" }
}
]
}
},
"references": {
"reference_data": [
{
"url": "http://rhn.redhat.com/errata/RHSA-2014-0112.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2014-0112.html"
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/10/31/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/10/31/3"
},
{
"url": "http://www.ubuntu.com/usn/USN-2247-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2247-1"
},
{
"url": "https://bugs.launchpad.net/nova/+bug/1206081",
"refsource": "MISC",
"name": "https://bugs.launchpad.net/nova/+bug/1206081"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4469", "ID": "CVE-2013-4469",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,22 +27,46 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "https://bugs.launchpad.net/nova/+bug/1206081", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "https://bugs.launchpad.net/nova/+bug/1206081" "product_data": [
},
{ {
"name": "[oss-security] 20131031 [OSSA 2013-029] Potential Nova denial of service through compressed disk images (CVE-2013-4463, CVE-2013-4469)", "product_name": "n/a",
"refsource": "MLIST", "version": {
"url": "http://www.openwall.com/lists/oss-security/2013/10/31/3" "version_data": [
},
{ {
"name": "USN-2247-1", "version_affected": "=",
"refsource": "UBUNTU", "version_value": "n/a"
"url": "http://www.ubuntu.com/usn/USN-2247-1" }
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "http://www.openwall.com/lists/oss-security/2013/10/31/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/10/31/3"
},
{
"url": "http://www.ubuntu.com/usn/USN-2247-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2247-1"
},
{
"url": "https://bugs.launchpad.net/nova/+bug/1206081",
"refsource": "MISC",
"name": "https://bugs.launchpad.net/nova/+bug/1206081"
} }
] ]
} }