"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-02-13 04:02:07 +00:00
parent 8f640a9f38
commit b48a1cda6c
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
30 changed files with 1556 additions and 1684 deletions

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4524",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "xlockmore",
"product": {
"product_data": [
{
"product_name": "xlockmore",
"version": {
"version_data": [
{
"version_value": "< 5.43"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,17 +27,61 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "xlockmore",
"product": {
"product_data": [
{
"product_name": "xlockmore",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "< 5.43"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://security-tracker.debian.org/tracker/CVE-2012-4524",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091108.html",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2012-4524"
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091108.html"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4524",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091150.html",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4524"
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091150.html"
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091709.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091709.html"
},
{
"url": "http://security.gentoo.org/glsa/glsa-201309-03.xml",
"refsource": "MISC",
"name": "http://security.gentoo.org/glsa/glsa-201309-03.xml"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/10/17/12",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/10/17/12"
},
{
"url": "http://www.securityfocus.com/bid/56169",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/56169"
},
{
"url": "https://access.redhat.com/security/cve/cve-2012-4524",
@ -68,39 +89,19 @@
"name": "https://access.redhat.com/security/cve/cve-2012-4524"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4524",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79558",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79558"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4524"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79558",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091108.html",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091108.html"
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79558"
},
{
"url": "https://security-tracker.debian.org/tracker/CVE-2012-4524",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091150.html",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091150.html"
},
{
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091709.html",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091709.html"
},
{
"refsource": "MISC",
"name": "http://security.gentoo.org/glsa/glsa-201309-03.xml",
"url": "http://security.gentoo.org/glsa/glsa-201309-03.xml"
},
{
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/10/17/12",
"url": "http://www.openwall.com/lists/oss-security/2012/10/17/12"
},
{
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/56169",
"url": "http://www.securityfocus.com/bid/56169"
"name": "https://security-tracker.debian.org/tracker/CVE-2012-4524"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4527",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in mcrypt 2.6.8 and earlier allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long file name. NOTE: it is not clear whether this is a vulnerability."
"value": "Stack-based buffer overflow in mcrypt 2.6.8 and earlier allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long file name. NOTE: it is not clear whether this is a vulnerability."
}
]
},
@ -50,52 +27,76 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "FEDORA-2012-17290",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091206.html"
},
{
"name": "openSUSE-SU-2012:1440",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2012-11/msg00003.html"
},
{
"name": "FEDORA-2012-17318",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091173.html"
},
{
"name": "FEDORA-2012-17339",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091377.html"
},
{
"name": "56114",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/56114"
},
{
"name": "[oss-security] 20121018 Re: CVE Request -- mcrypt: stack-based buffer overflow by encryption / decryption of overly long file names",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/10/18/12"
},
{
"name": "[oss-security] 20121119 Re: CVE Request -- mcrypt: stack-based buffer overflow by encryption / decryption of overly long file names",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/11/20/1"
},
{
"name": "[oss-security] 20121018 CVE Request -- mcrypt: stack-based buffer overflow by encryption / decryption of overly long file names",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/10/18/9"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=867790",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091173.html",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867790"
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091173.html"
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091206.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091206.html"
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091377.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091377.html"
},
{
"url": "http://lists.opensuse.org/opensuse-updates/2012-11/msg00003.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2012-11/msg00003.html"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/10/18/12",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/10/18/12"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/10/18/9",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/10/18/9"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/11/20/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/11/20/1"
},
{
"url": "http://www.securityfocus.com/bid/56114",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/56114"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867790",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=867790"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4528",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,57 +27,81 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "openSUSE-SU-2013:1342",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html"
},
{
"name": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20121017-0_mod_security_ruleset_bypass.txt",
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html",
"refsource": "MISC",
"url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20121017-0_mod_security_ruleset_bypass.txt"
"name": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html"
},
{
"name": "http://mod-security.svn.sourceforge.net/viewvc/mod-security?view=revision&sortby=date&revision=2081",
"refsource": "CONFIRM",
"url": "http://mod-security.svn.sourceforge.net/viewvc/mod-security?view=revision&sortby=date&revision=2081"
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html"
},
{
"name": "openSUSE-SU-2013:1331",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html"
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html"
},
{
"name": "http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/branches/2.7.x/CHANGES",
"refsource": "CONFIRM",
"url": "http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/branches/2.7.x/CHANGES"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093011.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093011.html"
},
{
"name": "http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/trunk/apache2/msc_multipart.c?sortby=date&r1=2081&r2=2080&pathrev=2081",
"refsource": "CONFIRM",
"url": "http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/trunk/apache2/msc_multipart.c?sortby=date&r1=2081&r2=2080&pathrev=2081"
"url": "http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/branches/2.7.x/CHANGES",
"refsource": "MISC",
"name": "http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/branches/2.7.x/CHANGES"
},
{
"name": "20121017 SEC Consult SA-20121017-0 :: ModSecurity multipart/invalid part ruleset bypass",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2012/Oct/113"
"url": "http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/trunk/apache2/msc_multipart.c?sortby=date&r1=2081&r2=2080&pathrev=2081",
"refsource": "MISC",
"name": "http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/trunk/apache2/msc_multipart.c?sortby=date&r1=2081&r2=2080&pathrev=2081"
},
{
"name": "FEDORA-2012-18278",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093011.html"
"url": "http://mod-security.svn.sourceforge.net/viewvc/mod-security?view=revision&sortby=date&revision=2081",
"refsource": "MISC",
"name": "http://mod-security.svn.sourceforge.net/viewvc/mod-security?view=revision&sortby=date&revision=2081"
},
{
"name": "[oss-security] 20121018 Re: CVE request: Fwd: [Full-disclosure] SEC Consult SA-20121017-0 :: ModSecurity multipart/invalid part ruleset bypass",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/10/18/14"
"url": "http://seclists.org/fulldisclosure/2012/Oct/113",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2012/Oct/113"
},
{
"name": "openSUSE-SU-2013:1336",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html"
"url": "http://www.openwall.com/lists/oss-security/2012/10/18/14",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/10/18/14"
},
{
"url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20121017-0_mod_security_ruleset_bypass.txt",
"refsource": "MISC",
"name": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20121017-0_mod_security_ruleset_bypass.txt"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4530",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,42 +27,66 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2013:0223",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0223.html"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0223.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0223.html"
},
{
"name": "[oss-security] 20121019 Re: CVE Request -- kernel stack disclosure in binfmt_script load_script()",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/10/19/3"
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.2",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.2"
},
{
"name": "https://github.com/torvalds/linux/commit/b66c5984017533316fd1951770302649baf1aa33",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/b66c5984017533316fd1951770302649baf1aa33"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b66c5984017533316fd1951770302649baf1aa33",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b66c5984017533316fd1951770302649baf1aa33"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.2",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.2"
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html"
},
{
"name": "SUSE-SU-2013:0674",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html"
"url": "http://www.openwall.com/lists/oss-security/2012/10/19/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/10/19/3"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b66c5984017533316fd1951770302649baf1aa33",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b66c5984017533316fd1951770302649baf1aa33"
"url": "https://github.com/torvalds/linux/commit/b66c5984017533316fd1951770302649baf1aa33",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/b66c5984017533316fd1951770302649baf1aa33"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=868285",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=868285"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=868285",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=868285"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4534",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,112 +27,126 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "SSRT101139",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=136612293908376&w=2"
"url": "http://tomcat.apache.org/security-6.html",
"refsource": "MISC",
"name": "http://tomcat.apache.org/security-6.html"
},
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=1340218",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1340218"
"url": "http://tomcat.apache.org/security-7.html",
"refsource": "MISC",
"name": "http://tomcat.apache.org/security-7.html"
},
{
"name": "openSUSE-SU-2013:0161",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00051.html"
"url": "http://marc.info/?l=bugtraq&m=139344343412337&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=bugtraq&m=139344343412337&w=2"
},
{
"name": "USN-1685-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1685-1"
"url": "http://secunia.com/advisories/57126",
"refsource": "MISC",
"name": "http://secunia.com/advisories/57126"
},
{
"name": "1027836",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027836"
"url": "http://marc.info/?l=bugtraq&m=136612293908376&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=bugtraq&m=136612293908376&w=2"
},
{
"name": "openSUSE-SU-2013:0192",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00080.html"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0623.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0623.html"
},
{
"name": "SSRT101182",
"refsource": "HP",
"url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03748878"
"url": "http://www.ubuntu.com/usn/USN-1685-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1685-1"
},
{
"name": "https://issues.apache.org/bugzilla/show_bug.cgi?id=52858",
"refsource": "CONFIRM",
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=52858"
"url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03748878",
"refsource": "MISC",
"name": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03748878"
},
{
"name": "openSUSE-SU-2013:0170",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00061.html"
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-12/0043.html",
"refsource": "MISC",
"name": "http://archives.neohapsis.com/archives/bugtraq/2012-12/0043.html"
},
{
"name": "http://tomcat.apache.org/security-7.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-7.html"
"url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00051.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00051.html"
},
{
"name": "HPSBMU02873",
"refsource": "HP",
"url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03748878"
"url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00061.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00061.html"
},
{
"name": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/tomcat/util/net/NioEndpoint.java?r1=1340218&r2=1340217&pathrev=1340218",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/tomcat/util/net/NioEndpoint.java?r1=1340218&r2=1340217&pathrev=1340218"
"url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00080.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00080.html"
},
{
"name": "http://tomcat.apache.org/security-6.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-6.html"
"url": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/tomcat/util/net/NioEndpoint.java?r1=1340218&r2=1340217&pathrev=1340218",
"refsource": "MISC",
"name": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/tomcat/util/net/NioEndpoint.java?r1=1340218&r2=1340217&pathrev=1340218"
},
{
"name": "57126",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/57126"
"url": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/webapps/docs/changelog.xml?r1=1340218&r2=1340217&pathrev=1340218",
"refsource": "MISC",
"name": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/webapps/docs/changelog.xml?r1=1340218&r2=1340217&pathrev=1340218"
},
{
"name": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/webapps/docs/changelog.xml?r1=1340218&r2=1340217&pathrev=1340218",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/webapps/docs/changelog.xml?r1=1340218&r2=1340217&pathrev=1340218"
"url": "http://svn.apache.org/viewvc?view=revision&revision=1340218",
"refsource": "MISC",
"name": "http://svn.apache.org/viewvc?view=revision&revision=1340218"
},
{
"name": "RHSA-2013:0623",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0623.html"
"url": "http://www.securityfocus.com/bid/56813",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/56813"
},
{
"name": "20121204 CVE-2012-4534 Apache Tomcat denial of service",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-12/0043.html"
"url": "http://www.securitytracker.com/id?1027836",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1027836"
},
{
"name": "oval:org.mitre.oval:def:19398",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19398"
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=52858",
"refsource": "MISC",
"name": "https://issues.apache.org/bugzilla/show_bug.cgi?id=52858"
},
{
"name": "56813",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/56813"
},
{
"name": "HPSBUX02866",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=136612293908376&w=2"
},
{
"name": "HPSBST02955",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=139344343412337&w=2"
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19398",
"refsource": "MISC",
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19398"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4535",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,122 +27,146 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2012:1540",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1540.html"
"url": "http://secunia.com/advisories/55082",
"refsource": "MISC",
"name": "http://secunia.com/advisories/55082"
},
{
"name": "SUSE-SU-2014:0470",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html"
"url": "http://security.gentoo.org/glsa/glsa-201309-24.xml",
"refsource": "MISC",
"name": "http://security.gentoo.org/glsa/glsa-201309-24.xml"
},
{
"name": "55082",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55082"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html"
},
{
"name": "1027759",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027759"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html"
},
{
"name": "[Xen-announce] 20121113 Xen Security Advisory 20 (CVE-2012-4535) - Timer overflow DoS vulnerability",
"refsource": "MLIST",
"url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00001.html"
"url": "http://secunia.com/advisories/51413",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51413"
},
{
"name": "51413",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51413"
"url": "https://security.gentoo.org/glsa/201604-03",
"refsource": "MISC",
"name": "https://security.gentoo.org/glsa/201604-03"
},
{
"name": "51200",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51200"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html"
},
{
"name": "GLSA-201309-24",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201309-24.xml"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html"
},
{
"name": "DSA-2582",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2582"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html"
},
{
"name": "87298",
"refsource": "OSVDB",
"url": "http://osvdb.org/87298"
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
},
{
"name": "SUSE-SU-2012:1486",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html"
},
{
"name": "[oss-security] 20121113 Xen Security Advisory 20 (CVE-2012-4535) - Timer overflow DoS vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/11/13/1"
"url": "http://rhn.redhat.com/errata/RHSA-2012-1540.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-1540.html"
},
{
"name": "openSUSE-SU-2012:1572",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html"
"url": "http://secunia.com/advisories/51200",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51200"
},
{
"name": "51468",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51468"
"url": "http://secunia.com/advisories/51324",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51324"
},
{
"name": "xen-vcpu-dos(80022)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80022"
"url": "http://secunia.com/advisories/51352",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51352"
},
{
"name": "SUSE-SU-2012:1487",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html"
"url": "http://secunia.com/advisories/51468",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51468"
},
{
"name": "SUSE-SU-2014:0446",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
"url": "http://www.debian.org/security/2012/dsa-2582",
"refsource": "MISC",
"name": "http://www.debian.org/security/2012/dsa-2582"
},
{
"name": "51352",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51352"
"url": "http://www.securityfocus.com/bid/56498",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/56498"
},
{
"name": "51324",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51324"
"url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00001.html",
"refsource": "MISC",
"name": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00001.html"
},
{
"name": "GLSA-201604-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201604-03"
"url": "http://osvdb.org/87298",
"refsource": "MISC",
"name": "http://osvdb.org/87298"
},
{
"name": "56498",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/56498"
"url": "http://www.openwall.com/lists/oss-security/2012/11/13/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/11/13/1"
},
{
"name": "SUSE-SU-2012:1615",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html"
"url": "http://www.securitytracker.com/id?1027759",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1027759"
},
{
"name": "openSUSE-SU-2012:1573",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80022",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80022"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4536",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,92 +27,116 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "55082",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55082"
"url": "http://secunia.com/advisories/55082",
"refsource": "MISC",
"name": "http://secunia.com/advisories/55082"
},
{
"name": "51413",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51413"
"url": "http://security.gentoo.org/glsa/glsa-201309-24.xml",
"refsource": "MISC",
"name": "http://security.gentoo.org/glsa/glsa-201309-24.xml"
},
{
"name": "51200",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51200"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html"
},
{
"name": "GLSA-201309-24",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201309-24.xml"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html"
},
{
"name": "SUSE-SU-2012:1486",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html"
"url": "http://secunia.com/advisories/51413",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51413"
},
{
"name": "xen-domainpirqtoemuirq-dos(80023)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80023"
"url": "https://security.gentoo.org/glsa/201604-03",
"refsource": "MISC",
"name": "https://security.gentoo.org/glsa/201604-03"
},
{
"name": "[Xen-announce] 20121113 Xen Security Advisory 21 (CVE-2012-4536) - pirq range check DoS vulnerability",
"refsource": "MLIST",
"url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00003.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html"
},
{
"name": "[oss-security] 20121113 Xen Security Advisory 21 (CVE-2012-4536) - pirq range check DoS vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/11/13/2"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html"
},
{
"name": "1027760",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027760"
"url": "http://secunia.com/advisories/51200",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51200"
},
{
"name": "87297",
"refsource": "OSVDB",
"url": "http://osvdb.org/87297"
"url": "http://secunia.com/advisories/51324",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51324"
},
{
"name": "openSUSE-SU-2012:1572",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html"
"url": "http://secunia.com/advisories/51352",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51352"
},
{
"name": "SUSE-SU-2012:1487",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html"
"url": "http://www.securityfocus.com/bid/56498",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/56498"
},
{
"name": "51352",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51352"
"url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00003.html",
"refsource": "MISC",
"name": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00003.html"
},
{
"name": "51324",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51324"
"url": "http://osvdb.org/87297",
"refsource": "MISC",
"name": "http://osvdb.org/87297"
},
{
"name": "GLSA-201604-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201604-03"
"url": "http://www.openwall.com/lists/oss-security/2012/11/13/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/11/13/2"
},
{
"name": "56498",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/56498"
"url": "http://www.securitytracker.com/id?1027760",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1027760"
},
{
"name": "openSUSE-SU-2012:1573",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80023",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80023"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4537",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,122 +27,146 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2012:1540",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1540.html"
"url": "http://secunia.com/advisories/55082",
"refsource": "MISC",
"name": "http://secunia.com/advisories/55082"
},
{
"name": "SUSE-SU-2014:0470",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html"
"url": "http://security.gentoo.org/glsa/glsa-201309-24.xml",
"refsource": "MISC",
"name": "http://security.gentoo.org/glsa/glsa-201309-24.xml"
},
{
"name": "55082",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55082"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html"
},
{
"name": "xen-setp2mentry-dos(80024)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80024"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html"
},
{
"name": "[oss-security] 20121113 Xen Security Advisory 22 (CVE-2012-4537) - Memory mapping failure DoS vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/11/13/6"
"url": "http://secunia.com/advisories/51413",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51413"
},
{
"name": "51413",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51413"
"url": "https://security.gentoo.org/glsa/201604-03",
"refsource": "MISC",
"name": "https://security.gentoo.org/glsa/201604-03"
},
{
"name": "51200",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51200"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html"
},
{
"name": "GLSA-201309-24",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201309-24.xml"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html"
},
{
"name": "DSA-2582",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2582"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html"
},
{
"name": "SUSE-SU-2012:1486",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
},
{
"name": "[Xen-announce] 20121113 Xen Security Advisory 22 (CVE-2012-4537) - Memory mapping failure DoS vulnerability",
"refsource": "MLIST",
"url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00005.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html"
},
{
"name": "openSUSE-SU-2012:1572",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html"
"url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00005.html",
"refsource": "MISC",
"name": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00005.html"
},
{
"name": "51468",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51468"
"url": "http://osvdb.org/87307",
"refsource": "MISC",
"name": "http://osvdb.org/87307"
},
{
"name": "SUSE-SU-2012:1487",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html"
"url": "http://rhn.redhat.com/errata/RHSA-2012-1540.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-1540.html"
},
{
"name": "SUSE-SU-2014:0446",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
"url": "http://secunia.com/advisories/51200",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51200"
},
{
"name": "51352",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51352"
"url": "http://secunia.com/advisories/51324",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51324"
},
{
"name": "51324",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51324"
"url": "http://secunia.com/advisories/51352",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51352"
},
{
"name": "GLSA-201604-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201604-03"
"url": "http://secunia.com/advisories/51468",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51468"
},
{
"name": "56498",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/56498"
"url": "http://www.debian.org/security/2012/dsa-2582",
"refsource": "MISC",
"name": "http://www.debian.org/security/2012/dsa-2582"
},
{
"name": "SUSE-SU-2012:1615",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html"
"url": "http://www.openwall.com/lists/oss-security/2012/11/13/6",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/11/13/6"
},
{
"name": "openSUSE-SU-2012:1573",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html"
"url": "http://www.securityfocus.com/bid/56498",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/56498"
},
{
"name": "87307",
"refsource": "OSVDB",
"url": "http://osvdb.org/87307"
"url": "http://www.securitytracker.com/id?1027761",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1027761"
},
{
"name": "1027761",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027761"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80024",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80024"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4538",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,112 +27,136 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "55082",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55082"
"url": "http://secunia.com/advisories/55082",
"refsource": "MISC",
"name": "http://secunia.com/advisories/55082"
},
{
"name": "51413",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51413"
"url": "http://security.gentoo.org/glsa/glsa-201309-24.xml",
"refsource": "MISC",
"name": "http://security.gentoo.org/glsa/glsa-201309-24.xml"
},
{
"name": "51200",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51200"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html"
},
{
"name": "1027762",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027762"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html"
},
{
"name": "GLSA-201309-24",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201309-24.xml"
"url": "http://secunia.com/advisories/51413",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51413"
},
{
"name": "DSA-2582",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2582"
"url": "https://security.gentoo.org/glsa/201604-03",
"refsource": "MISC",
"name": "https://security.gentoo.org/glsa/201604-03"
},
{
"name": "SUSE-SU-2012:1486",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html"
},
{
"name": "87306",
"refsource": "OSVDB",
"url": "http://osvdb.org/87306"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html"
},
{
"name": "openSUSE-SU-2012:1572",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html"
},
{
"name": "51468",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51468"
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
},
{
"name": "SUSE-SU-2012:1487",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html"
"url": "http://secunia.com/advisories/51200",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51200"
},
{
"name": "xen-hvmop-dos(80025)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80025"
"url": "http://secunia.com/advisories/51324",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51324"
},
{
"name": "SUSE-SU-2014:0446",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
"url": "http://secunia.com/advisories/51352",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51352"
},
{
"name": "51352",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51352"
"url": "http://secunia.com/advisories/51468",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51468"
},
{
"name": "51324",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51324"
"url": "http://www.debian.org/security/2012/dsa-2582",
"refsource": "MISC",
"name": "http://www.debian.org/security/2012/dsa-2582"
},
{
"name": "GLSA-201604-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201604-03"
"url": "http://www.securityfocus.com/bid/56498",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/56498"
},
{
"name": "[oss-security] 20121113 Xen Security Advisory 23 (CVE-2012-4538) - Unhooking empty PAE entries DoS vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/11/13/3"
"url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00004.html",
"refsource": "MISC",
"name": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00004.html"
},
{
"name": "56498",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/56498"
"url": "http://osvdb.org/87306",
"refsource": "MISC",
"name": "http://osvdb.org/87306"
},
{
"name": "SUSE-SU-2012:1615",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html"
"url": "http://www.openwall.com/lists/oss-security/2012/11/13/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/11/13/3"
},
{
"name": "openSUSE-SU-2012:1573",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html"
"url": "http://www.securitytracker.com/id?1027762",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1027762"
},
{
"name": "[Xen-announce] 20121113 Xen Security Advisory 23 (CVE-2012-4538) - Unhooking empty PAE entries DoS vulnerability",
"refsource": "MLIST",
"url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00004.html"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80025",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80025"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4544",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,112 +27,136 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "SUSE-SU-2014:0470",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html"
},
{
"name": "51071",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51071"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html"
},
{
"name": "[oss-security] 20121026 Xen Security Advisory 25 (CVE-2012-4544) - Xen domain builder Out-of-memory due to malicious kernel/ramdisk",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/10/26/3"
"url": "http://secunia.com/advisories/51413",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51413"
},
{
"name": "FEDORA-2012-17408",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091832.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html"
},
{
"name": "51413",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51413"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html"
},
{
"name": "FEDORA-2012-17204",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091844.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
},
{
"name": "SUSE-SU-2012:1486",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html"
},
{
"name": "DSA-2636",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2636"
"url": "http://secunia.com/advisories/51324",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51324"
},
{
"name": "xen-pvdomainbuilder-dos(79617)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79617"
"url": "http://secunia.com/advisories/51352",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51352"
},
{
"name": "FEDORA-2012-17135",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092050.html"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091832.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091832.html"
},
{
"name": "56289",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/56289"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091844.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091844.html"
},
{
"name": "1027699",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027699"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092050.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092050.html"
},
{
"name": "RHSA-2013:0241",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0241.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html"
},
{
"name": "openSUSE-SU-2012:1572",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html"
"url": "http://osvdb.org/86619",
"refsource": "MISC",
"name": "http://osvdb.org/86619"
},
{
"name": "86619",
"refsource": "OSVDB",
"url": "http://osvdb.org/86619"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0241.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0241.html"
},
{
"name": "SUSE-SU-2012:1487",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html"
"url": "http://secunia.com/advisories/51071",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51071"
},
{
"name": "SUSE-SU-2014:0446",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
"url": "http://www.debian.org/security/2013/dsa-2636",
"refsource": "MISC",
"name": "http://www.debian.org/security/2013/dsa-2636"
},
{
"name": "51352",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51352"
"url": "http://www.openwall.com/lists/oss-security/2012/10/26/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/10/26/3"
},
{
"name": "51324",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51324"
"url": "http://www.securityfocus.com/bid/56289",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/56289"
},
{
"name": "SUSE-SU-2014:0411",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html"
"url": "http://www.securitytracker.com/id?1027699",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1027699"
},
{
"name": "openSUSE-SU-2012:1573",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79617",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79617"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1953",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,22 +27,46 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=951257",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=951257"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:190",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:190"
},
{
"name": "[oss-security] 20130316 Re: autotrace: stack-based buffer overflow in bmp parser",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/04/16/3"
"url": "http://www.openwall.com/lists/oss-security/2013/04/16/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/04/16/3"
},
{
"name": "MDVSA-2013:190",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:190"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=951257",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=951257"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1957",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=132c94e31b8bca8ea921f9f96a57d684fa4ae0a9",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=132c94e31b8bca8ea921f9f96a57d684fa4ae0a9"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=132c94e31b8bca8ea921f9f96a57d684fa4ae0a9",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=132c94e31b8bca8ea921f9f96a57d684fa4ae0a9"
},
{
"name": "[oss-security] 20130416 Re: Re: Summary of security bugs (now fixed) in user namespaces",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/04/16/11"
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.6",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.6"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.6",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.6"
"url": "http://www.openwall.com/lists/oss-security/2013/04/16/11",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/04/16/11"
},
{
"name": "https://github.com/torvalds/linux/commit/132c94e31b8bca8ea921f9f96a57d684fa4ae0a9",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/132c94e31b8bca8ea921f9f96a57d684fa4ae0a9"
"url": "https://github.com/torvalds/linux/commit/132c94e31b8bca8ea921f9f96a57d684fa4ae0a9",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/132c94e31b8bca8ea921f9f96a57d684fa4ae0a9"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1958",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=92f28d973cce45ef5823209aab3138eb45d8b349",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=92f28d973cce45ef5823209aab3138eb45d8b349"
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.6",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.6"
},
{
"name": "[oss-security] 20130416 Re: Re: Summary of security bugs (now fixed) in user namespaces",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/04/16/11"
"url": "http://www.openwall.com/lists/oss-security/2013/04/16/11",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/04/16/11"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.6",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.6"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=92f28d973cce45ef5823209aab3138eb45d8b349",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=92f28d973cce45ef5823209aab3138eb45d8b349"
},
{
"name": "https://github.com/torvalds/linux/commit/92f28d973cce45ef5823209aab3138eb45d8b349",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/92f28d973cce45ef5823209aab3138eb45d8b349"
"url": "https://github.com/torvalds/linux/commit/92f28d973cce45ef5823209aab3138eb45d8b349",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/92f28d973cce45ef5823209aab3138eb45d8b349"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1959",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,42 +27,66 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://github.com/torvalds/linux/commit/e3211c120a85b792978bcb4be7b2886df18d27f0",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/e3211c120a85b792978bcb4be7b2886df18d27f0"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6708075f104c3c9b04b23336bb0366ca30c3931b",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6708075f104c3c9b04b23336bb0366ca30c3931b"
},
{
"name": "https://github.com/torvalds/linux/commit/6708075f104c3c9b04b23336bb0366ca30c3931b",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/6708075f104c3c9b04b23336bb0366ca30c3931b"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e3211c120a85b792978bcb4be7b2886df18d27f0",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e3211c120a85b792978bcb4be7b2886df18d27f0"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6708075f104c3c9b04b23336bb0366ca30c3931b",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6708075f104c3c9b04b23336bb0366ca30c3931b"
"url": "http://www.exploit-db.com/exploits/25307",
"refsource": "MISC",
"name": "http://www.exploit-db.com/exploits/25307"
},
{
"name": "[oss-security] 20130428 Multiple Linux setuid output redirection vulnerabilities",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/04/29/1"
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.9",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.9"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.9",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.9"
"url": "http://www.openwall.com/lists/oss-security/2013/04/29/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/04/29/1"
},
{
"name": "25307",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/25307"
"url": "https://github.com/torvalds/linux/commit/6708075f104c3c9b04b23336bb0366ca30c3931b",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/6708075f104c3c9b04b23336bb0366ca30c3931b"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e3211c120a85b792978bcb4be7b2886df18d27f0",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e3211c120a85b792978bcb4be7b2886df18d27f0"
"url": "https://github.com/torvalds/linux/commit/e3211c120a85b792978bcb4be7b2886df18d27f0",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/e3211c120a85b792978bcb4be7b2886df18d27f0"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2013-1960 libtiff (tiff2pdf): Heap-based buffer overflow in t2_process_jpeg_strip()"
"value": "Heap-based buffer overflow in the t2p_process_jpeg_strip function in tiff2pdf in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image file."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Heap-based Buffer Overflow",
"cweId": "CWE-122"
"value": "n/a"
}
]
}
@ -32,27 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:3.8.2-19.el5_10",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:3.9.4-10.el6_5",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -115,56 +103,16 @@
"refsource": "MISC",
"name": "http://www.debian.org/security/2013/dsa-2698"
},
{
"url": "https://access.redhat.com/errata/RHSA-2014:0222",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2014:0222"
},
{
"url": "https://access.redhat.com/errata/RHSA-2014:0223",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2014:0223"
},
{
"url": "http://www.securityfocus.com/bid/59609",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/59609"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2013-1960",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2013-1960"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952158",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=952158"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.1,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2013-1961 libtiff (tiff2pdf): Stack-based buffer overflow with malformed image-length and resolution"
"value": "Stack-based buffer overflow in the t2p_write_pdf_page function in tiff2pdf in libtiff before 4.0.3 allows remote attackers to cause a denial of service (application crash) via a crafted image length and resolution in a TIFF image file."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Stack-based Buffer Overflow",
"cweId": "CWE-121"
"value": "n/a"
}
]
}
@ -32,27 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:3.8.2-19.el5_10",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:3.9.4-10.el6_5",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -120,51 +108,11 @@
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/59607"
},
{
"url": "https://access.redhat.com/errata/RHSA-2014:0222",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2014:0222"
},
{
"url": "https://access.redhat.com/errata/RHSA-2014:0223",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2014:0223"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2013-1961",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2013-1961"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952131",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=952131"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.3,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
}
]
}
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1962",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,82 +27,106 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "FEDORA-2013-8635",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106906.html"
"url": "http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=ca697e90d5bd6a6dfb94bfb6d4438bdf9a44b739",
"refsource": "MISC",
"name": "http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=ca697e90d5bd6a6dfb94bfb6d4438bdf9a44b739"
},
{
"name": "http://libvirt.org/git/?p=libvirt.git;a=commit;h=ca697e90d5bd6a6dfb94bfb6d4438bdf9a44b739",
"refsource": "CONFIRM",
"url": "http://libvirt.org/git/?p=libvirt.git;a=commit;h=ca697e90d5bd6a6dfb94bfb6d4438bdf9a44b739"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106906.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106906.html"
},
{
"name": "[oss-security] 20130516 CVE-2013-1962 libvirt: DoS (max count of open files exhaustion) due sockets leak in the storage pool",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/05/16/9"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106921.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106921.html"
},
{
"name": "FEDORA-2013-8681",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106921.html"
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00022.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00022.html"
},
{
"name": "93451",
"refsource": "OSVDB",
"url": "http://osvdb.org/93451"
"url": "http://osvdb.org/93451",
"refsource": "MISC",
"name": "http://osvdb.org/93451"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=953107",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953107"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0831.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0831.html"
},
{
"name": "USN-1895-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1895-1"
"url": "http://secunia.com/advisories/53440",
"refsource": "MISC",
"name": "http://secunia.com/advisories/53440"
},
{
"name": "59937",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/59937"
"url": "http://secunia.com/advisories/53475",
"refsource": "MISC",
"name": "http://secunia.com/advisories/53475"
},
{
"name": "53475",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/53475"
"url": "http://www.openwall.com/lists/oss-security/2013/05/16/9",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/05/16/9"
},
{
"name": "53440",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/53440"
"url": "http://www.securityfocus.com/bid/59937",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/59937"
},
{
"name": "RHSA-2013:0831",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0831.html"
"url": "http://www.securitytracker.com/id/1028577",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id/1028577"
},
{
"name": "1028577",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1028577"
"url": "http://www.ubuntu.com/usn/USN-1895-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1895-1"
},
{
"name": "openSUSE-SU-2013:0885",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00022.html"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84341",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84341"
},
{
"name": "libvirt-cve20131962-dos(84341)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84341"
"url": "https://www.redhat.com/archives/libvir-list/2013-May/msg01222.html",
"refsource": "MISC",
"name": "https://www.redhat.com/archives/libvir-list/2013-May/msg01222.html"
},
{
"name": "[libvir-list] 20130516 [libvirt] [PATCH] daemon: fix leak after listing all volumes",
"refsource": "MLIST",
"url": "https://www.redhat.com/archives/libvir-list/2013-May/msg01222.html"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953107",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=953107"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1963",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,12 +27,36 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://owncloud.org/about/security/advisories/oC-SA-2013-018/",
"refsource": "CONFIRM",
"url": "http://owncloud.org/about/security/advisories/oC-SA-2013-018/"
"url": "http://owncloud.org/about/security/advisories/oC-SA-2013-018/",
"refsource": "MISC",
"name": "http://owncloud.org/about/security/advisories/oC-SA-2013-018/"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1964",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,47 +27,71 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "59293",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/59293"
"url": "http://secunia.com/advisories/55082",
"refsource": "MISC",
"name": "http://secunia.com/advisories/55082"
},
{
"name": "55082",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55082"
"url": "http://security.gentoo.org/glsa/glsa-201309-24.xml",
"refsource": "MISC",
"name": "http://security.gentoo.org/glsa/glsa-201309-24.xml"
},
{
"name": "[oss-security] 20130418 Xen Security Advisory 50 (CVE-2013-1964) - grant table hypercall acquire/release imbalance",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/04/18/9"
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
},
{
"name": "GLSA-201309-24",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201309-24.xml"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104537.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104537.html"
},
{
"name": "DSA-2666",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2666"
"url": "http://www.debian.org/security/2013/dsa-2666",
"refsource": "MISC",
"name": "http://www.debian.org/security/2013/dsa-2666"
},
{
"name": "1028459",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1028459"
"url": "http://www.openwall.com/lists/oss-security/2013/04/18/9",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/04/18/9"
},
{
"name": "SUSE-SU-2014:0446",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
"url": "http://www.securityfocus.com/bid/59293",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/59293"
},
{
"name": "FEDORA-2013-6723",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104537.html"
"url": "http://www.securitytracker.com/id/1028459",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id/1028459"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1967",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,47 +27,71 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "mediaelementjs-flashmediaelement-xss(83647)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83647"
"url": "http://owncloud.org/about/security/advisories/oC-SA-2013-017",
"refsource": "MISC",
"name": "http://owncloud.org/about/security/advisories/oC-SA-2013-017"
},
{
"name": "https://github.com/johndyer/mediaelement/commit/9223dc6bfc50251a9a3cba0210e71be80fc38ecd",
"refsource": "CONFIRM",
"url": "https://github.com/johndyer/mediaelement/commit/9223dc6bfc50251a9a3cba0210e71be80fc38ecd"
"url": "http://seclists.org/oss-sec/2013/q2/111",
"refsource": "MISC",
"name": "http://seclists.org/oss-sec/2013/q2/111"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=955307",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=955307"
"url": "http://seclists.org/oss-sec/2013/q2/133",
"refsource": "MISC",
"name": "http://seclists.org/oss-sec/2013/q2/133"
},
{
"name": "[oss-security] 20130417 Fwd: Re: CVE Request: ownCloud 5.0.5 and 4.5.10",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2013/q2/111"
"url": "http://secunia.com/advisories/53079",
"refsource": "MISC",
"name": "http://secunia.com/advisories/53079"
},
{
"name": "53079",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/53079"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83647",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83647"
},
{
"name": "http://owncloud.org/about/security/advisories/oC-SA-2013-017",
"refsource": "CONFIRM",
"url": "http://owncloud.org/about/security/advisories/oC-SA-2013-017"
"url": "https://github.com/johndyer/mediaelement/commit/9223dc6bfc50251a9a3cba0210e71be80fc38ecd",
"refsource": "MISC",
"name": "https://github.com/johndyer/mediaelement/commit/9223dc6bfc50251a9a3cba0210e71be80fc38ecd"
},
{
"name": "[oss-security] 20130421 ownCloud Security Advisories (2013-017, 2013-018)",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2013/q2/133"
"url": "https://github.com/johndyer/mediaelement/tree/2.11.1",
"refsource": "MISC",
"name": "https://github.com/johndyer/mediaelement/tree/2.11.1"
},
{
"name": "https://github.com/johndyer/mediaelement/tree/2.11.1",
"refsource": "CONFIRM",
"url": "https://github.com/johndyer/mediaelement/tree/2.11.1"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=955307",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=955307"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4441",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -39,6 +39,7 @@
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "2.06"
}
]
@ -53,24 +54,24 @@
"references": {
"reference_data": [
{
"url": "http://www.openwall.com/lists/oss-security/2013/06/06/1",
"refsource": "MISC",
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726578",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726578"
"name": "http://www.openwall.com/lists/oss-security/2013/06/06/1"
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/10/16/15",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/06/06/1",
"url": "http://www.openwall.com/lists/oss-security/2013/06/06/1"
"name": "http://www.openwall.com/lists/oss-security/2013/10/16/15"
},
{
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726578",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/10/16/15",
"url": "http://www.openwall.com/lists/oss-security/2013/10/16/15"
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726578"
},
{
"url": "https://www.openwall.com/lists/oss-security/2012/01/22/6",
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2012/01/22/6",
"url": "https://www.openwall.com/lists/oss-security/2012/01/22/6"
"name": "https://www.openwall.com/lists/oss-security/2012/01/22/6"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4442",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,52 +27,76 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20140606 Re: CVE Request: pwgen",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/06/06/1"
},
{
"name": "http://sourceforge.net/p/pwgen/code/ci/00118ccac4656adb028504639b313d7b09e62b79/",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/p/pwgen/code/ci/00118ccac4656adb028504639b313d7b09e62b79/"
},
{
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=672241",
"url": "http://advisories.mageia.org/MGASA-2014-0535.html",
"refsource": "MISC",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=672241"
"name": "http://advisories.mageia.org/MGASA-2014-0535.html"
},
{
"name": "FEDORA-2014-16406",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146237.html"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146015.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146015.html"
},
{
"name": "FEDORA-2014-16368",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146015.html"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146237.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146237.html"
},
{
"name": "[oss-security] 20141015 Re: RESEND: CVE Request: pwgen",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/10/16/15"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146285.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146285.html"
},
{
"name": "MDVSA-2015:008",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:008"
"url": "http://sourceforge.net/p/pwgen/code/ci/00118ccac4656adb028504639b313d7b09e62b79/",
"refsource": "MISC",
"name": "http://sourceforge.net/p/pwgen/code/ci/00118ccac4656adb028504639b313d7b09e62b79/"
},
{
"name": "FEDORA-2014-16473",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146285.html"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:008",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:008"
},
{
"name": "http://advisories.mageia.org/MGASA-2014-0535.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2014-0535.html"
"url": "http://www.openwall.com/lists/oss-security/2013/06/06/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/06/06/1"
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/10/16/15",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/10/16/15"
},
{
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=672241",
"refsource": "MISC",
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=672241"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4449",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,87 +27,111 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
"refsource": "MISC",
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
},
{
"name": "http://www.openldap.org/its/index.cgi/Incoming?id=7723",
"refsource": "CONFIRM",
"url": "http://www.openldap.org/its/index.cgi/Incoming?id=7723"
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735",
"refsource": "MISC",
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735"
},
{
"name": "MDVSA-2014:026",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:026"
"url": "http://seclists.org/fulldisclosure/2019/Dec/26",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2019/Dec/26"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1019490",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019490"
"url": "https://seclists.org/bugtraq/2019/Dec/23",
"refsource": "MISC",
"name": "https://seclists.org/bugtraq/2019/Dec/23"
},
{
"name": "DSA-3209",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3209"
"url": "https://support.apple.com/kb/HT210788",
"refsource": "MISC",
"name": "https://support.apple.com/kb/HT210788"
},
{
"name": "RHSA-2014:0126",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0126.html"
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "MISC",
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"name": "[oss-security] 20131018 Re: CVE request: slapd segfaults on certain queries with rwm overlay enabled",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/10/19/3"
"url": "http://rhn.redhat.com/errata/RHSA-2014-0126.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2014-0126.html"
},
{
"name": "RHSA-2014:0206",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0206.html"
"url": "http://rhn.redhat.com/errata/RHSA-2014-0206.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2014-0206.html"
},
{
"name": "63190",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/63190"
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-4449",
"refsource": "MISC",
"name": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-4449"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
"url": "http://www.debian.org/security/2015/dsa-3209",
"refsource": "MISC",
"name": "http://www.debian.org/security/2015/dsa-3209"
},
{
"name": "1029711",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029711"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:026",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:026"
},
{
"name": "20140401 Cisco Unified Communications Manager Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-4449"
"url": "http://www.openldap.org/its/index.cgi/Incoming?id=7723",
"refsource": "MISC",
"name": "http://www.openldap.org/its/index.cgi/Incoming?id=7723"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735"
"url": "http://www.openwall.com/lists/oss-security/2013/10/19/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/10/19/3"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT210788",
"url": "https://support.apple.com/kb/HT210788"
"url": "http://www.securityfocus.com/bid/63190",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/63190"
},
{
"refsource": "BUGTRAQ",
"name": "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra",
"url": "https://seclists.org/bugtraq/2019/Dec/23"
"url": "http://www.securitytracker.com/id/1029711",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id/1029711"
},
{
"refsource": "FULLDISC",
"name": "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra",
"url": "http://seclists.org/fulldisclosure/2019/Dec/26"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019490",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1019490"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4452",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "1029390",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029390"
"url": "http://rhn.redhat.com/errata/RHSA-2013-1762.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1762.html"
},
{
"name": "63916",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/63916"
"url": "http://secunia.com/advisories/55852",
"refsource": "MISC",
"name": "http://secunia.com/advisories/55852"
},
{
"name": "55852",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55852"
"url": "http://www.securityfocus.com/bid/63916",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/63916"
},
{
"name": "RHSA-2013:1762",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1762.html"
"url": "http://www.securitytracker.com/id/1029390",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id/1029390"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "It was found that getaddrinfo() did not limit the amount of stack memory used during name resolution. An attacker able to make an application resolve an attacker-controlled hostname or IP address could possibly cause the application to exhaust all stack memory and crash."
"value": "Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6 address results. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1914."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Stack-based Buffer Overflow",
"cweId": "CWE-121"
"value": "n/a"
}
]
}
@ -32,16 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 6",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:2.12-1.149.el6",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -74,21 +73,6 @@
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2014:1391",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2014:1391"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2013-4458",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2013-4458"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1022280",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1022280"
},
{
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=16072",
"refsource": "MISC",
@ -100,30 +84,5 @@
"name": "https://sourceware.org/ml/libc-alpha/2013-10/msg00733.html"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.3,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
}
]
}
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4459",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "USN-2012-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2012-1"
},
{
"name": "https://bugs.launchpad.net/ubuntu/%2Bsource/lightdm/%2Bbug/1243339",
"url": "http://lists.freedesktop.org/archives/lightdm/2013-October/000471.html",
"refsource": "MISC",
"url": "https://bugs.launchpad.net/ubuntu/%2Bsource/lightdm/%2Bbug/1243339"
"name": "http://lists.freedesktop.org/archives/lightdm/2013-October/000471.html"
},
{
"name": "[LightDM] 20131030 lightdm 1.9.2 released",
"refsource": "MLIST",
"url": "http://lists.freedesktop.org/archives/lightdm/2013-October/000471.html"
"url": "http://lists.freedesktop.org/archives/lightdm/2013-October/000472.html",
"refsource": "MISC",
"name": "http://lists.freedesktop.org/archives/lightdm/2013-October/000472.html"
},
{
"name": "[LightDM] 20131031 lightdm 1.8.4 released",
"refsource": "MLIST",
"url": "http://lists.freedesktop.org/archives/lightdm/2013-October/000472.html"
"url": "http://www.ubuntu.com/usn/USN-2012-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2012-1"
},
{
"url": "https://bugs.launchpad.net/ubuntu/%2Bsource/lightdm/%2Bbug/1243339",
"refsource": "MISC",
"name": "https://bugs.launchpad.net/ubuntu/%2Bsource/lightdm/%2Bbug/1243339"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4460",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,32 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://www.mantisbt.org/bugs/view.php?id=16513",
"refsource": "CONFIRM",
"url": "http://www.mantisbt.org/bugs/view.php?id=16513"
"url": "http://osvdb.org/98823",
"refsource": "MISC",
"name": "http://osvdb.org/98823"
},
{
"name": "98823",
"refsource": "OSVDB",
"url": "http://osvdb.org/98823"
"url": "http://seclists.org/oss-sec/2013/q4/168",
"refsource": "MISC",
"name": "http://seclists.org/oss-sec/2013/q4/168"
},
{
"name": "https://github.com/mantisbt/mantisbt/commit/0002d106a6cd35cb0a6fe03246531a4e3f32c9d0#diff-4122320b011a3291cd45da074a867076",
"refsource": "CONFIRM",
"url": "https://github.com/mantisbt/mantisbt/commit/0002d106a6cd35cb0a6fe03246531a4e3f32c9d0#diff-4122320b011a3291cd45da074a867076"
"url": "http://secunia.com/advisories/55305",
"refsource": "MISC",
"name": "http://secunia.com/advisories/55305"
},
{
"name": "[oss-security] 20131022 Re: CVE Request: MantisBT before 1.2.16 XSS vulnerability",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2013/q4/168"
"url": "http://www.mantisbt.org/bugs/view.php?id=16513",
"refsource": "MISC",
"name": "http://www.mantisbt.org/bugs/view.php?id=16513"
},
{
"name": "55305",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55305"
"url": "https://github.com/mantisbt/mantisbt/commit/0002d106a6cd35cb0a6fe03246531a4e3f32c9d0#diff-4122320b011a3291cd45da074a867076",
"refsource": "MISC",
"name": "https://github.com/mantisbt/mantisbt/commit/0002d106a6cd35cb0a6fe03246531a4e3f32c9d0#diff-4122320b011a3291cd45da074a867076"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4461",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,22 +27,46 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1016263",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1016263"
"url": "http://rhn.redhat.com/errata/RHSA-2013-1851.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1851.html"
},
{
"name": "RHSA-2013:1851",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1851.html"
"url": "http://rhn.redhat.com/errata/RHSA-2013-1852.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1852.html"
},
{
"name": "RHSA-2013:1852",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1852.html"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1016263",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1016263"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4463",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "OpenStack Compute (Nova) Folsom, Grizzly, and Havana does not properly verify the virtual size of a QCOW2 image, which allows local users to cause a denial of service (host file system disk consumption) via a compressed QCOW2 image. NOTE: this issue is due to an incomplete fix for CVE-2013-2096."
"value": "OpenStack Compute (Nova) Folsom, Grizzly, and Havana does not properly verify the virtual size of a QCOW2 image, which allows local users to cause a denial of service (host file system disk consumption) via a compressed QCOW2 image. NOTE: this issue is due to an incomplete fix for CVE-2013-2096."
}
]
},
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugs.launchpad.net/nova/+bug/1206081",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/nova/+bug/1206081"
"url": "http://rhn.redhat.com/errata/RHSA-2014-0112.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2014-0112.html"
},
{
"name": "[oss-security] 20131031 [OSSA 2013-029] Potential Nova denial of service through compressed disk images (CVE-2013-4463, CVE-2013-4469)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/10/31/3"
"url": "http://www.openwall.com/lists/oss-security/2013/10/31/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/10/31/3"
},
{
"name": "USN-2247-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2247-1"
"url": "http://www.ubuntu.com/usn/USN-2247-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2247-1"
},
{
"name": "RHSA-2014:0112",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0112.html"
"url": "https://bugs.launchpad.net/nova/+bug/1206081",
"refsource": "MISC",
"name": "https://bugs.launchpad.net/nova/+bug/1206081"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4469",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "OpenStack Compute (Nova) Folsom, Grizzly, and Havana, when use_cow_images is set to False, does not verify the virtual size of a QCOW2 image, which allows local users to cause a denial of service (host file system disk consumption) by transferring an image with a large virtual size that does not contain a large amount of data from Glance. NOTE: this issue is due to an incomplete fix for CVE-2013-2096."
"value": "OpenStack Compute (Nova) Folsom, Grizzly, and Havana, when use_cow_images is set to False, does not verify the virtual size of a QCOW2 image, which allows local users to cause a denial of service (host file system disk consumption) by transferring an image with a large virtual size that does not contain a large amount of data from Glance. NOTE: this issue is due to an incomplete fix for CVE-2013-2096."
}
]
},
@ -50,22 +27,46 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugs.launchpad.net/nova/+bug/1206081",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/nova/+bug/1206081"
"url": "http://www.openwall.com/lists/oss-security/2013/10/31/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/10/31/3"
},
{
"name": "[oss-security] 20131031 [OSSA 2013-029] Potential Nova denial of service through compressed disk images (CVE-2013-4463, CVE-2013-4469)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/10/31/3"
"url": "http://www.ubuntu.com/usn/USN-2247-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2247-1"
},
{
"name": "USN-2247-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2247-1"
"url": "https://bugs.launchpad.net/nova/+bug/1206081",
"refsource": "MISC",
"name": "https://bugs.launchpad.net/nova/+bug/1206081"
}
]
}