diff --git a/2012/4xxx/CVE-2012-4573.json b/2012/4xxx/CVE-2012-4573.json index c15f05985ea..81583664e63 100644 --- a/2012/4xxx/CVE-2012-4573.json +++ b/2012/4xxx/CVE-2012-4573.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-4573", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,92 +27,116 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "51174", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51174" - }, - { - "name": "51234", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51234" - }, - { - "name": "USN-1626-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1626-1" - }, - { - "name": "RHSA-2012:1558", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2012-1558.html" - }, - { - "name": "56437", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/56437" - }, - { - "name": "https://github.com/openstack/glance/commit/90bcdc5a89e350a358cf320a03f5afe99795f6f6", - "refsource": "CONFIRM", - "url": "https://github.com/openstack/glance/commit/90bcdc5a89e350a358cf320a03f5afe99795f6f6" - }, - { - "name": "FEDORA-2012-17901", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092192.html" - }, - { - "name": "[oss-security] 20121107 [OSSA 2012-017] Authentication bypass for image deletion (CVE-2012-4573)", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/11/07/6" - }, - { - "name": "[oss-security] 20121109 [OSSA 2012-017.1] Authentication bypass for image deletion (CVE-2012-4573, CVE-2012-5482) ERRATA 1", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/11/09/5" - }, - { - "name": "http://packetstormsecurity.com/files/118733/Red-Hat-Security-Advisory-2012-1558-01.html", + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092192.html", "refsource": "MISC", - "url": "http://packetstormsecurity.com/files/118733/Red-Hat-Security-Advisory-2012-1558-01.html" + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092192.html" }, { - "name": "87248", - "refsource": "OSVDB", - "url": "http://osvdb.org/87248" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00002.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00002.html" }, { - "name": "https://github.com/openstack/glance/commit/6ab0992e5472ae3f9bef0d2ced41030655d9d2bc", - "refsource": "CONFIRM", - "url": "https://github.com/openstack/glance/commit/6ab0992e5472ae3f9bef0d2ced41030655d9d2bc" + "url": "http://osvdb.org/87248", + "refsource": "MISC", + "name": "http://osvdb.org/87248" }, { - "name": "USN-1626-2", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1626-2" + "url": "http://packetstormsecurity.com/files/118733/Red-Hat-Security-Advisory-2012-1558-01.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/118733/Red-Hat-Security-Advisory-2012-1558-01.html" }, { - "name": "https://bugs.launchpad.net/glance/+bug/1065187", - "refsource": "CONFIRM", - "url": "https://bugs.launchpad.net/glance/+bug/1065187" + "url": "http://rhn.redhat.com/errata/RHSA-2012-1558.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2012-1558.html" }, { - "name": "SUSE-SU-2012:1455", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00002.html" + "url": "http://secunia.com/advisories/51174", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51174" }, { - "name": "https://github.com/openstack/glance/commit/efd7e75b1f419a52c7103c7840e24af8e5deb29d", - "refsource": "CONFIRM", - "url": "https://github.com/openstack/glance/commit/efd7e75b1f419a52c7103c7840e24af8e5deb29d" + "url": "http://secunia.com/advisories/51234", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51234" }, { - "name": "openstack-glance-sec-bypass(79895)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79895" + "url": "http://www.openwall.com/lists/oss-security/2012/11/07/6", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/11/07/6" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/11/09/5", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/11/09/5" + }, + { + "url": "http://www.securityfocus.com/bid/56437", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/56437" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1626-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1626-1" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1626-2", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1626-2" + }, + { + "url": "https://bugs.launchpad.net/glance/+bug/1065187", + "refsource": "MISC", + "name": "https://bugs.launchpad.net/glance/+bug/1065187" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79895", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79895" + }, + { + "url": "https://github.com/openstack/glance/commit/6ab0992e5472ae3f9bef0d2ced41030655d9d2bc", + "refsource": "MISC", + "name": "https://github.com/openstack/glance/commit/6ab0992e5472ae3f9bef0d2ced41030655d9d2bc" + }, + { + "url": "https://github.com/openstack/glance/commit/90bcdc5a89e350a358cf320a03f5afe99795f6f6", + "refsource": "MISC", + "name": "https://github.com/openstack/glance/commit/90bcdc5a89e350a358cf320a03f5afe99795f6f6" + }, + { + "url": "https://github.com/openstack/glance/commit/efd7e75b1f419a52c7103c7840e24af8e5deb29d", + "refsource": "MISC", + "name": "https://github.com/openstack/glance/commit/efd7e75b1f419a52c7103c7840e24af8e5deb29d" } ] } diff --git a/2012/5xxx/CVE-2012-5483.json b/2012/5xxx/CVE-2012-5483.json index 6c58d2820e3..85c99819940 100644 --- a/2012/5xxx/CVE-2012-5483.json +++ b/2012/5xxx/CVE-2012-5483.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-5483", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,32 +27,56 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "56888", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/56888" - }, - { - "name": "RHSA-2012:1556", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2012-1556.html" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=873447", + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-December/094286.html", "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=873447" + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-December/094286.html" }, { - "name": "keystone-secret-key-info-disc(80612)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80612" + "url": "http://rhn.redhat.com/errata/RHSA-2012-1556.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2012-1556.html" }, { - "name": "FEDORA-2012-19341", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-December/094286.html" + "url": "http://www.securityfocus.com/bid/56888", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/56888" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80612", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80612" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=873447", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=873447" } ] } diff --git a/2012/5xxx/CVE-2012-5489.json b/2012/5xxx/CVE-2012-5489.json index 309d28ac515..c534dfc124f 100644 --- a/2012/5xxx/CVE-2012-5489.json +++ b/2012/5xxx/CVE-2012-5489.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-5489", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,32 +27,56 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt", - "refsource": "CONFIRM", - "url": "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt" + "url": "http://www.openwall.com/lists/oss-security/2012/11/10/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/11/10/1" }, { - "name": "[oss-security] 20121109 Re: Re: CVE Request - Zope / Plone: Multiple vectors corrected within 20121106 fix", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/11/10/1" + "url": "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt", + "refsource": "MISC", + "name": "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt" }, { - "name": "https://plone.org/products/plone/security/advisories/20121106/05", - "refsource": "CONFIRM", - "url": "https://plone.org/products/plone/security/advisories/20121106/05" + "url": "https://plone.org/products/plone-hotfix/releases/20121106", + "refsource": "MISC", + "name": "https://plone.org/products/plone-hotfix/releases/20121106" }, { - "name": "https://bugs.launchpad.net/zope2/+bug/1079238", - "refsource": "CONFIRM", - "url": "https://bugs.launchpad.net/zope2/+bug/1079238" + "url": "https://bugs.launchpad.net/zope2/+bug/1079238", + "refsource": "MISC", + "name": "https://bugs.launchpad.net/zope2/+bug/1079238" }, { - "name": "https://plone.org/products/plone-hotfix/releases/20121106", - "refsource": "CONFIRM", - "url": "https://plone.org/products/plone-hotfix/releases/20121106" + "url": "https://plone.org/products/plone/security/advisories/20121106/05", + "refsource": "MISC", + "name": "https://plone.org/products/plone/security/advisories/20121106/05" } ] } diff --git a/2012/5xxx/CVE-2012-5493.json b/2012/5xxx/CVE-2012-5493.json index 04b105573fa..2fb31bdf5f6 100644 --- a/2012/5xxx/CVE-2012-5493.json +++ b/2012/5xxx/CVE-2012-5493.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-5493", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt", - "refsource": "CONFIRM", - "url": "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt" + "url": "http://www.openwall.com/lists/oss-security/2012/11/10/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/11/10/1" }, { - "name": "[oss-security] 20121109 Re: Re: CVE Request - Zope / Plone: Multiple vectors corrected within 20121106 fix", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/11/10/1" + "url": "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt", + "refsource": "MISC", + "name": "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt" }, { - "name": "https://plone.org/products/plone/security/advisories/20121106/09", - "refsource": "CONFIRM", - "url": "https://plone.org/products/plone/security/advisories/20121106/09" + "url": "https://plone.org/products/plone-hotfix/releases/20121106", + "refsource": "MISC", + "name": "https://plone.org/products/plone-hotfix/releases/20121106" }, { - "name": "https://plone.org/products/plone-hotfix/releases/20121106", - "refsource": "CONFIRM", - "url": "https://plone.org/products/plone-hotfix/releases/20121106" + "url": "https://plone.org/products/plone/security/advisories/20121106/09", + "refsource": "MISC", + "name": "https://plone.org/products/plone/security/advisories/20121106/09" } ] } diff --git a/2012/5xxx/CVE-2012-5499.json b/2012/5xxx/CVE-2012-5499.json index 0d8f82b2e71..1da3fbae24a 100644 --- a/2012/5xxx/CVE-2012-5499.json +++ b/2012/5xxx/CVE-2012-5499.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "It was discovered that Plone, included as a part of luci, did not properly handle the processing of very large values passed to an internal utility function. A remote attacker could use a specially crafted URL that, when processed, would lead to excessive memory consumption." + "value": "python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to cause a denial of service (memory consumption) via a large value, related to formatColumns." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Uncontrolled Resource Consumption", - "cweId": "CWE-400" + "value": "n/a" } ] } @@ -32,16 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 5", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:0.12.2-81.el5", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -64,11 +63,6 @@ "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2012/11/10/1" }, - { - "url": "https://access.redhat.com/errata/RHSA-2014:1194", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2014:1194" - }, { "url": "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt", "refsource": "MISC", @@ -79,46 +73,11 @@ "refsource": "MISC", "name": "https://plone.org/products/plone-hotfix/releases/20121106" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2012-5499", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2012-5499" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874657", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=874657" - }, { "url": "https://plone.org/products/plone/security/advisories/20121106/15", "refsource": "MISC", "name": "https://plone.org/products/plone/security/advisories/20121106/15" } ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "LOW", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 5, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", - "version": "2.0" - } - ] } } \ No newline at end of file diff --git a/2012/5xxx/CVE-2012-5503.json b/2012/5xxx/CVE-2012-5503.json index 96bd7685283..d5f00201008 100644 --- a/2012/5xxx/CVE-2012-5503.json +++ b/2012/5xxx/CVE-2012-5503.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-5503", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://plone.org/products/plone/security/advisories/20121106/19", - "refsource": "CONFIRM", - "url": "https://plone.org/products/plone/security/advisories/20121106/19" + "url": "http://www.openwall.com/lists/oss-security/2012/11/10/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/11/10/1" }, { - "name": "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt", - "refsource": "CONFIRM", - "url": "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt" + "url": "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt", + "refsource": "MISC", + "name": "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt" }, { - "name": "[oss-security] 20121109 Re: Re: CVE Request - Zope / Plone: Multiple vectors corrected within 20121106 fix", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/11/10/1" + "url": "https://plone.org/products/plone-hotfix/releases/20121106", + "refsource": "MISC", + "name": "https://plone.org/products/plone-hotfix/releases/20121106" }, { - "name": "https://plone.org/products/plone-hotfix/releases/20121106", - "refsource": "CONFIRM", - "url": "https://plone.org/products/plone-hotfix/releases/20121106" + "url": "https://plone.org/products/plone/security/advisories/20121106/19", + "refsource": "MISC", + "name": "https://plone.org/products/plone/security/advisories/20121106/19" } ] } diff --git a/2012/5xxx/CVE-2012-5509.json b/2012/5xxx/CVE-2012-5509.json index 2dff158da75..d31cd0b369b 100644 --- a/2012/5xxx/CVE-2012-5509.json +++ b/2012/5xxx/CVE-2012-5509.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2012-5509 aeolus-configserver: aeolus-configserver-setup /tmp file conductor credentials leak" + "value": "aeolus-configserver-setup in the Aeolas Configuration Server, as used in Red Hat CloudForms Cloud Engine before 1.1.2, uses world-readable permissions for a temporary file in /tmp, which allows local users to read credentials by reading this file." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Exposure of Sensitive Information to an Unauthorized Actor", - "cweId": "CWE-200" + "value": "n/a" } ] } @@ -32,28 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "CloudForms for RHEL 6", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:0.13.26-1.el6cf", - "version_affected": "!" - }, - { - "version_value": "0:0.4.12-3.el6cf", - "version_affected": "!" - }, - { - "version_value": "0:1.0.3-1.el6cf", - "version_affected": "!" - }, - { - "version_value": "0:0.8.0-8.el6cf", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -71,46 +58,11 @@ "refsource": "MISC", "name": "http://rhn.redhat.com/errata/RHSA-2013-0545.html" }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:0545", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:0545" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2012-5509", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2012-5509" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=875294", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=875294" } ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "LOW", - "accessVector": "LOCAL", - "authentication": "NONE", - "availabilityImpact": "NONE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 2.1, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", - "version": "2.0" - } - ] } } \ No newline at end of file diff --git a/2012/5xxx/CVE-2012-5513.json b/2012/5xxx/CVE-2012-5513.json index e1fdfc3db2e..f4aa51992ea 100644 --- a/2012/5xxx/CVE-2012-5513.json +++ b/2012/5xxx/CVE-2012-5513.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2012-5513 kernel: xen: XENMEM_exchange may overwrite hypervisor memory" + "value": "The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Restriction of Operations within the Bounds of a Memory Buffer", - "cweId": "CWE-119" + "value": "n/a" } ] } @@ -32,16 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 5", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:2.6.18-308.24.1.el5", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -94,11 +93,6 @@ "refsource": "MISC", "name": "http://www.debian.org/security/2012/dsa-2582" }, - { - "url": "https://access.redhat.com/errata/RHSA-2012:1540", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2012:1540" - }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html", "refsource": "MISC", @@ -169,46 +163,11 @@ "refsource": "MISC", "name": "http://www.securityfocus.com/bid/56797" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2012-5513", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2012-5513" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=877391", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=877391" - }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80482", "refsource": "MISC", "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80482" } ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "MEDIUM", - "accessVector": "ADJACENT_NETWORK", - "authentication": "SINGLE", - "availabilityImpact": "COMPLETE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 7.4, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "COMPLETE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "COMPLETE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", - "version": "2.0" - } - ] } } \ No newline at end of file diff --git a/2012/5xxx/CVE-2012-5519.json b/2012/5xxx/CVE-2012-5519.json index 44215eb952e..6108cf48f17 100644 --- a/2012/5xxx/CVE-2012-5519.json +++ b/2012/5xxx/CVE-2012-5519.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2012-5519 cups: privilege escalation for users of the CUPS SystemGroup group" + "value": "CUPS 1.4.4, when running in certain Linux distributions such as Debian GNU/Linux, stores the web interface administrator key in /var/run/cups/certs/0 using certain permissions, which allows local users in the lpadmin group to read or write arbitrary files as root by leveraging the web interface." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Access Control", - "cweId": "CWE-284" + "value": "n/a" } ] } @@ -32,27 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 5", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "1:1.3.7-30.el5_9.3", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 6", - "version": { - "version_data": [ - { - "version_value": "1:1.4.2-50.el6_4.4", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -125,51 +113,11 @@ "refsource": "MISC", "name": "http://www.ubuntu.com/usn/USN-1654-1" }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:0580", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:0580" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2012-5519", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2012-5519" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=875898", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=875898" - }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80012", "refsource": "MISC", "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80012" } ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "MEDIUM", - "accessVector": "ADJACENT_NETWORK", - "authentication": "SINGLE", - "availabilityImpact": "COMPLETE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 7.4, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "COMPLETE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "COMPLETE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", - "version": "2.0" - } - ] } } \ No newline at end of file diff --git a/2012/5xxx/CVE-2012-5523.json b/2012/5xxx/CVE-2012-5523.json index 2f047c991d3..8b5b4043695 100644 --- a/2012/5xxx/CVE-2012-5523.json +++ b/2012/5xxx/CVE-2012-5523.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-5523", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,47 +27,71 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "FEDORA-2012-18299", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { - "name": "56520", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/56520" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { - "name": "mantisbt-cloned-info-disc(80070)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80070" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { - "name": "[oss-security] 20121114 Re: CVE request: mantis before 1.2.12", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2012/11/14/1" + "url": "http://openwall.com/lists/oss-security/2012/11/14/1", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2012/11/14/1" }, { - "name": "FEDORA-2012-18294", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" + "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=150", + "refsource": "MISC", + "name": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=150" }, { - "name": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=150", - "refsource": "CONFIRM", - "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=150" + "url": "http://www.securityfocus.com/bid/56520", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/56520" }, { - "name": "FEDORA-2012-18273", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" + "url": "http://www.mantisbt.org/bugs/view.php?id=14704", + "refsource": "MISC", + "name": "http://www.mantisbt.org/bugs/view.php?id=14704" }, { - "name": "http://www.mantisbt.org/bugs/view.php?id=14704", - "refsource": "CONFIRM", - "url": "http://www.mantisbt.org/bugs/view.php?id=14704" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80070", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80070" } ] } diff --git a/2012/5xxx/CVE-2012-5529.json b/2012/5xxx/CVE-2012-5529.json index 2d38b21f457..f0fd8c156e1 100644 --- a/2012/5xxx/CVE-2012-5529.json +++ b/2012/5xxx/CVE-2012-5529.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-5529", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "1027769", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id?1027769" + "url": "http://tracker.firebirdsql.org/browse/CORE-3884", + "refsource": "MISC", + "name": "http://tracker.firebirdsql.org/browse/CORE-3884" }, { - "name": "firebird-tracedsqlprepareprepare-dos(80073)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80073" + "url": "http://www.debian.org/security/2013/dsa-2648", + "refsource": "MISC", + "name": "http://www.debian.org/security/2013/dsa-2648" }, { - "name": "56521", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/56521" + "url": "http://www.openwall.com/lists/oss-security/2012/11/14/6", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/11/14/6" }, { - "name": "[oss-security] 20121114 CVE Request -- firebird: DoS (NULL pointer dereference) while preparing an empty query with trace enabled", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/11/14/6" + "url": "http://www.openwall.com/lists/oss-security/2012/11/14/8", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/11/14/8" }, { - "name": "http://tracker.firebirdsql.org/browse/CORE-3884", - "refsource": "CONFIRM", - "url": "http://tracker.firebirdsql.org/browse/CORE-3884" + "url": "http://www.securityfocus.com/bid/56521", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/56521" }, { - "name": "DSA-2648", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2013/dsa-2648" + "url": "http://www.securitytracker.com/id?1027769", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id?1027769" }, { - "name": "[oss-security] 20121114 Re: CVE Request -- firebird: DoS (NULL pointer dereference) while preparing an empty query with trace enabled", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/11/14/8" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80073", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80073" } ] } diff --git a/2012/5xxx/CVE-2012-5559.json b/2012/5xxx/CVE-2012-5559.json index abad60f2576..0e1720d7703 100644 --- a/2012/5xxx/CVE-2012-5559.json +++ b/2012/5xxx/CVE-2012-5559.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-5559", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://drupal.org/node/1840992", + "url": "http://drupal.org/node/1840992", "refsource": "MISC", - "url": "http://drupal.org/node/1840992" + "name": "http://drupal.org/node/1840992" }, { - "name": "http://drupal.org/node/1841030", - "refsource": "CONFIRM", - "url": "http://drupal.org/node/1841030" + "url": "http://drupal.org/node/1841030", + "refsource": "MISC", + "name": "http://drupal.org/node/1841030" }, { - "name": "51259", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51259" + "url": "http://secunia.com/advisories/51259", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51259" }, { - "name": "[oss-security] 20121120 Re: CVE Request for Drupal Contributed Modules", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/11/20/4" + "url": "http://www.openwall.com/lists/oss-security/2012/11/20/4", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/11/20/4" } ] } diff --git a/2012/5xxx/CVE-2012-5563.json b/2012/5xxx/CVE-2012-5563.json index 9516512d509..5b4e09a50cf 100644 --- a/2012/5xxx/CVE-2012-5563.json +++ b/2012/5xxx/CVE-2012-5563.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-5563", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by creating new tokens through token chaining. NOTE: this issue exists because of a CVE-2012-3426 regression." + "value": "OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by creating new tokens through token chaining. NOTE: this issue exists because of a CVE-2012-3426 regression." } ] }, @@ -50,62 +27,86 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "RHSA-2012:1557", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2012-1557.html" + "url": "http://rhn.redhat.com/errata/RHSA-2012-1557.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2012-1557.html" }, { - "name": "[oss-security] 20121128 [OSSA 2012-018] EC2-style credentials invalidation issue (CVE-2012-5571)", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/11/28/5" + "url": "http://secunia.com/advisories/51423", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51423" }, { - "name": "https://github.com/openstack/keystone/commit/38c7e46a640a94da4da89a39a5a1ea9c081f1eb5", - "refsource": "CONFIRM", - "url": "https://github.com/openstack/keystone/commit/38c7e46a640a94da4da89a39a5a1ea9c081f1eb5" + "url": "http://secunia.com/advisories/51436", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51436" }, { - "name": "56727", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/56727" + "url": "http://www.openwall.com/lists/oss-security/2012/11/28/5", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/11/28/5" }, { - "name": "USN-1641-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1641-1" + "url": "http://www.openwall.com/lists/oss-security/2012/11/28/6", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/11/28/6" }, { - "name": "https://github.com/openstack/keystone/commit/f9d4766249a72d8f88d75dcf1575b28dd3496681", - "refsource": "CONFIRM", - "url": "https://github.com/openstack/keystone/commit/f9d4766249a72d8f88d75dcf1575b28dd3496681" + "url": "http://www.securityfocus.com/bid/56727", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/56727" }, { - "name": "[oss-security] 20121128 [OSSA 2012-019] Extension of token validity through token chaining (CVE-2012-5563)", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/11/28/6" + "url": "http://www.ubuntu.com/usn/USN-1641-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1641-1" }, { - "name": "https://bugs.launchpad.net/keystone/+bug/1079216", - "refsource": "CONFIRM", - "url": "https://bugs.launchpad.net/keystone/+bug/1079216" + "url": "https://bugs.launchpad.net/keystone/+bug/1079216", + "refsource": "MISC", + "name": "https://bugs.launchpad.net/keystone/+bug/1079216" }, { - "name": "51423", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51423" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80370", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80370" }, { - "name": "folsom-tokens-security-bypass(80370)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80370" + "url": "https://github.com/openstack/keystone/commit/38c7e46a640a94da4da89a39a5a1ea9c081f1eb5", + "refsource": "MISC", + "name": "https://github.com/openstack/keystone/commit/38c7e46a640a94da4da89a39a5a1ea9c081f1eb5" }, { - "name": "51436", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51436" + "url": "https://github.com/openstack/keystone/commit/f9d4766249a72d8f88d75dcf1575b28dd3496681", + "refsource": "MISC", + "name": "https://github.com/openstack/keystone/commit/f9d4766249a72d8f88d75dcf1575b28dd3496681" } ] } diff --git a/2012/5xxx/CVE-2012-5573.json b/2012/5xxx/CVE-2012-5573.json index d59b4587fc4..b9236d11902 100644 --- a/2012/5xxx/CVE-2012-5573.json +++ b/2012/5xxx/CVE-2012-5573.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-5573", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,52 +27,76 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "GLSA-201301-03", - "refsource": "GENTOO", - "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" + "url": "http://openwall.com/lists/oss-security/2012/11/26/11", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2012/11/26/11" }, { - "name": "https://trac.torproject.org/projects/tor/ticket/6252", - "refsource": "CONFIRM", - "url": "https://trac.torproject.org/projects/tor/ticket/6252" + "url": "http://secunia.com/advisories/51329", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51329" }, { - "name": "https://bugs.gentoo.org/show_bug.cgi?id=444804", - "refsource": "CONFIRM", - "url": "https://bugs.gentoo.org/show_bug.cgi?id=444804" + "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml", + "refsource": "MISC", + "name": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { - "name": "51329", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51329" + "url": "https://bugs.gentoo.org/show_bug.cgi?id=444804", + "refsource": "MISC", + "name": "https://bugs.gentoo.org/show_bug.cgi?id=444804" }, { - "name": "https://gitweb.torproject.org/arma/tor.git/commitdiff/b9b54568c0bb64c32bd0b362954bdbc8c1234b16", - "refsource": "CONFIRM", - "url": "https://gitweb.torproject.org/arma/tor.git/commitdiff/b9b54568c0bb64c32bd0b362954bdbc8c1234b16" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80289", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80289" }, { - "name": "[oss-security] 20121126 Re: tor DoS via SENDME cells", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2012/11/26/11" + "url": "https://gitweb.torproject.org/arma/tor.git/commitdiff/b9b54568c0bb64c32bd0b362954bdbc8c1234b16", + "refsource": "MISC", + "name": "https://gitweb.torproject.org/arma/tor.git/commitdiff/b9b54568c0bb64c32bd0b362954bdbc8c1234b16" }, { - "name": "https://gitweb.torproject.org/tor.git/blob/release-0.2.3:/ReleaseNotes", - "refsource": "CONFIRM", - "url": "https://gitweb.torproject.org/tor.git/blob/release-0.2.3:/ReleaseNotes" + "url": "https://gitweb.torproject.org/tor.git/blob/release-0.2.3:/ReleaseNotes", + "refsource": "MISC", + "name": "https://gitweb.torproject.org/tor.git/blob/release-0.2.3:/ReleaseNotes" }, { - "name": "tor-sendme-dos(80289)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80289" + "url": "https://trac.torproject.org/projects/tor/ticket/6252", + "refsource": "MISC", + "name": "https://trac.torproject.org/projects/tor/ticket/6252" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=880310", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880310" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880310", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=880310" } ] } diff --git a/2012/5xxx/CVE-2012-5603.json b/2012/5xxx/CVE-2012-5603.json index f1d6bac391e..c4ef40a6518 100644 --- a/2012/5xxx/CVE-2012-5603.json +++ b/2012/5xxx/CVE-2012-5603.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-5603", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,47 +27,71 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "cloudforms-katello-sec-bypass(80549)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80549" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=882129", + "url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html", "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882129" + "name": "http://rhn.redhat.com/errata/RHSA-2013-0544.html" }, { - "name": "88140", - "refsource": "OSVDB", - "url": "http://osvdb.org/88140" + "url": "http://rhn.redhat.com/errata/RHSA-2012-1543.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2012-1543.html" }, { - "name": "51472", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51472" + "url": "http://secunia.com/advisories/51472", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51472" }, { - "name": "88142", - "refsource": "OSVDB", - "url": "http://osvdb.org/88142" + "url": "http://www.securityfocus.com/bid/56819", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/56819" }, { - "name": "RHSA-2012:1543", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2012-1543.html" + "url": "http://osvdb.org/88140", + "refsource": "MISC", + "name": "http://osvdb.org/88140" }, { - "name": "56819", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/56819" + "url": "http://osvdb.org/88142", + "refsource": "MISC", + "name": "http://osvdb.org/88142" }, { - "name": "RHSA-2013:0544", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80549", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80549" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882129", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=882129" } ] } diff --git a/2012/5xxx/CVE-2012-5619.json b/2012/5xxx/CVE-2012-5619.json index 5d9cf69cc49..33b08cf009c 100644 --- a/2012/5xxx/CVE-2012-5619.json +++ b/2012/5xxx/CVE-2012-5619.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-5619", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[oss-security] 20121203 Re: CVE request: TSK misrepresents \".\" files on FAT filesystems", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/12/04/2" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=883330", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=883330" - }, - { - "name": "http://labs.bitdefender.com/2012/06/flame-the-story-of-leaked-data-carried-by-human-vector/", + "url": "http://labs.bitdefender.com/2012/06/flame-the-story-of-leaked-data-carried-by-human-vector/", "refsource": "MISC", - "url": "http://labs.bitdefender.com/2012/06/flame-the-story-of-leaked-data-carried-by-human-vector/" + "name": "http://labs.bitdefender.com/2012/06/flame-the-story-of-leaked-data-carried-by-human-vector/" }, { - "name": "FEDORA-2013-0336", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097293.html" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097289.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097289.html" }, { - "name": "MDVSA-2013:125", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:125" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097293.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097293.html" }, { - "name": "FEDORA-2013-0320", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097289.html" + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:125", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:125" }, { - "name": "[oss-security] 20121201 CVE request: TSK misrepresents \".\" files on FAT filesystems", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/12/01/2" + "url": "http://www.openwall.com/lists/oss-security/2012/12/01/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/12/01/2" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/12/04/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/12/04/2" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=883330", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=883330" } ] } diff --git a/2012/5xxx/CVE-2012-5629.json b/2012/5xxx/CVE-2012-5629.json index fb6c2be1832..5b7884d860c 100644 --- a/2012/5xxx/CVE-2012-5629.json +++ b/2012/5xxx/CVE-2012-5629.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2012-5629 JBoss: allows empty password to authenticate against LDAP" + "value": "The default configuration of the (1) LdapLoginModule and (2) LdapExtLoginModule modules in JBoss Enterprise Application Platform (EAP) 4.3.0 CP10, 5.2.0, and 6.0.1, and Enterprise Web Platform (EWP) 5.2.0 allow remote attackers to bypass authentication via an empty password." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Authentication Bypass by Primary Weakness", - "cweId": "CWE-305" + "value": "n/a" } ] } @@ -32,112 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "JBEWP 5 for RHEL 5", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:2.0.5-9.SP3_1_patch_01.ep5.el5", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "JBEWP 5 for RHEL 6", - "version": { - "version_data": [ - { - "version_value": "0:2.0.5-9.1.SP3_1_patch_01.ep5.el6", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat JBoss Enterprise Application Platform 4.3 for RHEL 4", - "version": { - "version_data": [ - { - "version_value": "0:4.3.0-12.GA_CP10_patch_01.1.ep1.el4", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat JBoss Enterprise Application Platform 4.3 for RHEL 5", - "version": { - "version_data": [ - { - "version_value": "0:4.3.0-12.GA_CP10_patch_01.1.ep1.el5", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 4", - "version": { - "version_data": [ - { - "version_value": "0:2.0.5-9.SP3_1_patch_01.ep5.el4", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 5", - "version": { - "version_data": [ - { - "version_value": "0:2.0.5-9.SP3_1_patch_01.ep5.el5", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 6", - "version": { - "version_data": [ - { - "version_value": "0:2.0.5-9.1.SP3_1_patch_01.ep5.el6", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat JBoss Enterprise Application Platform 6 for RHEL 5", - "version": { - "version_data": [ - { - "version_value": "0:7.1.3-5.Final_redhat_5.ep6.el5", - "version_affected": "!" - }, - { - "version_value": "0:4.0.14-3.Final_redhat_3.ep6.el5", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat JBoss Enterprise Application Platform 6 for RHEL 6", - "version": { - "version_data": [ - { - "version_value": "0:7.1.3-5.Final_redhat_5.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:4.0.14-3.Final_redhat_3.ep6.el6", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -150,11 +53,6 @@ }, "references": { "reference_data": [ - { - "url": "https://access.redhat.com/errata/RHSA-2013:0533", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:0533" - }, { "url": "http://rhn.redhat.com/errata/RHSA-2013-0533.html", "refsource": "MISC", @@ -204,91 +102,6 @@ "url": "http://rhn.redhat.com/errata/RHSA-2013-0586.html", "refsource": "MISC", "name": "http://rhn.redhat.com/errata/RHSA-2013-0586.html" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:0229", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:0229" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:0230", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:0230" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:0231", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:0231" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:0232", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:0232" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:0233", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:0233" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:0234", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:0234" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:0248", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:0248" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:0249", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:0249" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:0586", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:0586" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:0665", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:0665" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2012-5629", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2012-5629" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=885569", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=885569" - } - ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "LOW", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 7.5, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", - "version": "2.0" } ] } diff --git a/2012/5xxx/CVE-2012-5633.json b/2012/5xxx/CVE-2012-5633.json index f591323d2e4..1b034d6ff7b 100644 --- a/2012/5xxx/CVE-2012-5633.json +++ b/2012/5xxx/CVE-2012-5633.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-5633", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,137 +27,161 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "51988", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51988" - }, - { - "name": "http://svn.apache.org/viewvc?view=revision&revision=1409324", - "refsource": "CONFIRM", - "url": "http://svn.apache.org/viewvc?view=revision&revision=1409324" - }, - { - "name": "http://stackoverflow.com/questions/7933293/why-does-apache-cxf-ws-security-implementation-ignore-get-requests", + "url": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E", "refsource": "MISC", - "url": "http://stackoverflow.com/questions/7933293/why-does-apache-cxf-ws-security-implementation-ignore-get-requests" + "name": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E" }, { - "name": "20130208 New security advisories for Apache CXF", - "refsource": "FULLDISC", - "url": "http://seclists.org/fulldisclosure/2013/Feb/39" - }, - { - "name": "RHSA-2013:0256", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0256.html" - }, - { - "name": "90079", - "refsource": "OSVDB", - "url": "http://osvdb.org/90079" - }, - { - "name": "RHSA-2013:0257", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0257.html" - }, - { - "name": "http://svn.apache.org/viewvc?view=revision&revision=1420698", - "refsource": "CONFIRM", - "url": "http://svn.apache.org/viewvc?view=revision&revision=1420698" - }, - { - "name": "https://issues.jboss.org/browse/JBWS-3575", + "url": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E", "refsource": "MISC", - "url": "https://issues.jboss.org/browse/JBWS-3575" + "name": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E" }, { - "name": "57874", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/57874" - }, - { - "name": "https://issues.apache.org/jira/browse/CXF-4629", - "refsource": "CONFIRM", - "url": "https://issues.apache.org/jira/browse/CXF-4629" - }, - { - "name": "RHSA-2013:0258", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0258.html" - }, - { - "name": "52183", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/52183" - }, - { - "name": "RHSA-2013:0749", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0749.html" - }, - { - "name": "RHSA-2013:0743", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0743.html" - }, - { - "name": "http://packetstormsecurity.com/files/120213/Apache-CXF-WS-Security-URIMappingInterceptor-Bypass.html", + "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E", "refsource": "MISC", - "url": "http://packetstormsecurity.com/files/120213/Apache-CXF-WS-Security-URIMappingInterceptor-Bypass.html" + "name": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E" }, { - "name": "http://cxf.apache.org/cve-2012-5633.html", - "refsource": "CONFIRM", - "url": "http://cxf.apache.org/cve-2012-5633.html" + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E" }, { - "name": "apachecxf-wssecurity-security-bypass(81980)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81980" + "url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E" }, { - "name": "RHSA-2013:0259", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0259.html" + "url": "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E" }, { - "name": "RHSA-2013:0726", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0726.html" + "url": "http://cxf.apache.org/cve-2012-5633.html", + "refsource": "MISC", + "name": "http://cxf.apache.org/cve-2012-5633.html" }, { - "refsource": "MLIST", - "name": "[cxf-commits] 20200116 svn commit: r1055336 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-12423.txt.asc security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html", - "url": "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E" + "url": "http://osvdb.org/90079", + "refsource": "MISC", + "name": "http://osvdb.org/90079" }, { - "refsource": "MLIST", - "name": "[cxf-commits] 20200319 svn commit: r1058035 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html", - "url": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E" + "url": "http://packetstormsecurity.com/files/120213/Apache-CXF-WS-Security-URIMappingInterceptor-Bypass.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/120213/Apache-CXF-WS-Security-URIMappingInterceptor-Bypass.html" }, { - "refsource": "MLIST", - "name": "[cxf-commits] 20200401 svn commit: r1058573 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2020-1954.txt.asc security-advisories.html", - "url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0256.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0256.html" }, { - "refsource": "MLIST", - "name": "[cxf-commits] 20201112 svn commit: r1067927 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2020-13954.txt.asc security-advisories.html", - "url": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0257.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0257.html" }, { - "refsource": "MLIST", - "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", - "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0258.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0258.html" }, { - "refsource": "MLIST", - "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", - "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0259.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0259.html" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-0726.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0726.html" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-0743.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0743.html" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-0749.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0749.html" + }, + { + "url": "http://seclists.org/fulldisclosure/2013/Feb/39", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2013/Feb/39" + }, + { + "url": "http://secunia.com/advisories/51988", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51988" + }, + { + "url": "http://secunia.com/advisories/52183", + "refsource": "MISC", + "name": "http://secunia.com/advisories/52183" + }, + { + "url": "http://stackoverflow.com/questions/7933293/why-does-apache-cxf-ws-security-implementation-ignore-get-requests", + "refsource": "MISC", + "name": "http://stackoverflow.com/questions/7933293/why-does-apache-cxf-ws-security-implementation-ignore-get-requests" + }, + { + "url": "http://svn.apache.org/viewvc?view=revision&revision=1409324", + "refsource": "MISC", + "name": "http://svn.apache.org/viewvc?view=revision&revision=1409324" + }, + { + "url": "http://svn.apache.org/viewvc?view=revision&revision=1420698", + "refsource": "MISC", + "name": "http://svn.apache.org/viewvc?view=revision&revision=1420698" + }, + { + "url": "http://www.securityfocus.com/bid/57874", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/57874" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81980", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81980" + }, + { + "url": "https://issues.apache.org/jira/browse/CXF-4629", + "refsource": "MISC", + "name": "https://issues.apache.org/jira/browse/CXF-4629" + }, + { + "url": "https://issues.jboss.org/browse/JBWS-3575", + "refsource": "MISC", + "name": "https://issues.jboss.org/browse/JBWS-3575" } ] } diff --git a/2012/5xxx/CVE-2012-5639.json b/2012/5xxx/CVE-2012-5639.json index 052082b2598..3443138f484 100644 --- a/2012/5xxx/CVE-2012-5639.json +++ b/2012/5xxx/CVE-2012-5639.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-5639", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "LibreOffice; OpenOffice", - "product": { - "product_data": [ - { - "product_name": "LibreOffice, OpenOffice", - "version": { - "version_data": [ - { - "version_value": "through at least 2012-12-15" - } - ] - } - } - ] - } - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,12 +27,41 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "LibreOffice; OpenOffice", + "product": { + "product_data": [ + { + "product_name": "LibreOffice, OpenOffice", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "through at least 2012-12-15" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://security-tracker.debian.org/tracker/CVE-2012-5639", + "url": "http://www.openwall.com/lists/oss-security/2012/12/14/1", "refsource": "MISC", - "name": "https://security-tracker.debian.org/tracker/CVE-2012-5639" + "name": "http://www.openwall.com/lists/oss-security/2012/12/14/1" + }, + { + "url": "https://access.redhat.com/security/cve/cve-2012-5639", + "refsource": "MISC", + "name": "https://access.redhat.com/security/cve/cve-2012-5639" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639", @@ -63,19 +69,14 @@ "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639" }, { + "url": "https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E", "refsource": "MISC", - "name": "http://www.openwall.com/lists/oss-security/2012/12/14/1", - "url": "http://www.openwall.com/lists/oss-security/2012/12/14/1" + "name": "https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E" }, { - "refsource": "REDHAT", - "name": "Red Hat", - "url": "https://access.redhat.com/security/cve/cve-2012-5639" - }, - { - "refsource": "MLIST", - "name": "[openoffice-issues] 20201025 [Issue 121493] CVE-2012-5639: Remote file inclusion by office application", - "url": "https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb@%3Cissues.openoffice.apache.org%3E" + "url": "https://security-tracker.debian.org/tracker/CVE-2012-5639", + "refsource": "MISC", + "name": "https://security-tracker.debian.org/tracker/CVE-2012-5639" } ] } diff --git a/2012/5xxx/CVE-2012-5643.json b/2012/5xxx/CVE-2012-5643.json index 309ba2b3cf4..a80d65448bc 100644 --- a/2012/5xxx/CVE-2012-5643.json +++ b/2012/5xxx/CVE-2012-5643.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2012-5643 squid: cachemgr.cgi memory usage DoS and memory leaks" + "value": "Multiple memory leaks in tools/cachemgr.cc in cachemgr.cgi in Squid 2.x and 3.x before 3.1.22, 3.2.x before 3.2.4, and 3.3.x before 3.3.0.2 allow remote attackers to cause a denial of service (memory consumption) via (1) invalid Content-Length headers, (2) long POST requests, or (3) crafted authentication credentials." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Missing Release of Memory after Effective Lifetime", - "cweId": "CWE-401" + "value": "n/a" } ] } @@ -32,16 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 6", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "7:3.1.10-16.el6", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -139,55 +138,20 @@ "refsource": "MISC", "name": "http://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11714.patch" }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:0505", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:0505" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2012-5643", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2012-5643" - }, { "url": "https://bugs.gentoo.org/show_bug.cgi?id=447596", "refsource": "MISC", "name": "https://bugs.gentoo.org/show_bug.cgi?id=447596" }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=887962", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=887962" - }, { "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0368", "refsource": "MISC", "name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0368" - } - ] - }, - "impact": { - "cvss": [ + }, { - "accessComplexity": "LOW", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 5, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", - "version": "2.0" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=887962", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=887962" } ] } diff --git a/2012/5xxx/CVE-2012-5653.json b/2012/5xxx/CVE-2012-5653.json index 34a1575e8b3..0949427c7ef 100644 --- a/2012/5xxx/CVE-2012-5653.json +++ b/2012/5xxx/CVE-2012-5653.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-5653", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,52 +27,76 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "88529", - "refsource": "OSVDB", - "url": "http://osvdb.org/88529" + "url": "http://www.debian.org/security/2013/dsa-2776", + "refsource": "MISC", + "name": "http://www.debian.org/security/2013/dsa-2776" }, { - "name": "http://drupalcode.org/project/drupal.git/commitdiff/da8023a", - "refsource": "CONFIRM", - "url": "http://drupalcode.org/project/drupal.git/commitdiff/da8023a" + "url": "http://drupal.org/SA-CORE-2012-004", + "refsource": "MISC", + "name": "http://drupal.org/SA-CORE-2012-004" }, { - "name": "MDVSA-2013:074", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:074" + "url": "http://drupalcode.org/project/drupal.git/commitdiff/da8023a", + "refsource": "MISC", + "name": "http://drupalcode.org/project/drupal.git/commitdiff/da8023a" }, { - "name": "http://drupal.org/SA-CORE-2012-004", - "refsource": "CONFIRM", - "url": "http://drupal.org/SA-CORE-2012-004" + "url": "http://www.openwall.com/lists/oss-security/2012/12/20/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/12/20/1" }, { - "name": "56993", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/56993" + "url": "http://www.securityfocus.com/bid/56993", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/56993" }, { - "name": "http://drupalcode.org/project/drupal.git/commitdiff/b47f95d", - "refsource": "CONFIRM", - "url": "http://drupalcode.org/project/drupal.git/commitdiff/b47f95d" + "url": "http://drupalcode.org/project/drupal.git/commitdiff/b47f95d", + "refsource": "MISC", + "name": "http://drupalcode.org/project/drupal.git/commitdiff/b47f95d" }, { - "name": "DSA-2776", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2013/dsa-2776" + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:074", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:074" }, { - "name": "[oss-security] 20121219 Re: CVE request for Drupal core, and contributed modules", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/12/20/1" + "url": "http://osvdb.org/88529", + "refsource": "MISC", + "name": "http://osvdb.org/88529" }, { - "name": "drupal-fileupload-code-execution(80795)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80795" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80795", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80795" } ] } diff --git a/2012/5xxx/CVE-2012-5669.json b/2012/5xxx/CVE-2012-5669.json index 9b0065680d0..f1170ed4f77 100644 --- a/2012/5xxx/CVE-2012-5669.json +++ b/2012/5xxx/CVE-2012-5669.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-5669", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,72 +27,96 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "1027921", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id?1027921" + "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=07bdb6e289c7954e2a533039dc93c1c136099d2d", + "refsource": "MISC", + "name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=07bdb6e289c7954e2a533039dc93c1c136099d2d" }, { - "name": "http://www.freetype.org/", - "refsource": "CONFIRM", - "url": "http://www.freetype.org/" + "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html" }, { - "name": "USN-1686-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1686-1" + "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html" }, { - "name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=07bdb6e289c7954e2a533039dc93c1c136099d2d", - "refsource": "CONFIRM", - "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=07bdb6e289c7954e2a533039dc93c1c136099d2d" + "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html" }, { - "name": "openSUSE-SU-2013:0189", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0216.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0216.html" }, { - "name": "[oss-security] 20121224 Re: CVE Request - Multiple security fixes in freetype - 2.4.11", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/12/25/2" + "url": "http://secunia.com/advisories/51826", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51826" }, { - "name": "openSUSE-SU-2013:0165", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html" + "url": "http://secunia.com/advisories/51900", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51900" }, { - "name": "RHSA-2013:0216", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0216.html" + "url": "http://www.freetype.org/", + "refsource": "MISC", + "name": "http://www.freetype.org/" }, { - "name": "https://savannah.nongnu.org/bugs/?37906", - "refsource": "CONFIRM", - "url": "https://savannah.nongnu.org/bugs/?37906" + "url": "http://www.openwall.com/lists/oss-security/2012/12/25/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/12/25/2" }, { - "name": "SSA:2013-015-01", - "refsource": "SLACKWARE", - "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186" + "url": "http://www.securitytracker.com/id?1027921", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id?1027921" }, { - "name": "51900", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51900" + "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186", + "refsource": "MISC", + "name": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186" }, { - "name": "openSUSE-SU-2013:0177", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html" + "url": "http://www.ubuntu.com/usn/USN-1686-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1686-1" }, { - "name": "51826", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51826" + "url": "https://savannah.nongnu.org/bugs/?37906", + "refsource": "MISC", + "name": "https://savannah.nongnu.org/bugs/?37906" } ] } diff --git a/2012/6xxx/CVE-2012-6073.json b/2012/6xxx/CVE-2012-6073.json index 2f0e07b5a6a..495cc716895 100644 --- a/2012/6xxx/CVE-2012-6073.json +++ b/2012/6xxx/CVE-2012-6073.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-6073", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,32 +27,56 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "RHSA-2013:0220", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0220.html" - }, - { - "name": "[oss-security] 20121227 Re: CVE request: Jenkins", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/12/28/1" - }, - { - "name": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2012-11-20", - "refsource": "CONFIRM", - "url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2012-11-20" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=890608", + "url": "http://rhn.redhat.com/errata/RHSA-2013-0220.html", "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=890608" + "name": "http://rhn.redhat.com/errata/RHSA-2013-0220.html" }, { - "name": "http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2012-11-20.cb", - "refsource": "CONFIRM", - "url": "http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2012-11-20.cb" + "url": "http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2012-11-20.cb", + "refsource": "MISC", + "name": "http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2012-11-20.cb" + }, + { + "url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2012-11-20", + "refsource": "MISC", + "name": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2012-11-20" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/12/28/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/12/28/1" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=890608", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=890608" } ] } diff --git a/2012/6xxx/CVE-2012-6093.json b/2012/6xxx/CVE-2012-6093.json index 3e46213cd05..7bb14e7c51a 100644 --- a/2012/6xxx/CVE-2012-6093.json +++ b/2012/6xxx/CVE-2012-6093.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-6093", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,67 +27,91 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "openSUSE-SU-2013:0204", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00086.html" - }, - { - "name": "https://codereview.qt-project.org/#change,42461", - "refsource": "CONFIRM", - "url": "https://codereview.qt-project.org/#change,42461" - }, - { - "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697582", + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697582", "refsource": "MISC", - "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697582" + "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697582" }, { - "name": "USN-1723-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1723-1" - }, - { - "name": "openSUSE-SU-2013:0256", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00014.html" - }, - { - "name": "52217", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/52217" - }, - { - "name": "openSUSE-SU-2013:0211", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00089.html" - }, - { - "name": "http://qt.gitorious.org/qt/qt/commit/3b14dc93cf0ef06f1424d7d6319a1af4505faa53%20%284.7%29", - "refsource": "CONFIRM", - "url": "http://qt.gitorious.org/qt/qt/commit/3b14dc93cf0ef06f1424d7d6319a1af4505faa53%20%284.7%29" - }, - { - "name": "[Announce] 20130102 Qt Project Security Advisory: QSslSocket may report incorrect errors when certificate verification fails", - "refsource": "MLIST", - "url": "http://lists.qt-project.org/pipermail/announce/2013-January/000020.html" - }, - { - "name": "http://qt.gitorious.org/qt/qt/commit/691e78e5061d4cbc0de212d23b06c5dffddf2098%20%284.8%29", - "refsource": "CONFIRM", - "url": "http://qt.gitorious.org/qt/qt/commit/691e78e5061d4cbc0de212d23b06c5dffddf2098%20%284.8%29" - }, - { - "name": "[oss-security] 20130104 Re: CVE Request -- qt: QSslSocket might report inappropriate errors when certificate verification fails", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/01/04/6" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=891955", + "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00086.html", "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=891955" + "name": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00086.html" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00089.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00089.html" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00014.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00014.html" + }, + { + "url": "http://lists.qt-project.org/pipermail/announce/2013-January/000020.html", + "refsource": "MISC", + "name": "http://lists.qt-project.org/pipermail/announce/2013-January/000020.html" + }, + { + "url": "http://qt.gitorious.org/qt/qt/commit/3b14dc93cf0ef06f1424d7d6319a1af4505faa53%20%284.7%29", + "refsource": "MISC", + "name": "http://qt.gitorious.org/qt/qt/commit/3b14dc93cf0ef06f1424d7d6319a1af4505faa53%20%284.7%29" + }, + { + "url": "http://qt.gitorious.org/qt/qt/commit/691e78e5061d4cbc0de212d23b06c5dffddf2098%20%284.8%29", + "refsource": "MISC", + "name": "http://qt.gitorious.org/qt/qt/commit/691e78e5061d4cbc0de212d23b06c5dffddf2098%20%284.8%29" + }, + { + "url": "http://secunia.com/advisories/52217", + "refsource": "MISC", + "name": "http://secunia.com/advisories/52217" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2013/01/04/6", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/01/04/6" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1723-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1723-1" + }, + { + "url": "https://codereview.qt-project.org/#change%2C42461", + "refsource": "MISC", + "name": "https://codereview.qt-project.org/#change%2C42461" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=891955", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=891955" } ] } diff --git a/2012/6xxx/CVE-2012-6109.json b/2012/6xxx/CVE-2012-6109.json index 7f449a7de36..2cff7aac893 100644 --- a/2012/6xxx/CVE-2012-6109.json +++ b/2012/6xxx/CVE-2012-6109.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2012-6109 rubygem-rack: parsing Content-Disposition header DoS" + "value": "lib/rack/multipart.rb in Rack before 1.1.4, 1.2.x before 1.2.6, 1.3.x before 1.3.7, and 1.4.x before 1.4.2 uses an incorrect regular expression, which allows remote attackers to cause a denial of service (infinite loop) via a crafted Content-Disposion header." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Loop with Unreachable Exit Condition ('Infinite Loop')", - "cweId": "CWE-835" + "value": "n/a" } ] } @@ -32,139 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "CloudForms for RHEL 6", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "1:3.0.10-10.el6cf", - "version_affected": "!" - }, - { - "version_value": "0:2.1.4-3.el6cf", - "version_affected": "!" - }, - { - "version_value": "0:1.5.0-0.9.beta4.el6cf", - "version_affected": "!" - }, - { - "version_value": "1:1.3.0-3.el6cf", - "version_affected": "!" - }, - { - "version_value": "0:0.5.5-2.el6cf", - "version_affected": "!" - }, - { - "version_value": "0:3.8-6.el6cf", - "version_affected": "!" - }, - { - "version_value": "0:2.6.1-7.el6cf", - "version_affected": "!" - }, - { - "version_value": "0:2.0.4-6.el6cf", - "version_affected": "!" - }, - { - "version_value": "0:2.11.3-5.el6cf", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Subscription Asset Manager 1.2", - "version": { - "version_data": [ - { - "version_value": "0:1.7-2.el6_3", - "version_affected": "!" - }, - { - "version_value": "0:0.6-4_redhat_1.ep6.el6.1", - "version_affected": "!" - }, - { - "version_value": "0:0.7.23-1.el6_3", - "version_affected": "!" - }, - { - "version_value": "0:0.19.9-5.el6_3", - "version_affected": "!" - }, - { - "version_value": "0:1.2.1-15h.el6_3", - "version_affected": "!" - }, - { - "version_value": "0:1.2.1-1h.el6_3", - "version_affected": "!" - }, - { - "version_value": "0:1.2.1-12h.el6_3", - "version_affected": "!" - }, - { - "version_value": "0:1.2.3-3h.el6_3", - "version_affected": "!" - }, - { - "version_value": "0:1.2.1-2h.el6_3", - "version_affected": "!" - }, - { - "version_value": "0:3.6.1-10h.el6_3", - "version_affected": "!" - }, - { - "version_value": "0:2.6.17-2.el6cf", - "version_affected": "!" - }, - { - "version_value": "0:2.1.5-4.el6_3", - "version_affected": "!" - }, - { - "version_value": "1:3.0.10-10.el6cf", - "version_affected": "!" - }, - { - "version_value": "0:0.0.12-2.el6cf", - "version_affected": "!" - }, - { - "version_value": "0:0.1.3-1.el6_3", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-3.el6cf", - "version_affected": "!" - }, - { - "version_value": "1:1.3.0-3.el6cf", - "version_affected": "!" - }, - { - "version_value": "0:2.0.4-6.el6cf", - "version_affected": "!" - }, - { - "version_value": "0:1.6.5-0.12.git58097d9h.el6_3", - "version_affected": "!" - }, - { - "version_value": "0:1.0.4-2.el6_3", - "version_affected": "!" - }, - { - "version_value": "0:0.0.28-1.el6_3", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -187,31 +63,11 @@ "refsource": "MISC", "name": "http://rhn.redhat.com/errata/RHSA-2013-0548.html" }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:0544", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:0544" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:0548", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:0548" - }, { "url": "http://rack.github.com/", "refsource": "MISC", "name": "http://rack.github.com/" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2012-6109", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2012-6109" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895277", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=895277" - }, { "url": "https://github.com/rack/rack/blob/master/README.rdoc", "refsource": "MISC", @@ -226,31 +82,11 @@ "url": "https://groups.google.com/forum/#%21msg/rack-devel/1w4_fWEgTdI/XAkSNHjtdTsJ", "refsource": "MISC", "name": "https://groups.google.com/forum/#%21msg/rack-devel/1w4_fWEgTdI/XAkSNHjtdTsJ" - } - ] - }, - "impact": { - "cvss": [ + }, { - "accessComplexity": "MEDIUM", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 4.3, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", - "version": "2.0" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895277", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=895277" } ] } diff --git a/2013/4xxx/CVE-2013-4195.json b/2013/4xxx/CVE-2013-4195.json index 5b0200d7c71..b003dc25007 100644 --- a/2013/4xxx/CVE-2013-4195.json +++ b/2013/4xxx/CVE-2013-4195.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4195", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=978471", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=978471" + "url": "http://plone.org/products/plone-hotfix/releases/20130618", + "refsource": "MISC", + "name": "http://plone.org/products/plone-hotfix/releases/20130618" }, { - "name": "http://plone.org/products/plone/security/advisories/20130618-announcement", - "refsource": "CONFIRM", - "url": "http://plone.org/products/plone/security/advisories/20130618-announcement" + "url": "http://plone.org/products/plone/security/advisories/20130618-announcement", + "refsource": "MISC", + "name": "http://plone.org/products/plone/security/advisories/20130618-announcement" }, { - "name": "http://plone.org/products/plone-hotfix/releases/20130618", - "refsource": "CONFIRM", - "url": "http://plone.org/products/plone-hotfix/releases/20130618" + "url": "http://seclists.org/oss-sec/2013/q3/261", + "refsource": "MISC", + "name": "http://seclists.org/oss-sec/2013/q3/261" }, { - "name": "[oss-security] 20130801 Re: CVE Request -- Plone: 20130618 Hotfix (multiple vectors)", - "refsource": "MLIST", - "url": "http://seclists.org/oss-sec/2013/q3/261" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=978471", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=978471" } ] } diff --git a/2013/4xxx/CVE-2013-4196.json b/2013/4xxx/CVE-2013-4196.json index 3ccd3a727f1..679b2097960 100644 --- a/2013/4xxx/CVE-2013-4196.json +++ b/2013/4xxx/CVE-2013-4196.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4196", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=978475", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=978475" + "url": "http://plone.org/products/plone-hotfix/releases/20130618", + "refsource": "MISC", + "name": "http://plone.org/products/plone-hotfix/releases/20130618" }, { - "name": "http://plone.org/products/plone/security/advisories/20130618-announcement", - "refsource": "CONFIRM", - "url": "http://plone.org/products/plone/security/advisories/20130618-announcement" + "url": "http://plone.org/products/plone/security/advisories/20130618-announcement", + "refsource": "MISC", + "name": "http://plone.org/products/plone/security/advisories/20130618-announcement" }, { - "name": "http://plone.org/products/plone-hotfix/releases/20130618", - "refsource": "CONFIRM", - "url": "http://plone.org/products/plone-hotfix/releases/20130618" + "url": "http://seclists.org/oss-sec/2013/q3/261", + "refsource": "MISC", + "name": "http://seclists.org/oss-sec/2013/q3/261" }, { - "name": "[oss-security] 20130801 Re: CVE Request -- Plone: 20130618 Hotfix (multiple vectors)", - "refsource": "MLIST", - "url": "http://seclists.org/oss-sec/2013/q3/261" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=978475", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=978475" } ] } diff --git a/2013/4xxx/CVE-2013-4205.json b/2013/4xxx/CVE-2013-4205.json index e434f62efdc..51cd0cbeba9 100644 --- a/2013/4xxx/CVE-2013-4205.json +++ b/2013/4xxx/CVE-2013-4205.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4205", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://github.com/torvalds/linux/commit/6160968cee8b90a5dd95318d716e31d7775c4ef3", - "refsource": "CONFIRM", - "url": "https://github.com/torvalds/linux/commit/6160968cee8b90a5dd95318d716e31d7775c4ef3" - }, - { - "name": "[oss-security] 20130806 Re: CLONE_NEWUSER local DoS", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/08/06/2" - }, - { - "name": "http://twitter.com/grsecurity/statuses/364566062336978944", + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6160968cee8b90a5dd95318d716e31d7775c4ef3", "refsource": "MISC", - "url": "http://twitter.com/grsecurity/statuses/364566062336978944" + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6160968cee8b90a5dd95318d716e31d7775c4ef3" }, { - "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.6", - "refsource": "CONFIRM", - "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.6" + "url": "http://twitter.com/grsecurity/statuses/364566062336978944", + "refsource": "MISC", + "name": "http://twitter.com/grsecurity/statuses/364566062336978944" }, { - "name": "USN-1971-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1971-1" + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.6", + "refsource": "MISC", + "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.6" }, { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6160968cee8b90a5dd95318d716e31d7775c4ef3", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6160968cee8b90a5dd95318d716e31d7775c4ef3" + "url": "http://www.openwall.com/lists/oss-security/2013/08/06/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/08/06/2" }, { - "name": "USN-1974-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1974-1" + "url": "http://www.ubuntu.com/usn/USN-1971-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1971-1" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1974-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1974-1" + }, + { + "url": "https://github.com/torvalds/linux/commit/6160968cee8b90a5dd95318d716e31d7775c4ef3", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/6160968cee8b90a5dd95318d716e31d7775c4ef3" } ] } diff --git a/2013/4xxx/CVE-2013-4215.json b/2013/4xxx/CVE-2013-4215.json index 1a018535a3a..6d45b8ec5c6 100644 --- a/2013/4xxx/CVE-2013-4215.json +++ b/2013/4xxx/CVE-2013-4215.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4215", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://tracker.nagios.org/view.php?id=451", + "url": "http://osvdb.org/96085", "refsource": "MISC", - "url": "http://tracker.nagios.org/view.php?id=451" + "name": "http://osvdb.org/96085" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=957482", + "url": "http://seclists.org/oss-sec/2013/q3/310", "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=957482" + "name": "http://seclists.org/oss-sec/2013/q3/310" }, { - "name": "[oss-security] 20130807 Some Nagios /tmp vulns (no reply from upstream)", - "refsource": "MLIST", - "url": "http://seclists.org/oss-sec/2013/q3/310" + "url": "http://tracker.nagios.org/view.php?id=451", + "refsource": "MISC", + "name": "http://tracker.nagios.org/view.php?id=451" }, { - "name": "96085", - "refsource": "OSVDB", - "url": "http://osvdb.org/96085" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=957482", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=957482" } ] } diff --git a/2013/4xxx/CVE-2013-4216.json b/2013/4xxx/CVE-2013-4216.json index 9b1680e404f..5dc7f81d8b7 100644 --- a/2013/4xxx/CVE-2013-4216.json +++ b/2013/4xxx/CVE-2013-4216.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4216", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,17 +27,41 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[oss-security] 20130808 Re: CVE Request -- Four flaws in WiMAX (afaik upstream is dead for this)", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/08/08/17" + "url": "http://www.openwall.com/lists/oss-security/2013/08/08/17", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/08/08/17" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=911122", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=911122" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=911122", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=911122" } ] } diff --git a/2013/4xxx/CVE-2013-4225.json b/2013/4xxx/CVE-2013-4225.json index 41ed2eab1a8..e7afdfb65ae 100644 --- a/2013/4xxx/CVE-2013-4225.json +++ b/2013/4xxx/CVE-2013-4225.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A flaw was found where incorrect permission checks in Katello led to certain HTTP API calls being accessible without a proper certificate. An attacker could use this vulnerability to view and alter subscription information for managed systems." + "value": "The RESTful Web Services (restws) module 7.x-1.x before 7.x-1.4 and 7.x-2.x before 7.x-2.1 for Drupal does not properly restrict access to entity write operations, which makes it easier for remote authenticated users with the \"access resource node\" and \"create page content\" permissions (or equivalents) to conduct cross-site scripting (XSS) or execute arbitrary PHP code via a crafted text field." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Missing Authorization", - "cweId": "CWE-862" + "value": "Insecure Permissions" } ] } @@ -32,1292 +31,20 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "RESTful Web Services", "product": { "product_data": [ { - "product_name": "Red Hat Satellite 6.0", + "product_name": "RESTful Web Services", "version": { "version_data": [ { - "version_value": "0:1.15-13.el7sat", - "version_affected": "!" + "version_affected": "=", + "version_value": "7.x-1.x before 7.x-1.4" }, { - "version_value": "0:1.13.1-13.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.9.2-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0-5.3.ep5.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.4-16.redhat_3.1.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.2-8.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-4.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.6-10.redhat_3.1.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:10-14.el7", - "version_affected": "!" - }, - { - "version_value": "0:2-11.el7", - "version_affected": "!" - }, - { - "version_value": "0:1-13.20100611svn86.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.46-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.4.0-19.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.9.1.2-3.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.9.23-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.0-2_redhat_1.el7", - "version_affected": "!" - }, - { - "version_value": "0:1-5.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.1.5-6.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.7R3-1.el6_4", - "version_affected": "!" - }, - { - "version_value": "0:1.0-11.SP4.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.2-18.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.9.9-21.2.pulp.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.4.0-23.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.6.1-11.8_redhat_1.ep6.el6.1", - "version_affected": "!" - }, - { - "version_value": "0:0.90.10-6.el7sat", - "version_affected": "!" - }, - { - "version_value": "1:1.7.6-2.1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:11-2.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:4.2.1-5.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.6.0.44-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:6.5-20140620.2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.6.0.30-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.6.0.14-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.9.6-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.1.1-9_redhat_1.ep6.el6.1", - "version_affected": "!" - }, - { - "version_value": "0:1.4.4-6_redhat_1.ep6.el6.1", - "version_affected": "!" - }, - { - "version_value": "0:2.2.5-19.redhat_7.2.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.3.0-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0-3.3.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:3.1.3-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.0-3.el7sat.2", - "version_affected": "!" - }, - { - "version_value": "0:1.8.9-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:13.0-6.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.6-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:332.14-12.el7", - "version_affected": "!" - }, - { - "version_value": "0:4.0.1-2.Final_redhat_1.1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:4.2.7-6.SP2_redhat_1.1.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:4.3.1-2.Final_redhat_1.1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.0.0-4.7.GA_redhat_2.ep6.el6.3", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-5.Final_redhat_2.1.ep6.el6.4", - "version_affected": "!" - }, - { - "version_value": "0:1.0.0-3.el6_4", - "version_affected": "!" - }, - { - "version_value": "0:2.3.14-1.Final_redhat_1.1.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:6-9.redhat_1.3.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:20130517-7.1fm.gitc4bce43.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-3.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-1.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-2.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-5.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-2.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.6.1-2.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.9-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.4-10.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.12.1-1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:2.2.17-4.GA_redhat_1.ep6.el6.1", - "version_affected": "!" - }, - { - "version_value": "0:1.0.2-10.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-0.7.20120212git2fabd8.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.2-0.9.20120319git49a904.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.4-3.Final_redhat_2.1.ep6.el6.1", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.1.4-1.GA_redhat_1.1.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:14-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.0-0.7.Beta2.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-8.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-9.Final_redhat_2.2.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "1:4.16.2-1.Final.3.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:0.1.50-5.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.6.1-10.el7", - "version_affected": "!" - }, - { - "version_value": "0:0-0.18.20090319svn.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.1.1-4.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.1.1-6.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.5.0-30.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.3-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.6-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.64-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.16-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:5.3.21-17.el7_0.1", - "version_affected": "!" - }, - { - "version_value": "0:2.2.2-6.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.1.0-1.el7", - "version_affected": "!" - }, - { - "version_value": "1:20.4-1.1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.13-6.el7", - "version_affected": "!" - }, - { - "version_value": "0:4.6.1-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.0.5-16.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.2.1-47.el7", - "version_affected": "!" - }, - { - "version_value": "1:1.0-10.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.4-11.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.1-4.el7", - "version_affected": "!" - }, - { - "version_value": "1:1.2.1-8.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.1-3.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.1.1-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:20-5.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.2.1-12.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.4-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.8.1-2.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.1-6.el7", - "version_affected": "!" - }, - { - "version_value": "1:1.1-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.4-3.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.4-3.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.9.2-1.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.7-4.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.9.7-1.el6", - "version_affected": "!" - }, - { - "version_value": "0:0.9.2-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.4-1.pulp.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.4.9-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.9.14-13.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.2.6-1_redhat_1.2.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:20100601-4.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:3.3.1-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.0.7-11.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.7-5.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.4.2-8.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.2-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0-0.16.alpha15.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.5.5-14.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0-0.14.alpha6.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.15-8.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0-0.15.a7.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.4-13.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.0.9-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.1.8-16.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.4.1-0.7.beta.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3-4.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.4.1-0.7.beta.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.6.2-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.5.3-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.6-6.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.5-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.3-4.el6sat", - "version_affected": "!" - }, - { - "version_value": "1:3.0.8.1-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "1:3.3.0.17-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.1.11-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.2.2-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.7.2-1.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.0.2-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.5.0-1.pulp.el6sat", - "version_affected": "!" - }, - { - "version_value": "1:3.0.15-12.pulp.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.1-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.211-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.32-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.5.2-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.22-15.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.2.1-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.12.5-1.el6", - "version_affected": "!" - }, - { - "version_value": "0:2.2.0-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.2.0-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.37-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.22-42.el6", - "version_affected": "!" - }, - { - "version_value": "0:0.22-6.el6", - "version_affected": "!" - }, - { - "version_value": "0:0.7-2.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.22-37.el6", - "version_affected": "!" - }, - { - "version_value": "0:0.22-13.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.3.7.2-1.Final_redhat_1.1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.6.18-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.3.5-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.4.0-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.0-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.7.2-11.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.4-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.3-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.3-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.5-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.0.0-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.0.0-8.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.3-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.0.3.0-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.0-6.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.2.0-10.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.6-7.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.12.2-6.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.10.4-7.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.3-10.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1.4-10.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.6.0-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.7.2-7.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.7.3-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.12.10-11.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.32.1-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.9.16-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.8.8-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.8.0-13.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.21.0-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.1-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.21.1-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.0-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.2-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.6-1.1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.0-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.5-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.4-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.9-1.1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.1-9.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.7-9.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.0-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.10.0-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.8-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.4-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.1.6-6.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.4-8.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.22-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.2-7.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.8.6-11.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.7-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:4.0.2-8.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.4-4.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.8-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.0-88.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.3.1-7.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.3.2-7.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1.3-17.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.8.1-26.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.0-12.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.8.2-4.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.2.0-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.1-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1.0-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.6.7-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.11-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.4.7-8.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.0-9.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:4.0.18-19.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.12.2-10.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.7-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.9.0-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.29-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.1-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.6.7-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.0-16.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.1-9.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.5.1-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.2.3-8.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.1.1-15.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1.0-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.2.1-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.2.13-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.7.1-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.45.0-6.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:4.1.3-7.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.4.5-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.3.4-8.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.10.1-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.1-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.1-11.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.0-12.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.1-9.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.2-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.12-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.3-4.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.6-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.1.3-6.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.0-1.3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.0.2-10.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.2-6.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.4.1-1.el6_4", - "version_affected": "!" - }, - { - "version_value": "0:1.4.3-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.8-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.2-12.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.15-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.0-7.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.2-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.4-10.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.0-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.11-6.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1.2-4.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.1-12.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.2-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.1-16.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.3-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.10.4-1.1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.4-14.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.5-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.6.21-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.6-2.el6", - "version_affected": "!" - }, - { - "version_value": "0:0.0.8-7.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1.3-17.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.9-7.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.19-7.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.8.2-4.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:4.0.18-19.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.11-8.el6sat", - "version_affected": "!" - }, - { - "version_value": "1:1.4.1-13.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.0-7.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.9.2.2-41.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.12-27.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.2-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.7.0-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.7-5.el6", - "version_affected": "!" - }, - { - "version_value": "1:1.3.6-27.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-1.1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.1-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.14.6-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.3-18.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.5-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.1-21.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.22-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.2-4.redhat_1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.6.5-0.9.git58097d9.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-11.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.2.2-2.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.7.5-4.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.0.4-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.11.5.1-3.el6", - "version_affected": "!" - }, - { - "version_value": "1:2.6.1-9_redhat_2.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:20110809-5_redhat_2.ep6.el6.3", - "version_affected": "!" - }, - { - "version_value": "1:3.14.5.10-11.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.13-6.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.1.3.8-11.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.3.1-10.el7", - "version_affected": "!" + "version_affected": "=", + "version_value": "7.x-2.x before 7.x-2.1" } ] } @@ -1330,26 +57,11 @@ }, "references": { "reference_data": [ - { - "url": "https://access.redhat.com/errata/RHEA-2014:1175", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHEA-2014:1175" - }, { "url": "http://www.openwall.com/lists/oss-security/2013/08/10/1", "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2013/08/10/1" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2013-4225", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2013-4225" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=997639", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=997639" - }, { "url": "https://drupal.org/node/2059591", "refsource": "MISC", @@ -1366,30 +78,5 @@ "name": "https://drupal.org/node/2059603" } ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "LOW", - "accessVector": "NETWORK", - "authentication": "SINGLE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 6.5, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", - "version": "2.0" - } - ] } } \ No newline at end of file diff --git a/2013/4xxx/CVE-2013-4235.json b/2013/4xxx/CVE-2013-4235.json index bde03eeda1f..4d37a501dd5 100644 --- a/2013/4xxx/CVE-2013-4235.json +++ b/2013/4xxx/CVE-2013-4235.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4235", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "shadow", - "version": { - "version_data": [ - { - "version_value": "1" - } - ] - } - } - ] - }, - "vendor_name": "shadow" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,17 +27,36 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "shadow", + "product": { + "product_data": [ + { + "product_name": "shadow", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://security-tracker.debian.org/tracker/CVE-2013-4235", + "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E", "refsource": "MISC", - "name": "https://security-tracker.debian.org/tracker/CVE-2013-4235" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235" + "name": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E" }, { "url": "https://access.redhat.com/security/cve/cve-2013-4235", @@ -68,14 +64,19 @@ "name": "https://access.redhat.com/security/cve/cve-2013-4235" }, { - "refsource": "MLIST", - "name": "[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar", - "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235" }, { - "refsource": "GENTOO", - "name": "GLSA-202210-26", - "url": "https://security.gentoo.org/glsa/202210-26" + "url": "https://security-tracker.debian.org/tracker/CVE-2013-4235", + "refsource": "MISC", + "name": "https://security-tracker.debian.org/tracker/CVE-2013-4235" + }, + { + "url": "https://security.gentoo.org/glsa/202210-26", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202210-26" } ] } diff --git a/2013/4xxx/CVE-2013-4236.json b/2013/4xxx/CVE-2013-4236.json index d76b583015f..0573504656c 100644 --- a/2013/4xxx/CVE-2013-4236.json +++ b/2013/4xxx/CVE-2013-4236.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4236", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "VDSM in Red Hat Enterprise Virtualization 3 and 3.2 allows privileged guest users to cause the host to become \"unavailable to the managment server\" via invalid XML characters in a guest agent response. NOTE: this issue is due to an incomplete fix for CVE-2013-0167." + "value": "VDSM in Red Hat Enterprise Virtualization 3 and 3.2 allows privileged guest users to cause the host to become \"unavailable to the managment server\" via invalid XML characters in a guest agent response. NOTE: this issue is due to an incomplete fix for CVE-2013-0167." } ] }, @@ -50,22 +27,46 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://gerrit.ovirt.org/gitweb?p=vdsm.git;a=commit;h=5fe1615b7949999fc9abd896bde63bf24f8431d6", + "url": "http://gerrit.ovirt.org/gitweb?p=vdsm.git%3Ba=commit%3Bh=5fe1615b7949999fc9abd896bde63bf24f8431d6", "refsource": "MISC", - "url": "http://gerrit.ovirt.org/gitweb?p=vdsm.git;a=commit;h=5fe1615b7949999fc9abd896bde63bf24f8431d6" + "name": "http://gerrit.ovirt.org/gitweb?p=vdsm.git%3Ba=commit%3Bh=5fe1615b7949999fc9abd896bde63bf24f8431d6" }, { - "name": "RHSA-2013:1155", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-1155.html" + "url": "http://rhn.redhat.com/errata/RHSA-2013-1155.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-1155.html" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=996166", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996166" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996166", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=996166" } ] } diff --git a/2013/4xxx/CVE-2013-4245.json b/2013/4xxx/CVE-2013-4245.json index 0ea16eb7e0c..e347b8cf54d 100644 --- a/2013/4xxx/CVE-2013-4245.json +++ b/2013/4xxx/CVE-2013-4245.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4245", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Orca", - "product": { - "product_data": [ - { - "product_name": "Orca", - "version": { - "version_data": [ - { - "version_value": "3.14.0" - } - ] - } - } - ] - } - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,12 +27,36 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Orca", + "product": { + "product_data": [ + { + "product_name": "Orca", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "3.14.0" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://security-tracker.debian.org/tracker/CVE-2013-4245", + "url": "https://access.redhat.com/security/cve/cve-2013-4245", "refsource": "MISC", - "name": "https://security-tracker.debian.org/tracker/CVE-2013-4245" + "name": "https://access.redhat.com/security/cve/cve-2013-4245" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4245", @@ -68,9 +69,9 @@ "name": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-4245" }, { - "url": "https://access.redhat.com/security/cve/cve-2013-4245", + "url": "https://security-tracker.debian.org/tracker/CVE-2013-4245", "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/cve-2013-4245" + "name": "https://security-tracker.debian.org/tracker/CVE-2013-4245" } ] } diff --git a/2013/4xxx/CVE-2013-4255.json b/2013/4xxx/CVE-2013-4255.json index 9c2072012b0..b60c64c89f9 100644 --- a/2013/4xxx/CVE-2013-4255.json +++ b/2013/4xxx/CVE-2013-4255.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4255", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,32 +27,56 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "RHSA-2013:1172", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-1172.html" - }, - { - "name": "https://htcondor-wiki.cs.wisc.edu/index.cgi/tktview?tn=1786", - "refsource": "CONFIRM", - "url": "https://htcondor-wiki.cs.wisc.edu/index.cgi/tktview?tn=1786" - }, - { - "name": "RHSA-2013:1171", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-1171.html" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=919401", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=919401" - }, - { - "name": "https://htcondor-wiki.cs.wisc.edu/index.cgi/tktview?tn=3829", + "url": "http://rhn.redhat.com/errata/RHSA-2013-1171.html", "refsource": "MISC", - "url": "https://htcondor-wiki.cs.wisc.edu/index.cgi/tktview?tn=3829" + "name": "http://rhn.redhat.com/errata/RHSA-2013-1171.html" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-1172.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-1172.html" + }, + { + "url": "https://htcondor-wiki.cs.wisc.edu/index.cgi/tktview?tn=1786", + "refsource": "MISC", + "name": "https://htcondor-wiki.cs.wisc.edu/index.cgi/tktview?tn=1786" + }, + { + "url": "https://htcondor-wiki.cs.wisc.edu/index.cgi/tktview?tn=3829", + "refsource": "MISC", + "name": "https://htcondor-wiki.cs.wisc.edu/index.cgi/tktview?tn=3829" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=919401", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=919401" } ] } diff --git a/2013/4xxx/CVE-2013-4256.json b/2013/4xxx/CVE-2013-4256.json index 58767f41ba3..d587ba4de6e 100644 --- a/2013/4xxx/CVE-2013-4256.json +++ b/2013/4xxx/CVE-2013-4256.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4256", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[oss-security] 20130819 Re: CVE Request : NAS v1.9.3 multiple Vulnerabilites", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/08/19/3" + "url": "http://radscan.com/pipermail/nas/2013-August/001270.html", + "refsource": "MISC", + "name": "http://radscan.com/pipermail/nas/2013-August/001270.html" }, { - "name": "[nas] 20130807 nas: Multiple Vulnerabilities in nas 1.9.3", - "refsource": "MLIST", - "url": "http://radscan.com/pipermail/nas/2013-August/001270.html" + "url": "http://sourceforge.net/p/nas/code/288", + "refsource": "MISC", + "name": "http://sourceforge.net/p/nas/code/288" }, { - "name": "[oss-security] 20130816 CVE Request : NAS v1.9.3 multiple Vulnerabilites", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/08/16/2" + "url": "http://www.debian.org/security/2013/dsa-2771", + "refsource": "MISC", + "name": "http://www.debian.org/security/2013/dsa-2771" }, { - "name": "http://sourceforge.net/p/nas/code/288", - "refsource": "CONFIRM", - "url": "http://sourceforge.net/p/nas/code/288" + "url": "http://www.openwall.com/lists/oss-security/2013/08/16/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/08/16/2" }, { - "name": "DSA-2771", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2013/dsa-2771" + "url": "http://www.openwall.com/lists/oss-security/2013/08/19/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/08/19/3" }, { - "name": "61848", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/61848" + "url": "http://www.securityfocus.com/bid/61848", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/61848" }, { - "name": "USN-1986-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1986-1" + "url": "http://www.ubuntu.com/usn/USN-1986-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1986-1" } ] } diff --git a/2013/4xxx/CVE-2013-4276.json b/2013/4xxx/CVE-2013-4276.json index 428ebebaa1e..a2459dae5e0 100644 --- a/2013/4xxx/CVE-2013-4276.json +++ b/2013/4xxx/CVE-2013-4276.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4276", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,47 +27,71 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "USN-3770-2", - "refsource": "UBUNTU", - "url": "https://usn.ubuntu.com/3770-2/" + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718682", + "refsource": "MISC", + "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718682" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=992975", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=992975" + "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00021.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00021.html" }, { - "name": "61607", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/61607" + "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00029.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00029.html" }, { - "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718682", - "refsource": "CONFIRM", - "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718682" + "url": "http://www.openwall.com/lists/oss-security/2013/08/22/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/08/22/3" }, { - "name": "openSUSE-SU-2013:1560", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00029.html" + "url": "http://www.securityfocus.com/bid/61607", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/61607" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=991757", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=991757" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=991757", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=991757" }, { - "name": "openSUSE-SU-2013:1547", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00021.html" + "url": "https://usn.ubuntu.com/3770-2/", + "refsource": "MISC", + "name": "https://usn.ubuntu.com/3770-2/" }, { - "name": "[oss-security] 20130822 Re: CVE request: lcms 1.x buffer overflows", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/08/22/3" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=992975", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=992975" } ] } diff --git a/2013/4xxx/CVE-2013-4296.json b/2013/4xxx/CVE-2013-4296.json index 4de45b5a40c..19ee409fc24 100644 --- a/2013/4xxx/CVE-2013-4296.json +++ b/2013/4xxx/CVE-2013-4296.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4296", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,62 +27,86 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "60895", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/60895" + "url": "http://wiki.libvirt.org/page/Maintenance_Releases", + "refsource": "MISC", + "name": "http://wiki.libvirt.org/page/Maintenance_Releases" }, { - "name": "GLSA-201412-04", - "refsource": "GENTOO", - "url": "http://security.gentoo.org/glsa/glsa-201412-04.xml" + "url": "http://rhn.redhat.com/errata/RHSA-2013-1460.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-1460.html" }, { - "name": "http://libvirt.org/git/?p=libvirt.git;a=commit;h=e7f400a110e2e3673b96518170bfea0855dd82c0", - "refsource": "CONFIRM", - "url": "http://libvirt.org/git/?p=libvirt.git;a=commit;h=e7f400a110e2e3673b96518170bfea0855dd82c0" + "url": "http://secunia.com/advisories/60895", + "refsource": "MISC", + "name": "http://secunia.com/advisories/60895" }, { - "name": "DSA-2764", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2013/dsa-2764" + "url": "http://security.gentoo.org/glsa/glsa-201412-04.xml", + "refsource": "MISC", + "name": "http://security.gentoo.org/glsa/glsa-201412-04.xml" }, { - "name": "USN-1954-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1954-1" + "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00023.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00023.html" }, { - "name": "http://wiki.libvirt.org/page/Maintenance_Releases", - "refsource": "CONFIRM", - "url": "http://wiki.libvirt.org/page/Maintenance_Releases" + "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00024.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00024.html" }, { - "name": "RHSA-2013:1272", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-1272.html" + "url": "http://rhn.redhat.com/errata/RHSA-2013-1272.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-1272.html" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1006173", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1006173" + "url": "http://www.ubuntu.com/usn/USN-1954-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1954-1" }, { - "name": "RHSA-2013:1460", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-1460.html" + "url": "http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=e7f400a110e2e3673b96518170bfea0855dd82c0", + "refsource": "MISC", + "name": "http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=e7f400a110e2e3673b96518170bfea0855dd82c0" }, { - "name": "openSUSE-SU-2013:1550", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00024.html" + "url": "http://www.debian.org/security/2013/dsa-2764", + "refsource": "MISC", + "name": "http://www.debian.org/security/2013/dsa-2764" }, { - "name": "openSUSE-SU-2013:1549", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00023.html" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1006173", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1006173" } ] } diff --git a/2013/4xxx/CVE-2013-4325.json b/2013/4xxx/CVE-2013-4325.json index 309bece04f0..e1c94dbe6f8 100644 --- a/2013/4xxx/CVE-2013-4325.json +++ b/2013/4xxx/CVE-2013-4325.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4325", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "RHSA-2013:1274", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-1274.html" + "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00062.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00062.html" }, { - "name": "USN-1956-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1956-1" + "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00000.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00000.html" }, { - "name": "openSUSE-SU-2013:1617", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00062.html" + "url": "http://rhn.redhat.com/errata/RHSA-2013-1274.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-1274.html" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1002375", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1002375" + "url": "http://www.debian.org/security/2013/dsa-2829", + "refsource": "MISC", + "name": "http://www.debian.org/security/2013/dsa-2829" }, { - "name": "DSA-2829", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2013/dsa-2829" + "url": "http://www.ubuntu.com/usn/USN-1956-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1956-1" }, { - "name": "openSUSE-SU-2013:1620", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00000.html" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1002375", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1002375" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1006674", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1006674" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1006674", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1006674" } ] } diff --git a/2013/4xxx/CVE-2013-4326.json b/2013/4xxx/CVE-2013-4326.json index ca483df0888..bc6fed9db5e 100644 --- a/2013/4xxx/CVE-2013-4326.json +++ b/2013/4xxx/CVE-2013-4326.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4326", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,32 +27,56 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "openSUSE-SU-2013:1597", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00051.html" - }, - { - "name": "RHSA-2013:1282", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-1282.html" - }, - { - "name": "[oss-security] 20130918 Re: Fwd: [vs-plain] polkit races", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/09/18/6" - }, - { - "name": "openSUSE-SU-2013:1548", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00022.html" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1006677", + "url": "http://www.openwall.com/lists/oss-security/2013/09/18/6", "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1006677" + "name": "http://www.openwall.com/lists/oss-security/2013/09/18/6" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00022.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00022.html" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00051.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00051.html" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-1282.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-1282.html" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1006677", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1006677" } ] } diff --git a/2013/4xxx/CVE-2013-4345.json b/2013/4xxx/CVE-2013-4345.json index 0f5ef5d218a..77c7cffe925 100644 --- a/2013/4xxx/CVE-2013-4345.json +++ b/2013/4xxx/CVE-2013-4345.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2013-4345 kernel: ansi_cprng: off by one error in non-block size request" + "value": "Off-by-one error in the get_prng_bytes function in crypto/ansi_cprng.c in the Linux kernel through 3.11.4 makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via multiple requests for small amounts of data, leading to improper management of the state of the consumed data." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Off-by-one Error", - "cweId": "CWE-193" + "value": "n/a" } ] } @@ -32,38 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 5", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:2.6.18-371.1.2.el5", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 6", - "version": { - "version_data": [ - { - "version_value": "0:2.6.32-431.el6", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise MRG 2", - "version": { - "version_data": [ - { - "version_value": "0:3.8.13-rt14.25.el6rt", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -116,11 +93,6 @@ "refsource": "MISC", "name": "http://rhn.redhat.com/errata/RHSA-2013-1490.html" }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:1490", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:1490" - }, { "url": "http://rhn.redhat.com/errata/RHSA-2013-1449.html", "refsource": "MISC", @@ -131,16 +103,6 @@ "refsource": "MISC", "name": "http://rhn.redhat.com/errata/RHSA-2013-1645.html" }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:1449", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:1449" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:1645", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:1645" - }, { "url": "http://www.ubuntu.com/usn/USN-2064-1", "refsource": "MISC", @@ -176,41 +138,11 @@ "refsource": "MISC", "name": "http://www.ubuntu.com/usn/USN-2110-1" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2013-4345", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2013-4345" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007690", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1007690" } ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "HIGH", - "accessVector": "LOCAL", - "authentication": "NONE", - "availabilityImpact": "NONE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 2.6, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:N", - "version": "2.0" - } - ] } } \ No newline at end of file diff --git a/2013/4xxx/CVE-2013-4346.json b/2013/4xxx/CVE-2013-4346.json index a726bdd3f92..3792b91212f 100644 --- a/2013/4xxx/CVE-2013-4346.json +++ b/2013/4xxx/CVE-2013-4346.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "It was found that python-oauth2 did not properly verify the nonce of a signed URL. An attacker able to capture network traffic of a website using OAuth2 authentication could use this flaw to conduct replay attacks against that website." + "value": "The Server.verify_request function in SimpleGeo python-oauth2 does not check the nonce, which allows remote attackers to perform replay attacks via a signed URL." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Verification of Cryptographic Signature", - "cweId": "CWE-347" + "value": "n/a" } ] } @@ -32,2292 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Satellite 6.1", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:1.0-5.3.ep5.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.4-16.redhat_3.1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:0.6-4_redhat_1.ep6.el6.1", - "version_affected": "!" - }, - { - "version_value": "0:1-8.2_redhat_1.ep6.el6.1", - "version_affected": "!" - }, - { - "version_value": "0:1.46-3.5_redhat_1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:0.9.1.2-2.ep5.el6", - "version_affected": "!" - }, - { - "version_value": "0:0.9.49.3-1.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.0.22-1.el6", - "version_affected": "!" - }, - { - "version_value": "0:1-5.el6_4", - "version_affected": "!" - }, - { - "version_value": "0:2.1.5-5.el6_4", - "version_affected": "!" - }, - { - "version_value": "0:1.7R3-1.el6_4", - "version_affected": "!" - }, - { - "version_value": "0:0.7.4-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.6.1-11.8_redhat_1.ep6.el6.1", - "version_affected": "!" - }, - { - "version_value": "1:1.7.6-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:11-2.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.7.2.33-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.1.0-36", - "version_affected": "!" - }, - { - "version_value": "0:1.7.2.5-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.7.2.13-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.9.6-6.el6_2", - "version_affected": "!" - }, - { - "version_value": "0:1.1.1-9_redhat_1.ep6.el6.1", - "version_affected": "!" - }, - { - "version_value": "0:1.4.4-6_redhat_1.ep6.el6.1", - "version_affected": "!" - }, - { - "version_value": "0:2.2.5-19.redhat_7.2.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:2.6.2-2.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0-3.3.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:3.0-2_redhat_1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:2.0-3.el6sat.2", - "version_affected": "!" - }, - { - "version_value": "0:1.0.15.0-1.el6", - "version_affected": "!" - }, - { - "version_value": "0:4.0.1-2.Final_redhat_1.1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:4.2.5-1.Final_redhat_1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:4.3.1-2.Final_redhat_1.1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.0.0-4.7.GA_redhat_2.ep6.el6.3", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-5.Final_redhat_2.1.ep6.el6.4", - "version_affected": "!" - }, - { - "version_value": "0:1.0.0-3.el6_4", - "version_affected": "!" - }, - { - "version_value": "0:2.3.5-2.Final_redhat_2.1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:6-9.redhat_1.3.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:20130517-7.1fm.gitc4bce43.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-3.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-2.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:3.12.1-1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:2.2.17-4.GA_redhat_1.ep6.el6.1", - "version_affected": "!" - }, - { - "version_value": "0:1.0.4-3.Final_redhat_2.1.ep6.el6.1", - "version_affected": "!" - }, - { - "version_value": "0:3.1.2-3.GA_redhat_1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.0.0-1.Beta2_redhat_1.1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-6.Final_redhat_2.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "1:4.16.2-1.Final.3.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.1.1-4.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:2.2.0.14-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.2.5-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.2.1-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.3.17-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.1.0-5.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "1:13.4.1-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.13-3.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:4.6.1-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.4-1.pulp.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.4.6-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.2.6-1_redhat_1.2.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:20100601-4.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:3.3.1-5_redhat_1.1.ep6.el6.1", - "version_affected": "!" - }, - { - "version_value": "0:1.2.4-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.90.10.redhat_1-2", - "version_affected": "!" - }, - { - "version_value": "0:2.6.0.15-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.5-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.5-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.6.2-4.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.3-9.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:4.2.1-1.20140510git08b00d9.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.5.3-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.6-6.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.6-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.3-4.el6sat", - "version_affected": "!" - }, - { - "version_value": "1:3.0.8.1-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "1:3.3.0.17-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3-2.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.1.11-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.2.2-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.2-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "1:0.10.1-4.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.7.2-1.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.0.2-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.5.0-4.pulp.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.23-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.6-3.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "1:3.0.24-10.pulp.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.7.10-2.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.1-2.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.211-8.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.32-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.5.2-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.30-6.el6", - "version_affected": "!" - }, - { - "version_value": "0:2.4.3-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.2.0-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.37-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.8.3-2.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.30-9.el6", - "version_affected": "!" - }, - { - "version_value": "0:0.4-7.el6", - "version_affected": "!" - }, - { - "version_value": "0:0.30-3.el6", - "version_affected": "!" - }, - { - "version_value": "0:0.9-4.el6", - "version_affected": "!" - }, - { - "version_value": "0:0.30-5.el6", - "version_affected": "!" - }, - { - "version_value": "0:0.30-4.el6", - "version_affected": "!" - }, - { - "version_value": "0:2.3.7.2-1.Final_redhat_1.1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.6.18-5.el6_4", - "version_affected": "!" - }, - { - "version_value": "0:2.3.5-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.4.0-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.0-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.7.2-11.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.2-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.3-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.3-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.5-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.5.2-9.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.0.0-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.0.0-8.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.3-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.0.10-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.0-6.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.7-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1.4-10.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.0-4.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.7.2-7.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.17.0-1.1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.7.7.9-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.38.0-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.9.16-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.8.8-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.8.0-13.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.9-11.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.24.0-3.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.1-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.24.0-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.0-2.1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.3-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.1-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.9-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.0-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.2-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.5-2.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:4.0.2.13-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.0.19-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.2.0.18-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.1.9-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.7-2.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.2.10-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.1-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.15.4-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.1-9.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:4.0.10.1-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.10.0-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.8-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.4-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.1.6-6.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.4-8.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.22-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.2-7.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.8.6-11.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.7-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.8.0-6.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:4.0.2-8.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.4-4.el6sam", - "version_affected": "!" - }, - { - "version_value": "0:0.1.8-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.2.0.65-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.2-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.5.1-2.1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.5.0-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1.3-17.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.8.1-26.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.8.2-4.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.2.0-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.1-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1.0-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.6.7-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.11-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.4.7-8.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.4.2-2.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1.2-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:4.0.18-19.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.12.2-10.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.7-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.30.0-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.9.0-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.29-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.6.0-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.4-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.6.7-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.0-16.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.1-9.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.5.1-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.1.1-15.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.5-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.2.1-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.2.13-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.0.1-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.7.1-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.3-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.45.0-6.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:4.1.3-7.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.4.5-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.10.1-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.1-11.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.2-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.3-4.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.6-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.1.3-6.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.0-1.3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1.0-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.0.2-10.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.2-6.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.4.1-1.el6_4", - "version_affected": "!" - }, - { - "version_value": "0:0.0.11-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.2-12.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.15-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.0-7.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.2-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.4-10.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.0-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.0.4-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1.2-4.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.4.11-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.6.5-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.4.14-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.2.7-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.1.10-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.3.9-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.3.5-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.1.3-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.10.19-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.7.17-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.5-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.6.21-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.6-2.el6", - "version_affected": "!" - }, - { - "version_value": "0:0.6.5.9-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.4.4-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.9-7.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.19-7.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.11-8.el6sat", - "version_affected": "!" - }, - { - "version_value": "1:1.4.1-13.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.0-7.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.9.2.2-41.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.5.1-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.12-27.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.2-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.10.0-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "1:1.3.6-27.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.6-5.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.2.1-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.0.9-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.1-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.14.6-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.3-18.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.5-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.1-13.el6_4", - "version_affected": "!" - }, - { - "version_value": "0:0.22-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.2-4.redhat_1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.6.5-0.9.git58097d9.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.2.2-2.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.7.5-4.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.0.4-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "1:2.6.1-9_redhat_2.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:20110809-5_redhat_2.ep6.el6.3", - "version_affected": "!" - }, - { - "version_value": "1:3.14.5.10-9.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.13.1-13.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.9.2-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0-8.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.4-16.redhat_3.1.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.2-8.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-4.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.6-10.redhat_3.1.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:10-14.el7", - "version_affected": "!" - }, - { - "version_value": "0:2-11.el7", - "version_affected": "!" - }, - { - "version_value": "0:1-13.20100611svn86.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.46-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.4.0-19.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.9.1.2-3.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.9.49.3-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.22-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.0-2_redhat_1.el7", - "version_affected": "!" - }, - { - "version_value": "0:1-5.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.1.5-6.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.7R3-3.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0-11.SP4.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.2-18.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.7.4-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.90.10-7.el7", - "version_affected": "!" - }, - { - "version_value": "1:1.7.6-2.1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:11-2.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:4.2.1-5.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.7.2.33-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.7.2.5-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.7.2.13-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.9.6-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.6.2-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.1.3-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.0-3.el7sat.2", - "version_affected": "!" - }, - { - "version_value": "0:1.8.9-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:13.0-6.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.15.0-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.6-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:332.14-12.el7", - "version_affected": "!" - }, - { - "version_value": "0:4.0.1-5.Final_redhat_2.1.ep6.el7.3", - "version_affected": "!" - }, - { - "version_value": "0:4.2.7-6.SP2_redhat_1.1.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:4.3.1-1.Final_redhat_1.1.ep6.el7.4", - "version_affected": "!" - }, - { - "version_value": "0:1.0.0-4.7.GA_redhat_2.ep6.el7.3", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-5.Final_redhat_2.1.ep6.el7.4", - "version_affected": "!" - }, - { - "version_value": "0:1.3.1-2.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.3.14-1.Final_redhat_1.1.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:20130517-7.1fm.gitc4bce43.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-3.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-1.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-2.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-5.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.6.1-2.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.9-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.4-10.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.2-10.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-0.7.20120212git2fabd8.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.2-0.9.20120319git49a904.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.4-3.Final_redhat_2.1.ep6.el7.1", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.1.4-1.GA_redhat_1.1.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:14-2.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.0-0.7.Beta2.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-8.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-9.Final_redhat_2.2.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.1.50-5.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.6.1-10.el7", - "version_affected": "!" - }, - { - "version_value": "0:0-0.18.20090319svn.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.1.1-6.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.2.0.14-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.2.5-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.2.1-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.3.17-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:5.3.21-17.el7_0.1", - "version_affected": "!" - }, - { - "version_value": "0:3.1.0-1.el7", - "version_affected": "!" - }, - { - "version_value": "1:20.4-1.5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.13-6.el7", - "version_affected": "!" - }, - { - "version_value": "0:4.6.1-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.0.5-16.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.2.1-47.el7", - "version_affected": "!" - }, - { - "version_value": "1:1.0-10.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.4-11.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.1-4.el7", - "version_affected": "!" - }, - { - "version_value": "1:1.2.1-8.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.1-3.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.1.1-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:20-5.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.2.1-12.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.4-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.8.1-2.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.1-6.el7", - "version_affected": "!" - }, - { - "version_value": "1:1.1-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.4-3.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.4-3.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.7-4.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.4.9-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.9.14-13.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.6.7-1.Final_redhat_1.1.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:20100601-5.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.3.1-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.2.4-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.7-11.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.7-5.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.4.2-8.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.2-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0-0.16.alpha15.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.5.5-14.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0-0.14.alpha6.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.15-8.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0-0.15.a7.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.4-13.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.0.9-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.1.8-16.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.6.0.15-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.5-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.5-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.6.2-4.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.3-9.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:4.2.1-1.20140510git08b00d9.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.6-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.3-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "1:3.0.8.1-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "1:3.3.0.17-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.1.11-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.2.2-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.2-1.el7", - "version_affected": "!" - }, - { - "version_value": "1:0.10.1-4.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.0-6.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.5.0-4.pulp.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.23-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.7.2-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "1:3.0.24-10.pulp.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.7.10-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.1-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.211-8.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.32-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.5.2-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.30-6.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.4.3-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.2.0-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.2.0-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.37-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.9.1-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.30-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.4-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.30-3.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.9-4.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.30-5.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.30-4.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.3.8-4.Final_redhat_3.1.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.6.18-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.3.5-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.4.0-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.0-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.7.2-11.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.2-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.3-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.3-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.5.2-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.0.0-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.0.0-8.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.3-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.0.10-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.0-6.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.7-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.1.4-10.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.0-4.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.7.2-7.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.17.0-1.1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.7.7.9-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.38.0-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.9.16-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.8.8-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.8.0-13.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.9.3-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.24.0-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.1-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.24.0-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.0-2.1.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.0.3-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.1.1-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.3.9-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.1.0-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.4.2-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.5-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:4.0.2.13-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.0.19-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.2.0.18-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.1.9-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.7-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.2.10-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.1-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.15.4-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.1-9.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:4.0.10.1-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.10.0-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.8-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.4-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.1.6-6.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.4-8.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.22-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.2-7.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.8.6-11.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.7-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.8.0-6.el7", - "version_affected": "!" - }, - { - "version_value": "0:4.0.2-8.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.4-4.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.8-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.2.0.65-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.2-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.5.1-2.1.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.5.0-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.1.3-17.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.8.1-26.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.8.2-4.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.2.0-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.1-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1.0-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.6.7-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.11-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.4.7-8.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.4.2-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1.2-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:4.0.18-19.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.12.2-10.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.7-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.30.0-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.9.0-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.29-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.6.0-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.4-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.6.7-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.0-16.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.1-9.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.5.1-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.1.1-15.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.5-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.2.1-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.2.13-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.0.1-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.7.1-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.3-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.45.0-6.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:4.1.3-7.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.4.5-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.10.1-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.1-11.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.2-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.3-4.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.6-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.1.3-6.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.0-1.3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1.0-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.0.2-10.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.2-6.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.5.0-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.0.11-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.2-12.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.0-7.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.2-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.4-10.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.0-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.0.4-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1.2-4.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.4.11-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.6.5-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.4.14-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.2.7-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.1.10-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.3.9-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.3.5-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.1.3-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.10.19-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.7.17-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.5-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.6.21-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.5.9-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.4.4-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.9-7.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.19-7.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.11-8.el7sat", - "version_affected": "!" - }, - { - "version_value": "1:1.4.1-13.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.0-7.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.9.2.2-41.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.5.1-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.1.2-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.10.0-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2-1.el7", - "version_affected": "!" - }, - { - "version_value": "1:1.3.6-27.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.2.1-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.0.9-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.1-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.3-18.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.5-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.1-21.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.22-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.6.5-0.9.git58097d9.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-11.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.4-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "1:3.14.5.10-11.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.13-6.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.1.3.8-11.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.3.1-10.el7", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -2330,11 +53,6 @@ }, "references": { "reference_data": [ - { - "url": "https://access.redhat.com/errata/RHSA-2015:1591", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2015:1591" - }, { "url": "http://www.openwall.com/lists/oss-security/2013/09/12/7", "refsource": "MISC", @@ -2345,51 +63,11 @@ "refsource": "MISC", "name": "http://www.securityfocus.com/bid/62386" }, - { - "url": "https://access.redhat.com/errata/RHSA-2015:1592", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2015:1592" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2013-4346", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2013-4346" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007746", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1007746" - }, { "url": "https://github.com/simplegeo/python-oauth2/issues/129", "refsource": "MISC", "name": "https://github.com/simplegeo/python-oauth2/issues/129" } ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "MEDIUM", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "NONE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 4.3, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", - "version": "2.0" - } - ] } } \ No newline at end of file diff --git a/2013/4xxx/CVE-2013-4355.json b/2013/4xxx/CVE-2013-4355.json index a11ff80a1f7..6a534232297 100644 --- a/2013/4xxx/CVE-2013-4355.json +++ b/2013/4xxx/CVE-2013-4355.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2013-4355 Kernel: Xen: Xsa-63: information leak via I/O instruction emulation" + "value": "Xen 4.3.x and earlier does not properly handle certain errors, which allows local HVM guests to obtain hypervisor stack memory via a (1) port or (2) memory mapped I/O write or (3) other unspecified operations related to addresses without associated memory." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Exposure of Sensitive Information to an Unauthorized Actor", - "cweId": "CWE-200" + "value": "n/a" } ] } @@ -32,16 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 5", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:2.6.18-371.3.1.el5", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -93,46 +92,6 @@ "url": "http://www.openwall.com/lists/oss-security/2013/09/30/1", "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2013/09/30/1" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:1790", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:1790" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2013-4355", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2013-4355" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009598", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1009598" - } - ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "MEDIUM", - "accessVector": "ADJACENT_NETWORK", - "authentication": "SINGLE", - "availabilityImpact": "NONE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 2.3, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:A/AC:M/Au:S/C:P/I:N/A:N", - "version": "2.0" } ] } diff --git a/2013/4xxx/CVE-2013-4356.json b/2013/4xxx/CVE-2013-4356.json index df50db3315a..d78016cf1c8 100644 --- a/2013/4xxx/CVE-2013-4356.json +++ b/2013/4xxx/CVE-2013-4356.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4356", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "54962", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/54962" + "url": "http://security.gentoo.org/glsa/glsa-201407-03.xml", + "refsource": "MISC", + "name": "http://security.gentoo.org/glsa/glsa-201407-03.xml" }, { - "name": "GLSA-201407-03", - "refsource": "GENTOO", - "url": "http://security.gentoo.org/glsa/glsa-201407-03.xml" + "url": "http://secunia.com/advisories/54962", + "refsource": "MISC", + "name": "http://secunia.com/advisories/54962" }, { - "name": "[oss-security] 20130930 Xen Security Advisory 64 (CVE-2013-4356) - Memory accessible by 64-bit PV guests under live migration", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/09/30/2" + "url": "http://www.openwall.com/lists/oss-security/2013/09/30/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/09/30/2" }, { - "name": "62709", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/62709" + "url": "http://www.securityfocus.com/bid/62709", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/62709" } ] } diff --git a/2013/4xxx/CVE-2013-4375.json b/2013/4xxx/CVE-2013-4375.json index cca13269dc3..fc4e8d2687f 100644 --- a/2013/4xxx/CVE-2013-4375.json +++ b/2013/4xxx/CVE-2013-4375.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4375", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://xenproject.org/downloads/xen-archives/supported-xen-43-series/xen-431.html", - "refsource": "CONFIRM", - "url": "http://xenproject.org/downloads/xen-archives/supported-xen-43-series/xen-431.html" + "url": "http://security.gentoo.org/glsa/glsa-201407-03.xml", + "refsource": "MISC", + "name": "http://security.gentoo.org/glsa/glsa-201407-03.xml" }, { - "name": "GLSA-201407-03", - "refsource": "GENTOO", - "url": "http://security.gentoo.org/glsa/glsa-201407-03.xml" + "url": "http://www.ubuntu.com/usn/USN-2092-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-2092-1" }, { - "name": "USN-2092-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-2092-1" + "url": "http://www.openwall.com/lists/oss-security/2013/10/10/14", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/10/10/14" }, { - "name": "[oss-security] 20131010 Xen Security Advisory 71 (CVE-2013-4375) - qemu disk backend (qdisk) resource leak", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/10/10/14" + "url": "http://xenproject.org/downloads/xen-archives/supported-xen-43-series/xen-431.html", + "refsource": "MISC", + "name": "http://xenproject.org/downloads/xen-archives/supported-xen-43-series/xen-431.html" } ] } diff --git a/2013/4xxx/CVE-2013-4385.json b/2013/4xxx/CVE-2013-4385.json index 66764527cec..770a4121aa1 100644 --- a/2013/4xxx/CVE-2013-4385.json +++ b/2013/4xxx/CVE-2013-4385.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4385", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,37 +27,61 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "62690", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/62690" + "url": "http://lists.gnu.org/archive/html/chicken-announce/2013-10/msg00000.html", + "refsource": "MISC", + "name": "http://lists.gnu.org/archive/html/chicken-announce/2013-10/msg00000.html" }, { - "name": "[chicken-announce] 20130927 Re: [SECURITY] Buffer overrun in some uses of read-string! procedure from \"extras\"", - "refsource": "MLIST", - "url": "http://lists.nongnu.org/archive/html/chicken-announce/2013-09/msg00001.html" + "url": "http://lists.nongnu.org/archive/html/chicken-announce/2013-09/msg00000.html", + "refsource": "MISC", + "name": "http://lists.nongnu.org/archive/html/chicken-announce/2013-09/msg00000.html" }, { - "name": "[chicken-announce] 20130926 [SECURITY] Buffer overrun in some uses of read-string! procedure from \"extras\"", - "refsource": "MLIST", - "url": "http://lists.nongnu.org/archive/html/chicken-announce/2013-09/msg00000.html" + "url": "http://lists.nongnu.org/archive/html/chicken-announce/2013-09/msg00001.html", + "refsource": "MISC", + "name": "http://lists.nongnu.org/archive/html/chicken-announce/2013-09/msg00001.html" }, { - "name": "[chicken-announce] 20131003 Chicken 4.8.0.5 released", - "refsource": "MLIST", - "url": "http://lists.gnu.org/archive/html/chicken-announce/2013-10/msg00000.html" + "url": "http://secunia.com/advisories/55009", + "refsource": "MISC", + "name": "http://secunia.com/advisories/55009" }, { - "name": "GLSA-201612-54", - "refsource": "GENTOO", - "url": "https://security.gentoo.org/glsa/201612-54" + "url": "http://www.securityfocus.com/bid/62690", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/62690" }, { - "name": "55009", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/55009" + "url": "https://security.gentoo.org/glsa/201612-54", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/201612-54" } ] } diff --git a/2013/4xxx/CVE-2013-4386.json b/2013/4xxx/CVE-2013-4386.json index e77a87ee091..7f463d2e9bd 100644 --- a/2013/4xxx/CVE-2013-4386.json +++ b/2013/4xxx/CVE-2013-4386.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2013-4386 Foreman: host and host group parameter SQL injection" + "value": "Multiple SQL injection vulnerabilities in app/models/concerns/host_common.rb in Foreman before 1.2.3 allow remote attackers to execute arbitrary SQL commands via the (1) fqdn or (2) hostgroup parameter." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", - "cweId": "CWE-89" + "value": "n/a" } ] } @@ -32,1303 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "OpenStack 3 for RHEL 6", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:1.1.10014-1.3.el6ost", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Satellite 6.0", - "version": { - "version_data": [ - { - "version_value": "0:1.15-13.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.13.1-13.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.9.2-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0-5.3.ep5.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.4-16.redhat_3.1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:3.2-8.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-4.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.6-4_redhat_1.ep6.el6.1", - "version_affected": "!" - }, - { - "version_value": "0:10-14.el7", - "version_affected": "!" - }, - { - "version_value": "0:2-11.el7", - "version_affected": "!" - }, - { - "version_value": "0:1-13.20100611svn86.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.46-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.4.0-19.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.9.1.2-3.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.9.23-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.0-2_redhat_1.el7", - "version_affected": "!" - }, - { - "version_value": "0:1-5.el6_4", - "version_affected": "!" - }, - { - "version_value": "0:2.1.5-5.el6_4", - "version_affected": "!" - }, - { - "version_value": "0:1.7R3-3.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0-11.SP4.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.2-18.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.9.9-21.2.pulp.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.4.0-23.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.6.1-11.8_redhat_1.ep6.el6.1", - "version_affected": "!" - }, - { - "version_value": "0:0.90.10-6.el6sat", - "version_affected": "!" - }, - { - "version_value": "1:1.7.6-2.1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:11-2.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:4.2.1-5.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.6.0.44-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:7.0-20140822.0.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.6.0.30-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.6.0.14-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.9.6-6.el6_2", - "version_affected": "!" - }, - { - "version_value": "0:1.1.1-9_redhat_1.ep6.el6.1", - "version_affected": "!" - }, - { - "version_value": "0:1.4.4-6_redhat_1.ep6.el6.1", - "version_affected": "!" - }, - { - "version_value": "0:2.2.5-19.redhat_7.2.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.3.0-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0-3.3.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:3.1.3-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.0-3.el6sat.2", - "version_affected": "!" - }, - { - "version_value": "0:1.8.9-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:13.0-6.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.6-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:332.14-12.el7", - "version_affected": "!" - }, - { - "version_value": "0:4.0.1-2.Final_redhat_1.1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:4.2.5-1.Final_redhat_1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:4.3.1-1.Final_redhat_1.1.ep6.el7.4", - "version_affected": "!" - }, - { - "version_value": "0:1.0.0-4.7.GA_redhat_2.ep6.el7.3", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-5.Final_redhat_2.1.ep6.el7.4", - "version_affected": "!" - }, - { - "version_value": "0:1.3.1-2.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.3.5-2.Final_redhat_2.1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:6-9.redhat_1.3.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:20130517-7.1fm.gitc4bce43.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-3.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-1.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-2.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-5.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.6.1-2.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.9-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.4-10.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.12.1-1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:2.2.17-4.GA_redhat_1.ep6.el6.1", - "version_affected": "!" - }, - { - "version_value": "0:1.0.2-10.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-0.7.20120212git2fabd8.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.2-0.9.20120319git49a904.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.4-3.Final_redhat_2.1.ep6.el7.1", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.1.4-1.GA_redhat_1.1.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:14-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.0-0.7.Beta2.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-8.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-9.Final_redhat_2.2.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "1:4.16.2-1.Final.3.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:0.1.50-5.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.6.1-10.el7", - "version_affected": "!" - }, - { - "version_value": "0:0-0.18.20090319svn.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.1.1-6.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.5.0-30.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.3-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.6-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.64-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.16-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:5.3.21-17.el7_0.1", - "version_affected": "!" - }, - { - "version_value": "0:2.2.2-6.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.0.5-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "1:20.4-1.1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.13-6.el7", - "version_affected": "!" - }, - { - "version_value": "0:4.6.1-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.0.5-16.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.2.1-47.el7", - "version_affected": "!" - }, - { - "version_value": "1:1.0-10.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.4-11.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.1-4.el7", - "version_affected": "!" - }, - { - "version_value": "1:1.2.1-8.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.1-3.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.1.1-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:20-5.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.2.1-12.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.4-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.8.1-2.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.1-6.el7", - "version_affected": "!" - }, - { - "version_value": "1:1.1-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.4-3.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.4-3.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.9.2-1.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.7-4.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.9.7-1.el6", - "version_affected": "!" - }, - { - "version_value": "0:0.9.2-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.4-1.pulp.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.4.9-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.9.14-13.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.2.6-1_redhat_1.2.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:20100601-5.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.3.1-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.0.7-11.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.7-5.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.4.2-8.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.2-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0-0.16.alpha15.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.5.5-14.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0-0.14.alpha6.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.15-8.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0-0.15.a7.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.4-13.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.0.9-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.1.8-16.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.4.1-0.7.beta.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3-4.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.4.1-0.7.beta.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.6.2-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.5.3-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.6-6.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.5-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.3-4.el6sat", - "version_affected": "!" - }, - { - "version_value": "1:3.0.8.1-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "1:3.3.0.17-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.1.11-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.2.2-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.7.2-1.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.0.2-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.5.0-1.pulp.el6sat", - "version_affected": "!" - }, - { - "version_value": "1:3.0.15-12.pulp.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.1-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.211-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.32-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.5.2-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.22-14.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.2.1-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.12.5-1.el6", - "version_affected": "!" - }, - { - "version_value": "0:2.2.0-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.2.0-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.37-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.22-42.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.22-6.el6", - "version_affected": "!" - }, - { - "version_value": "0:0.7-2.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.22-37.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.22-13.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.3.8-4.Final_redhat_3.1.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.6.18-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.3.5-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.4.0-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.0-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.7.2-11.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.4-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.3-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.3-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.5-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.0.0-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.0.0-8.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.3-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.0.3.0-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.0-6.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.2.0-10.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.6-7.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.12.2-6.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.10.4-7.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.3-10.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1.4-10.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.6.0-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.7.2-7.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.7.3-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.12.10-11.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.32.1-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.9.16-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.8.8-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.8.0-13.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.21.0-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.1-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.21.1-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.0-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.2-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.6-1.1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.0-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.5-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.4-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.9-1.1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.1-9.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.7-9.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.0-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.10.0-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.8-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.4-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.1.6-6.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.4-8.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.22-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.2-7.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.8.6-11.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.7-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:4.0.2-8.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.4-4.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.8-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.0-88.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.3.1-7.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.3.2-7.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1.3-17.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.8.1-26.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.0-12.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.8.2-4.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.2.0-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.1-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1.0-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.6.7-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.11-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.4.7-8.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.0-9.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:4.0.18-19.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.12.2-10.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.7-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.9.0-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.29-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.6.0-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.1-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.6.7-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.0-16.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.1-9.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.5.1-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.2.3-8.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.1.1-15.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1.0-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.2.1-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.2.13-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.7.1-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.45.0-6.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:4.1.3-7.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.4.5-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.3.4-8.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.10.1-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.1-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.1-11.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.0-12.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.1-9.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.2-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.12-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.3-4.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.6-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.1.3-6.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.0-1.3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.0.2-10.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.2-6.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.5.0-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.4.3-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.8-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.2-12.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.15-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.0-7.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.2-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.4-10.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.0-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.11-6.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1.2-4.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.1-12.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.2-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.1-16.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.3-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.10.4-1.1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.4-14.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.5-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.6.21-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.6-2.el6", - "version_affected": "!" - }, - { - "version_value": "0:0.6.4-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.8-7.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1.3-17.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.9-7.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.19-7.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.8.2-4.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:4.0.18-19.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.11-8.el6sat", - "version_affected": "!" - }, - { - "version_value": "1:1.4.1-13.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.0-7.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.9.2.2-41.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.12-27.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.2-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.7.0-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.7-5.el6", - "version_affected": "!" - }, - { - "version_value": "1:1.3.6-27.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-1.1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.1-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.14.6-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.3-18.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.5-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.1-13.el6_4", - "version_affected": "!" - }, - { - "version_value": "0:0.22-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.2-4.redhat_1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.6.5-0.9.git58097d9.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-11.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.2.2-2.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.7.5-4.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.0.4-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.12.0-2.el7", - "version_affected": "!" - }, - { - "version_value": "1:2.6.1-9_redhat_2.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:20110809-5_redhat_2.ep6.el6.3", - "version_affected": "!" - }, - { - "version_value": "1:3.14.5.10-11.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.13-6.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.1.3.8-11.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.3.1-10.el7", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -1341,11 +53,6 @@ }, "references": { "reference_data": [ - { - "url": "https://access.redhat.com/errata/RHEA-2014:1175", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHEA-2014:1175" - }, { "url": "http://projects.theforeman.org/issues/3160", "refsource": "MISC", @@ -1356,51 +63,11 @@ "refsource": "MISC", "name": "http://rhn.redhat.com/errata/RHSA-2013-1522.html" }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:1522", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:1522" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2013-4386", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2013-4386" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1013076", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1013076" - }, { "url": "https://groups.google.com/forum/#%21topic/foreman-announce/GKMNXM66Z84", "refsource": "MISC", "name": "https://groups.google.com/forum/#%21topic/foreman-announce/GKMNXM66Z84" } ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "MEDIUM", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "NONE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 4.3, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", - "version": "2.0" - } - ] } } \ No newline at end of file diff --git a/2013/4xxx/CVE-2013-4405.json b/2013/4xxx/CVE-2013-4405.json index 0cab36cd959..395f15681d7 100644 --- a/2013/4xxx/CVE-2013-4405.json +++ b/2013/4xxx/CVE-2013-4405.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2013-4405 cumin: CSRF protection does not work" + "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the web interface for cumin in Red Hat Enterprise MRG Grid 2.4 allow remote attackers to hijack the authentication of cumin users for unspecified requests." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Cross-Site Request Forgery (CSRF)", - "cweId": "CWE-352" + "value": "n/a" } ] } @@ -32,31 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "MRG for RHEL-5 v. 2", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:0.1.5787-4.el5", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise MRG 2", - "version": { - "version_data": [ - { - "version_value": "0:0.1.5787-4.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.8.23.2-1.el6", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -79,55 +63,10 @@ "refsource": "MISC", "name": "http://rhn.redhat.com/errata/RHSA-2013-1852.html" }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:1851", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:1851" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:1852", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:1852" - }, { "url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=998561", "refsource": "MISC", "name": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=998561" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2013-4405", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2013-4405" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=998561", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=998561" - } - ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "MEDIUM", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "NONE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 4.3, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", - "version": "2.0" } ] } diff --git a/2013/4xxx/CVE-2013-4416.json b/2013/4xxx/CVE-2013-4416.json index d528866d6b5..a90755c6f48 100644 --- a/2013/4xxx/CVE-2013-4416.json +++ b/2013/4xxx/CVE-2013-4416.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4416", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "GLSA-201407-03", - "refsource": "GENTOO", - "url": "http://security.gentoo.org/glsa/glsa-201407-03.xml" + "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html" }, { - "name": "1029264", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id/1029264" + "url": "http://security.gentoo.org/glsa/glsa-201407-03.xml", + "refsource": "MISC", + "name": "http://security.gentoo.org/glsa/glsa-201407-03.xml" }, { - "name": "99072", - "refsource": "OSVDB", - "url": "http://osvdb.org/99072" + "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00059.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00059.html" }, { - "name": "[oss-security] 20131029 Xen Security Advisory 72 (CVE-2013-4416) - ocaml xenstored mishandles oversized message replies", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/10/29/5" + "url": "http://osvdb.org/99072", + "refsource": "MISC", + "name": "http://osvdb.org/99072" }, { - "name": "63404", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/63404" + "url": "http://www.openwall.com/lists/oss-security/2013/10/29/5", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/10/29/5" }, { - "name": "openSUSE-SU-2013:1636", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html" + "url": "http://www.securityfocus.com/bid/63404", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/63404" }, { - "name": "openSUSE-SU-2013:1876", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00059.html" + "url": "http://www.securitytracker.com/id/1029264", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id/1029264" } ] } diff --git a/2013/4xxx/CVE-2013-4445.json b/2013/4xxx/CVE-2013-4445.json index 80fefb2744b..6d9fab8b4e5 100644 --- a/2013/4xxx/CVE-2013-4445.json +++ b/2013/4xxx/CVE-2013-4445.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4445", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,37 +27,61 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "FEDORA-2013-20965", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-November/122308.html" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-November/121433.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-November/121433.html" }, { - "name": "https://drupal.org/node/2113317", - "refsource": "CONFIRM", - "url": "https://drupal.org/node/2113317" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-November/122298.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-November/122298.html" }, { - "name": "https://drupal.org/node/2112785", - "refsource": "CONFIRM", - "url": "https://drupal.org/node/2112785" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-November/122308.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-November/122308.html" }, { - "name": "FEDORA-2013-20942", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-November/121433.html" + "url": "https://drupal.org/node/2112785", + "refsource": "MISC", + "name": "https://drupal.org/node/2112785" }, { - "name": "FEDORA-2013-20976", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-November/122298.html" + "url": "https://drupal.org/node/2112791", + "refsource": "MISC", + "name": "https://drupal.org/node/2112791" }, { - "name": "https://drupal.org/node/2112791", - "refsource": "CONFIRM", - "url": "https://drupal.org/node/2112791" + "url": "https://drupal.org/node/2113317", + "refsource": "MISC", + "name": "https://drupal.org/node/2113317" } ] } diff --git a/2014/0xxx/CVE-2014-0007.json b/2014/0xxx/CVE-2014-0007.json index cb4c5a30564..f8cac8370f1 100644 --- a/2014/0xxx/CVE-2014-0007.json +++ b/2014/0xxx/CVE-2014-0007.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2014-0007 foreman-proxy: smart-proxy remote command injection" + "value": "The Smart-Proxy in Foreman before 1.4.5 and 1.5.x before 1.5.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the path parameter to tftp/fetch_boot_file." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", - "cweId": "CWE-78" + "value": "n/a" } ] } @@ -32,1314 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "OpenStack 3 for RHEL 6", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:1.1.10001-7.el6ost", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "OpenStack 4 for RHEL 6", - "version": { - "version_data": [ - { - "version_value": "0:1.3.0-5.el6sat", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Satellite 6.0", - "version": { - "version_data": [ - { - "version_value": "0:1.15-13.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.13.1-13.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.9.2-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0-5.3.ep5.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.4-16.redhat_3.1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:3.2-8.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-4.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.6-4_redhat_1.ep6.el6.1", - "version_affected": "!" - }, - { - "version_value": "0:10-14.el7", - "version_affected": "!" - }, - { - "version_value": "0:2-11.el7", - "version_affected": "!" - }, - { - "version_value": "0:1-13.20100611svn86.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.46-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.4.0-19.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.9.1.2-3.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.9.23-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.0-2_redhat_1.el7", - "version_affected": "!" - }, - { - "version_value": "0:1-5.el6_4", - "version_affected": "!" - }, - { - "version_value": "0:2.1.5-5.el6_4", - "version_affected": "!" - }, - { - "version_value": "0:1.7R3-3.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0-11.SP4.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.2-18.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.9.9-21.2.pulp.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.4.0-23.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.6.1-11.8_redhat_1.ep6.el6.1", - "version_affected": "!" - }, - { - "version_value": "0:0.90.10-6.el6sat", - "version_affected": "!" - }, - { - "version_value": "1:1.7.6-2.1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:11-2.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:4.2.1-5.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.6.0.44-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:7.0-20140822.0.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.6.0.30-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.6.0.14-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.9.6-6.el6_2", - "version_affected": "!" - }, - { - "version_value": "0:1.1.1-9_redhat_1.ep6.el6.1", - "version_affected": "!" - }, - { - "version_value": "0:1.4.4-6_redhat_1.ep6.el6.1", - "version_affected": "!" - }, - { - "version_value": "0:2.2.5-19.redhat_7.2.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.3.0-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0-3.3.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:3.1.3-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.0-3.el6sat.2", - "version_affected": "!" - }, - { - "version_value": "0:1.8.9-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:13.0-6.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.6-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:332.14-12.el7", - "version_affected": "!" - }, - { - "version_value": "0:4.0.1-2.Final_redhat_1.1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:4.2.5-1.Final_redhat_1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:4.3.1-1.Final_redhat_1.1.ep6.el7.4", - "version_affected": "!" - }, - { - "version_value": "0:1.0.0-4.7.GA_redhat_2.ep6.el7.3", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-5.Final_redhat_2.1.ep6.el7.4", - "version_affected": "!" - }, - { - "version_value": "0:1.3.1-2.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.3.5-2.Final_redhat_2.1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:6-9.redhat_1.3.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:20130517-7.1fm.gitc4bce43.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-3.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-1.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-2.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-5.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.6.1-2.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.9-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.4-10.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.12.1-1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:2.2.17-4.GA_redhat_1.ep6.el6.1", - "version_affected": "!" - }, - { - "version_value": "0:1.0.2-10.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-0.7.20120212git2fabd8.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.2-0.9.20120319git49a904.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.4-3.Final_redhat_2.1.ep6.el7.1", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.1.4-1.GA_redhat_1.1.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:14-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.0-0.7.Beta2.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-8.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-9.Final_redhat_2.2.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "1:4.16.2-1.Final.3.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:0.1.50-5.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.6.1-10.el7", - "version_affected": "!" - }, - { - "version_value": "0:0-0.18.20090319svn.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.1.1-6.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.5.0-30.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.3-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.6-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.64-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.16-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:5.3.21-17.el7_0.1", - "version_affected": "!" - }, - { - "version_value": "0:2.2.2-6.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.0.5-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "1:20.4-1.1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.13-6.el7", - "version_affected": "!" - }, - { - "version_value": "0:4.6.1-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.0.5-16.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.2.1-47.el7", - "version_affected": "!" - }, - { - "version_value": "1:1.0-10.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.4-11.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.1-4.el7", - "version_affected": "!" - }, - { - "version_value": "1:1.2.1-8.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.1-3.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.1.1-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:20-5.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.2.1-12.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.4-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.8.1-2.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.1-6.el7", - "version_affected": "!" - }, - { - "version_value": "1:1.1-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.4-3.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.4-3.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.9.2-1.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.7-4.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.9.7-1.el6", - "version_affected": "!" - }, - { - "version_value": "0:0.9.2-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.4-1.pulp.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.4.9-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.9.14-13.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.2.6-1_redhat_1.2.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:20100601-5.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.3.1-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.0.7-11.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.7-5.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.4.2-8.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.2-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0-0.16.alpha15.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.5.5-14.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0-0.14.alpha6.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.15-8.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0-0.15.a7.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.4-13.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.0.9-9.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.1.8-16.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.4.1-0.7.beta.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3-4.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.4.1-0.7.beta.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.6.2-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.5.3-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.6-6.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.5-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.3-4.el6sat", - "version_affected": "!" - }, - { - "version_value": "1:3.0.8.1-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "1:3.3.0.17-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.1.11-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.2.2-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.7.2-1.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.0.2-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.5.0-1.pulp.el6sat", - "version_affected": "!" - }, - { - "version_value": "1:3.0.15-12.pulp.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.1-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.211-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.32-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.5.2-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.22-14.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.2.1-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.12.5-1.el6", - "version_affected": "!" - }, - { - "version_value": "0:2.2.0-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.2.0-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.37-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.22-42.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.22-6.el6", - "version_affected": "!" - }, - { - "version_value": "0:0.7-2.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.22-37.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.22-13.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.3.8-4.Final_redhat_3.1.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.6.18-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.3.5-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.4.0-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.0-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.7.2-11.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.4-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.3-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.3-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.5-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.0.0-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.0.0-8.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.3-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.0.3.0-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.0-6.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.2.0-10.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.6-7.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.12.2-6.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.10.4-7.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.3-10.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1.4-10.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.6.0-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.7.2-7.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.7.3-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.12.10-11.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.32.1-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.9.16-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.8.8-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.8.0-13.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.21.0-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.1-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.21.1-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.0-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.2-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.6-1.1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.0-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.5-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.4-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.9-1.1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.1-9.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.7-9.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.0-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.10.0-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.8-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.4-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.1.6-6.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.4-8.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.22-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.2-7.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.8.6-11.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.7-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:4.0.2-8.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.4-4.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.8-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.0-88.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.3.1-7.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.3.2-7.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1.3-17.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.8.1-26.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.0-12.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.8.2-4.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.2.0-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.1-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1.0-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.6.7-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.11-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.4.7-8.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.0-9.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:4.0.18-19.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.12.2-10.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.7-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.9.0-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.29-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.6.0-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.1-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.6.7-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.0-16.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.1-9.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.5.1-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.2.3-8.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.1.1-15.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1.0-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.2.1-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.2.13-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.7.1-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.45.0-6.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:4.1.3-7.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.4.5-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.3.4-8.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.10.1-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.1-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.1-11.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.0-12.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.1-9.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.2-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.12-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.3-4.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.6-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.1.3-6.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.0-1.3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.0.2-10.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.2-6.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.5.0-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.4.3-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.8-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.2-12.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.15-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.0-7.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.2-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.4-10.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.0-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.11-6.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1.2-4.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.1-12.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.2-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.1-16.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.3-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.10.4-1.1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.4-14.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.5-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.6.21-1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.6-2.el6", - "version_affected": "!" - }, - { - "version_value": "0:0.6.4-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.8-7.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1.3-17.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.9-7.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.19-7.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.8.2-4.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:4.0.18-19.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.11-8.el6sat", - "version_affected": "!" - }, - { - "version_value": "1:1.4.1-13.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.0-7.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.9.2.2-41.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:3.12-27.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.2-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.7.0-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.7-5.el6", - "version_affected": "!" - }, - { - "version_value": "1:1.3.6-27.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-1.1.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.1-3.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.14.6-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.3-18.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.5-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.1-13.el6_4", - "version_affected": "!" - }, - { - "version_value": "0:0.22-5.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.2-4.redhat_1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.6.5-0.9.git58097d9.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.3.0-11.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.2.2-2.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.7.5-4.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.0.4-2.el6sat", - "version_affected": "!" - }, - { - "version_value": "0:1.12.0-2.el7", - "version_affected": "!" - }, - { - "version_value": "1:2.6.1-9_redhat_2.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:20110809-5_redhat_2.ep6.el6.3", - "version_affected": "!" - }, - { - "version_value": "1:3.14.5.10-11.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.13-6.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.1.3.8-11.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.3.1-10.el7", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -1352,11 +53,6 @@ }, "references": { "reference_data": [ - { - "url": "https://access.redhat.com/errata/RHEA-2014:1175", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHEA-2014:1175" - }, { "url": "http://projects.theforeman.org/issues/6086", "refsource": "MISC", @@ -1366,46 +62,6 @@ "url": "http://rhn.redhat.com/errata/RHSA-2014-0770.html", "refsource": "MISC", "name": "http://rhn.redhat.com/errata/RHSA-2014-0770.html" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2014:0770", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2014:0770" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2014-0007", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2014-0007" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1105369", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1105369" - } - ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "LOW", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "COMPLETE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 10, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "COMPLETE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "COMPLETE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", - "version": "2.0" } ] } diff --git a/2014/0xxx/CVE-2014-0008.json b/2014/0xxx/CVE-2014-0008.json index 0fb3cfa1011..458e58a46ab 100644 --- a/2014/0xxx/CVE-2014-0008.json +++ b/2014/0xxx/CVE-2014-0008.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0008", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,37 +27,61 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://moodle.org/mod/forum/discuss.php?d=252414", - "refsource": "CONFIRM", - "url": "https://moodle.org/mod/forum/discuss.php?d=252414" + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-36721", + "refsource": "MISC", + "name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-36721" }, { - "name": "[oss-security] 20140120 Moodle security notifications public", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2014/01/20/1" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-January/127510.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2014-January/127510.html" }, { - "name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-36721", - "refsource": "CONFIRM", - "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-36721" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-January/127533.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2014-January/127533.html" }, { - "name": "FEDORA-2014-1396", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-January/127533.html" + "url": "http://openwall.com/lists/oss-security/2014/01/20/1", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2014/01/20/1" }, { - "name": "FEDORA-2014-1377", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-January/127510.html" + "url": "http://www.securitytracker.com/id/1029647", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id/1029647" }, { - "name": "1029647", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id/1029647" + "url": "https://moodle.org/mod/forum/discuss.php?d=252414", + "refsource": "MISC", + "name": "https://moodle.org/mod/forum/discuss.php?d=252414" } ] } diff --git a/2014/0xxx/CVE-2014-0009.json b/2014/0xxx/CVE-2014-0009.json index 2958f72b1e3..fdeb7121d9a 100644 --- a/2014/0xxx/CVE-2014-0009.json +++ b/2014/0xxx/CVE-2014-0009.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0009", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,37 +27,61 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[oss-security] 20140120 Moodle security notifications public", - "refsource": "MLIST", - "url": "http://openwall.com/lists/oss-security/2014/01/20/1" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-January/127510.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2014-January/127510.html" }, { - "name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-42643", - "refsource": "CONFIRM", - "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-42643" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-January/127533.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2014-January/127533.html" }, { - "name": "https://moodle.org/mod/forum/discuss.php?d=252415", - "refsource": "CONFIRM", - "url": "https://moodle.org/mod/forum/discuss.php?d=252415" + "url": "http://openwall.com/lists/oss-security/2014/01/20/1", + "refsource": "MISC", + "name": "http://openwall.com/lists/oss-security/2014/01/20/1" }, { - "name": "FEDORA-2014-1396", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-January/127533.html" + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-42643", + "refsource": "MISC", + "name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-42643" }, { - "name": "FEDORA-2014-1377", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-January/127510.html" + "url": "http://www.securitytracker.com/id/1029648", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id/1029648" }, { - "name": "1029648", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id/1029648" + "url": "https://moodle.org/mod/forum/discuss.php?d=252415", + "refsource": "MISC", + "name": "https://moodle.org/mod/forum/discuss.php?d=252415" } ] } diff --git a/2014/0xxx/CVE-2014-0017.json b/2014/0xxx/CVE-2014-0017.json index 675fa5a46ab..c8fed9a142e 100644 --- a/2014/0xxx/CVE-2014-0017.json +++ b/2014/0xxx/CVE-2014-0017.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0017", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,47 +27,71 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "USN-2145-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-2145-1" + "url": "http://www.openwall.com/lists/oss-security/2014/03/05/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2014/03/05/1" }, { - "name": "DSA-2879", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2014/dsa-2879" + "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00036.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00036.html" }, { - "name": "openSUSE-SU-2014:0366", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00036.html" + "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00040.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00040.html" }, { - "name": "57407", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/57407" + "url": "http://secunia.com/advisories/57407", + "refsource": "MISC", + "name": "http://secunia.com/advisories/57407" }, { - "name": "[oss-security] 20140305 libssh and stunnel PRNG flaws", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2014/03/05/1" + "url": "http://www.debian.org/security/2014/dsa-2879", + "refsource": "MISC", + "name": "http://www.debian.org/security/2014/dsa-2879" }, { - "name": "http://www.libssh.org/2014/03/04/libssh-0-6-3-security-release/", - "refsource": "CONFIRM", - "url": "http://www.libssh.org/2014/03/04/libssh-0-6-3-security-release/" + "url": "http://www.libssh.org/2014/03/04/libssh-0-6-3-security-release/", + "refsource": "MISC", + "name": "http://www.libssh.org/2014/03/04/libssh-0-6-3-security-release/" }, { - "name": "openSUSE-SU-2014:0370", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00040.html" + "url": "http://www.ubuntu.com/usn/USN-2145-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-2145-1" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1072191", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1072191" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1072191", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1072191" } ] } diff --git a/2014/0xxx/CVE-2014-0018.json b/2014/0xxx/CVE-2014-0018.json index 4b9e996db7a..9f35c7d4be3 100644 --- a/2014/0xxx/CVE-2014-0018.json +++ b/2014/0xxx/CVE-2014-0018.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0018", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,32 +27,56 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "RHSA-2014:0170", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2014-0170.html" + "url": "http://rhn.redhat.com/errata/RHSA-2014-0170.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2014-0170.html" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1052783", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1052783" + "url": "http://rhn.redhat.com/errata/RHSA-2014-0171.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2014-0171.html" }, { - "name": "RHSA-2014:0172", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2014-0172.html" + "url": "http://rhn.redhat.com/errata/RHSA-2014-0172.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2014-0172.html" }, { - "name": "65591", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/65591" + "url": "http://www.securityfocus.com/bid/65591", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/65591" }, { - "name": "RHSA-2014:0171", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2014-0171.html" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1052783", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1052783" } ] } diff --git a/2014/0xxx/CVE-2014-0027.json b/2014/0xxx/CVE-2014-0027.json index 3fa37a75525..397d438fa33 100644 --- a/2014/0xxx/CVE-2014-0027.json +++ b/2014/0xxx/CVE-2014-0027.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0027", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "The play_wave_from_socket function in audio/auserver.c in Flite 1.4 allows local users to modify arbitrary files via a symlink attack on /tmp/awb.wav. NOTE: some of these details are obtained from third party information." + "value": "The play_wave_from_socket function in audio/auserver.c in Flite 1.4 allows local users to modify arbitrary files via a symlink attack on /tmp/awb.wav. NOTE: some of these details are obtained from third party information." } ] }, @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "FEDORA-2014-0579", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127776.html" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127748.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127748.html" }, { - "name": "64791", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/64791" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127776.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127776.html" }, { - "name": "MDVSA-2014:032", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:032" + "url": "http://seclists.org/oss-sec/2014/q1/59", + "refsource": "MISC", + "name": "http://seclists.org/oss-sec/2014/q1/59" }, { - "name": "101948", - "refsource": "OSVDB", - "url": "http://www.osvdb.org/101948" + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:032", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:032" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1048678", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1048678" + "url": "http://www.osvdb.org/101948", + "refsource": "MISC", + "name": "http://www.osvdb.org/101948" }, { - "name": "[oss-security] 20140110 temporary file issue in flite", - "refsource": "MLIST", - "url": "http://seclists.org/oss-sec/2014/q1/59" + "url": "http://www.securityfocus.com/bid/64791", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/64791" }, { - "name": "FEDORA-2014-0574", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127748.html" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1048678", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1048678" } ] } diff --git a/2014/0xxx/CVE-2014-0028.json b/2014/0xxx/CVE-2014-0028.json index 01a777128a9..646534572f9 100644 --- a/2014/0xxx/CVE-2014-0028.json +++ b/2014/0xxx/CVE-2014-0028.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0028", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "USN-2093-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-2093-1" + "url": "http://libvirt.org/news.html", + "refsource": "MISC", + "name": "http://libvirt.org/news.html" }, { - "name": "http://libvirt.org/news.html", - "refsource": "CONFIRM", - "url": "http://libvirt.org/news.html" + "url": "http://secunia.com/advisories/60895", + "refsource": "MISC", + "name": "http://secunia.com/advisories/60895" }, { - "name": "60895", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/60895" + "url": "http://security.gentoo.org/glsa/glsa-201412-04.xml", + "refsource": "MISC", + "name": "http://security.gentoo.org/glsa/glsa-201412-04.xml" }, { - "name": "GLSA-201412-04", - "refsource": "GENTOO", - "url": "http://security.gentoo.org/glsa/glsa-201412-04.xml" + "url": "http://www.ubuntu.com/usn/USN-2093-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-2093-1" }, { - "name": "openSUSE-SU-2014:0268", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00060.html" + "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00060.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00060.html" }, { - "name": "[libvirt] 20140115 [PATCH 0/4] CVE-2014-0028: domain events vs. ACL filtering", - "refsource": "MLIST", - "url": "https://www.redhat.com/archives/libvir-list/2014-January/msg00684.html" + "url": "https://www.redhat.com/archives/libvir-list/2014-January/msg00684.html", + "refsource": "MISC", + "name": "https://www.redhat.com/archives/libvir-list/2014-January/msg00684.html" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1048637", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1048637" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1048637", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1048637" } ] } diff --git a/2014/0xxx/CVE-2014-0029.json b/2014/0xxx/CVE-2014-0029.json index 13b469245df..9683b5de18f 100644 --- a/2014/0xxx/CVE-2014-0029.json +++ b/2014/0xxx/CVE-2014-0029.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0029", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,12 +27,36 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1059433", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1059433" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1059433", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1059433" } ] } diff --git a/2014/0xxx/CVE-2014-0037.json b/2014/0xxx/CVE-2014-0037.json index 4ef371f97e6..f3137056b89 100644 --- a/2014/0xxx/CVE-2014-0037.json +++ b/2014/0xxx/CVE-2014-0037.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0037", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1056767", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056767" + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:044", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:044" }, { - "name": "[oss-security] 20140131 Security Flaw CVE-2014-0037", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2014/01/31/14" + "url": "http://www.openwall.com/lists/oss-security/2014/01/31/14", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2014/01/31/14" }, { - "name": "MDVSA-2014:044", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:044" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1059903", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1059903" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1059903", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1059903" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056767", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1056767" } ] } diff --git a/2014/0xxx/CVE-2014-0038.json b/2014/0xxx/CVE-2014-0038.json index 7ea1ee2b1b9..d5dfd11ff79 100644 --- a/2014/0xxx/CVE-2014-0038.json +++ b/2014/0xxx/CVE-2014-0038.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0038", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,102 +27,126 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2def2ef2ae5f3990aabdbe8a755911902707d268", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2def2ef2ae5f3990aabdbe8a755911902707d268" - }, - { - "name": "USN-2096-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-2096-1" - }, - { - "name": "https://github.com/saelo/cve-2014-0038", + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html", "refsource": "MISC", - "url": "https://github.com/saelo/cve-2014-0038" + "name": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html" }, { - "name": "USN-2095-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-2095-1" - }, - { - "name": "http://pastebin.com/raw.php?i=DH3Lbg54", + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.html", "refsource": "MISC", - "url": "http://pastebin.com/raw.php?i=DH3Lbg54" + "name": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.html" }, { - "name": "https://code.google.com/p/chromium/issues/detail?id=338594", + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2def2ef2ae5f3990aabdbe8a755911902707d268", "refsource": "MISC", - "url": "https://code.google.com/p/chromium/issues/detail?id=338594" + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2def2ef2ae5f3990aabdbe8a755911902707d268" }, { - "name": "USN-2094-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-2094-1" + "url": "http://pastebin.com/raw.php?i=DH3Lbg54", + "refsource": "MISC", + "name": "http://pastebin.com/raw.php?i=DH3Lbg54" }, { - "name": "MDVSA-2014:038", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:038" + "url": "http://secunia.com/advisories/56669", + "refsource": "MISC", + "name": "http://secunia.com/advisories/56669" }, { - "name": "56669", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/56669" + "url": "http://www.exploit-db.com/exploits/31346", + "refsource": "MISC", + "name": "http://www.exploit-db.com/exploits/31346" }, { - "name": "65255", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/65255" + "url": "http://www.exploit-db.com/exploits/31347", + "refsource": "MISC", + "name": "http://www.exploit-db.com/exploits/31347" }, { - "name": "https://github.com/torvalds/linux/commit/2def2ef2ae5f3990aabdbe8a755911902707d268", - "refsource": "CONFIRM", - "url": "https://github.com/torvalds/linux/commit/2def2ef2ae5f3990aabdbe8a755911902707d268" + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.2", + "refsource": "MISC", + "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.2" }, { - "name": "40503", - "refsource": "EXPLOIT-DB", - "url": "https://www.exploit-db.com/exploits/40503/" + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:038", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:038" }, { - "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.2", - "refsource": "CONFIRM", - "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.2" + "url": "http://www.openwall.com/lists/oss-security/2014/01/31/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2014/01/31/2" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1060023", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060023" + "url": "http://www.securityfocus.com/bid/65255", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/65255" }, { - "name": "openSUSE-SU-2014:0204", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html" + "url": "http://www.ubuntu.com/usn/USN-2094-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-2094-1" }, { - "name": "31347", - "refsource": "EXPLOIT-DB", - "url": "http://www.exploit-db.com/exploits/31347" + "url": "http://www.ubuntu.com/usn/USN-2095-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-2095-1" }, { - "name": "openSUSE-SU-2014:0205", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.html" + "url": "http://www.ubuntu.com/usn/USN-2096-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-2096-1" }, { - "name": "31346", - "refsource": "EXPLOIT-DB", - "url": "http://www.exploit-db.com/exploits/31346" + "url": "https://code.google.com/p/chromium/issues/detail?id=338594", + "refsource": "MISC", + "name": "https://code.google.com/p/chromium/issues/detail?id=338594" }, { - "name": "[oss-security] 20140131 Linux 3.4+: arbitrary write with CONFIG_X86_X32 (CVE-2014-0038)", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2014/01/31/2" + "url": "https://github.com/saelo/cve-2014-0038", + "refsource": "MISC", + "name": "https://github.com/saelo/cve-2014-0038" + }, + { + "url": "https://github.com/torvalds/linux/commit/2def2ef2ae5f3990aabdbe8a755911902707d268", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/2def2ef2ae5f3990aabdbe8a755911902707d268" + }, + { + "url": "https://www.exploit-db.com/exploits/40503/", + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/40503/" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060023", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1060023" } ] } diff --git a/2014/0xxx/CVE-2014-0047.json b/2014/0xxx/CVE-2014-0047.json index 692f93e2685..1c19b7e4608 100644 --- a/2014/0xxx/CVE-2014-0047.json +++ b/2014/0xxx/CVE-2014-0047.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0047", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,22 +27,46 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "73315", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/73315" + "url": "http://www.openwall.com/lists/oss-security/2015/03/24/23", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2015/03/24/23" }, { - "name": "[oss-security] 20150324 Re: 2 moderate (borderline low) docker flaws fixed in >=1.5 and possibly earlier", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2015/03/24/23" + "url": "http://www.securityfocus.com/bid/73315", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/73315" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1063549", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1063549" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1063549", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1063549" } ] } diff --git a/2014/0xxx/CVE-2014-0048.json b/2014/0xxx/CVE-2014-0048.json index 4c438d7c0a4..5e427c766f3 100644 --- a/2014/0xxx/CVE-2014-0048.json +++ b/2014/0xxx/CVE-2014-0048.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0048", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "docker.io", - "product": { - "product_data": [ - { - "product_name": "docker.io", - "version": { - "version_data": [ - { - "version_value": "before 1.6.0" - } - ] - } - } - ] - } - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,12 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "docker.io", + "product": { + "product_data": [ + { + "product_name": "docker.io", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "before 1.6.0" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://security-tracker.debian.org/tracker/CVE-2014-0048", + "url": "http://www.openwall.com/lists/oss-security/2015/03/24/18", "refsource": "MISC", - "name": "https://security-tracker.debian.org/tracker/CVE-2014-0048" + "name": "http://www.openwall.com/lists/oss-security/2015/03/24/18" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/24/22", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2015/03/24/22" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/24/23", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2015/03/24/23" + }, + { + "url": "https://access.redhat.com/security/cve/cve-2014-0048", + "refsource": "MISC", + "name": "https://access.redhat.com/security/cve/cve-2014-0048" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-0048", @@ -68,29 +84,14 @@ "name": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2014-0048" }, { - "url": "https://access.redhat.com/security/cve/cve-2014-0048", + "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E", "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/cve-2014-0048" + "name": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E" }, { - "url": "http://www.openwall.com/lists/oss-security/2015/03/24/23", + "url": "https://security-tracker.debian.org/tracker/CVE-2014-0048", "refsource": "MISC", - "name": "http://www.openwall.com/lists/oss-security/2015/03/24/23" - }, - { - "refsource": "MISC", - "name": "http://www.openwall.com/lists/oss-security/2015/03/24/18", - "url": "http://www.openwall.com/lists/oss-security/2015/03/24/18" - }, - { - "refsource": "MISC", - "name": "http://www.openwall.com/lists/oss-security/2015/03/24/22", - "url": "http://www.openwall.com/lists/oss-security/2015/03/24/22" - }, - { - "refsource": "MLIST", - "name": "[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12", - "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E" + "name": "https://security-tracker.debian.org/tracker/CVE-2014-0048" } ] } diff --git a/2014/0xxx/CVE-2014-0049.json b/2014/0xxx/CVE-2014-0049.json index b4cb1d76430..32082698e9f 100644 --- a/2014/0xxx/CVE-2014-0049.json +++ b/2014/0xxx/CVE-2014-0049.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0049", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,32 +27,56 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.6", - "refsource": "CONFIRM", - "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.6" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a08d3b3b99efd509133946056531cdf8f3a0c09b", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a08d3b3b99efd509133946056531cdf8f3a0c09b" }, { - "name": "[oss-security] 20140303 CVE-2014-0049 -- Linux kernel: kvm: mmio_fragments out-of-the-bounds access", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2014/03/03/1" + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.6", + "refsource": "MISC", + "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.6" }, { - "name": "https://github.com/torvalds/linux/commit/a08d3b3b99efd509133946056531cdf8f3a0c09b", - "refsource": "CONFIRM", - "url": "https://github.com/torvalds/linux/commit/a08d3b3b99efd509133946056531cdf8f3a0c09b" + "url": "http://www.openwall.com/lists/oss-security/2014/03/03/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2014/03/03/1" }, { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a08d3b3b99efd509133946056531cdf8f3a0c09b", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a08d3b3b99efd509133946056531cdf8f3a0c09b" + "url": "https://github.com/torvalds/linux/commit/a08d3b3b99efd509133946056531cdf8f3a0c09b", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/a08d3b3b99efd509133946056531cdf8f3a0c09b" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1062368", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1062368" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1062368", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1062368" } ] } diff --git a/2014/0xxx/CVE-2014-0057.json b/2014/0xxx/CVE-2014-0057.json index 20c7584122b..fa3ceb74e70 100644 --- a/2014/0xxx/CVE-2014-0057.json +++ b/2014/0xxx/CVE-2014-0057.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2014-0057 CFME: Dangerous send in ServiceController" + "value": "The x_button method in the ServiceController (vmdb/app/controllers/service_controller.rb) in Red Hat CloudForms 3.0 Management Engine 5.2 allows remote attackers to execute arbitrary methods via unspecified vectors." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')", - "cweId": "CWE-470" + "value": "n/a" } ] } @@ -32,52 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "CloudForms Management Engine 5.x", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:5.2.2.3-1.el6cf", - "version_affected": "!" - }, - { - "version_value": "0:1.9.3.448-40.1.el6", - "version_affected": "!" - }, - { - "version_value": "1:3.2.13-5.el6cf", - "version_affected": "!" - }, - { - "version_value": "0:1.9.2-3.el6cf", - "version_affected": "!" - }, - { - "version_value": "0:1.0.7-1.el6cf", - "version_affected": "!" - }, - { - "version_value": "0:0.31.0-1.el6cf", - "version_affected": "!" - }, - { - "version_value": "0:1.19.0-1.el6cf", - "version_affected": "!" - }, - { - "version_value": "0:0.7.0-1.el6cf", - "version_affected": "!" - }, - { - "version_value": "0:1.1.2-1.el6cf", - "version_affected": "!" - }, - { - "version_value": "0:1.5.6-3.el6cf", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -90,11 +53,6 @@ }, "references": { "reference_data": [ - { - "url": "https://access.redhat.com/errata/RHSA-2014:0215", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2014:0215" - }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-0215.html", "refsource": "MISC", @@ -105,41 +63,11 @@ "refsource": "MISC", "name": "http://secunia.com/advisories/57376" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2014-0057", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2014-0057" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1064140", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1064140" } ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "LOW", - "accessVector": "NETWORK", - "authentication": "SINGLE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 6.5, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", - "version": "2.0" - } - ] } } \ No newline at end of file diff --git a/2014/0xxx/CVE-2014-0058.json b/2014/0xxx/CVE-2014-0058.json index 1e243084bdd..103f24dd293 100644 --- a/2014/0xxx/CVE-2014-0058.json +++ b/2014/0xxx/CVE-2014-0058.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0058", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "RHSA-2014:0204", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2014-0204.html" + "url": "http://rhn.redhat.com/errata/RHSA-2015-0034.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2015-0034.html" }, { - "name": "RHSA-2015:0034", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2015-0034.html" + "url": "http://rhn.redhat.com/errata/RHSA-2014-0204.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2014-0204.html" }, { - "name": "RHSA-2014:0205", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2014-0205.html" + "url": "http://rhn.redhat.com/errata/RHSA-2014-0205.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2014-0205.html" }, { - "name": "65762", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/65762" + "url": "http://www.securityfocus.com/bid/65762", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/65762" } ] } diff --git a/2014/0xxx/CVE-2014-0059.json b/2014/0xxx/CVE-2014-0059.json index f8babbae4a7..918829a03d6 100644 --- a/2014/0xxx/CVE-2014-0059.json +++ b/2014/0xxx/CVE-2014-0059.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0059", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,37 +27,61 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "RHSA-2014:0565", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2014-0565.html" + "url": "http://rhn.redhat.com/errata/RHSA-2015-0675.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2015-0675.html" }, { - "name": "RHSA-2015:0675", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2015-0675.html" + "url": "http://rhn.redhat.com/errata/RHSA-2015-0850.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2015-0850.html" }, { - "name": "RHSA-2015:0850", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2015-0850.html" + "url": "http://rhn.redhat.com/errata/RHSA-2015-0851.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2015-0851.html" }, { - "name": "RHSA-2014:0563", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2014-0563.html" + "url": "http://rhn.redhat.com/errata/RHSA-2014-0563.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2014-0563.html" }, { - "name": "RHSA-2015:0851", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2015-0851.html" + "url": "http://rhn.redhat.com/errata/RHSA-2014-0564.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2014-0564.html" }, { - "name": "RHSA-2014:0564", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2014-0564.html" + "url": "http://rhn.redhat.com/errata/RHSA-2014-0565.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2014-0565.html" } ] } diff --git a/2014/0xxx/CVE-2014-0067.json b/2014/0xxx/CVE-2014-0067.json index 7685ff100af..307092f43dd 100644 --- a/2014/0xxx/CVE-2014-0067.json +++ b/2014/0xxx/CVE-2014-0067.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0067", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,62 +27,86 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://wiki.postgresql.org/wiki/20140220securityrelease", - "refsource": "CONFIRM", - "url": "http://wiki.postgresql.org/wiki/20140220securityrelease" + "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", + "refsource": "MISC", + "name": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { - "name": "DSA-2864", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2014/dsa-2864" + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html", + "refsource": "MISC", + "name": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html" }, { - "name": "http://www.postgresql.org/about/news/1506/", - "refsource": "CONFIRM", - "url": "http://www.postgresql.org/about/news/1506/" + "url": "https://support.apple.com/HT205219", + "refsource": "MISC", + "name": "https://support.apple.com/HT205219" }, { - "name": "APPLE-SA-2015-08-13-2", - "refsource": "APPLE", - "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" + "url": "https://support.apple.com/kb/HT205031", + "refsource": "MISC", + "name": "https://support.apple.com/kb/HT205031" }, { - "name": "DSA-2865", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2014/dsa-2865" + "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html" }, { - "name": "openSUSE-SU-2014:0345", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html" + "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html" }, { - "name": "65721", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/65721" + "url": "http://wiki.postgresql.org/wiki/20140220securityrelease", + "refsource": "MISC", + "name": "http://wiki.postgresql.org/wiki/20140220securityrelease" }, { - "name": "https://support.apple.com/kb/HT205031", - "refsource": "CONFIRM", - "url": "https://support.apple.com/kb/HT205031" + "url": "http://www.debian.org/security/2014/dsa-2864", + "refsource": "MISC", + "name": "http://www.debian.org/security/2014/dsa-2864" }, { - "name": "APPLE-SA-2015-09-16-4", - "refsource": "APPLE", - "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html" + "url": "http://www.debian.org/security/2014/dsa-2865", + "refsource": "MISC", + "name": "http://www.debian.org/security/2014/dsa-2865" }, { - "name": "openSUSE-SU-2014:0368", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html" + "url": "http://www.postgresql.org/about/news/1506/", + "refsource": "MISC", + "name": "http://www.postgresql.org/about/news/1506/" }, { - "name": "https://support.apple.com/HT205219", - "refsource": "CONFIRM", - "url": "https://support.apple.com/HT205219" + "url": "http://www.securityfocus.com/bid/65721", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/65721" } ] } diff --git a/2014/0xxx/CVE-2014-0068.json b/2014/0xxx/CVE-2014-0068.json index 52aebfea458..ae70d67abe5 100644 --- a/2014/0xxx/CVE-2014-0068.json +++ b/2014/0xxx/CVE-2014-0068.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2014-0068", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "It was reported that watchman in openshift node-utils creates /var/run/watchman.pid and /var/log/watchman.ouput with world writable permission." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-732", + "cweId": "CWE-732" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "openshift node-util as shipped in Openshift Enterprise 1.x and 2.x" } ] @@ -30,32 +52,12 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-732" - } - ] - } - ] - }, "references": { "reference_data": [ { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1064100", "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1064100", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1064100" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "It was reported that watchman in openshift node-utils creates /var/run/watchman.pid and /var/log/watchman.ouput with world writable permission." + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1064100" } ] } diff --git a/2014/0xxx/CVE-2014-0069.json b/2014/0xxx/CVE-2014-0069.json index a2900756caa..a4f50333d5a 100644 --- a/2014/0xxx/CVE-2014-0069.json +++ b/2014/0xxx/CVE-2014-0069.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0069", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,47 +27,71 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[linux-cifs] 20140214 [PATCH] cifs: ensure that uncached writes handle unmapped areas correctly", - "refsource": "MLIST", - "url": "http://article.gmane.org/gmane.linux.kernel.cifs/9401" + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html" }, { - "name": "65588", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/65588" + "url": "http://rhn.redhat.com/errata/RHSA-2014-0328.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2014-0328.html" }, { - "name": "https://github.com/torvalds/linux/commit/5d81de8e8667da7135d3a32a964087c0faf5483f", - "refsource": "CONFIRM", - "url": "https://github.com/torvalds/linux/commit/5d81de8e8667da7135d3a32a964087c0faf5483f" + "url": "http://article.gmane.org/gmane.linux.kernel.cifs/9401", + "refsource": "MISC", + "name": "http://article.gmane.org/gmane.linux.kernel.cifs/9401" }, { - "name": "RHSA-2014:0328", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2014-0328.html" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5d81de8e8667da7135d3a32a964087c0faf5483f", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5d81de8e8667da7135d3a32a964087c0faf5483f" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1064253", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1064253" + "url": "http://www.openwall.com/lists/oss-security/2014/02/17/4", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2014/02/17/4" }, { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=5d81de8e8667da7135d3a32a964087c0faf5483f", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=5d81de8e8667da7135d3a32a964087c0faf5483f" + "url": "http://www.securityfocus.com/bid/65588", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/65588" }, { - "name": "[oss-security] 20140217 CVE-2014-0069 -- kernel: cifs: incorrect handling of bogus user pointers during uncached writes", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2014/02/17/4" + "url": "https://github.com/torvalds/linux/commit/5d81de8e8667da7135d3a32a964087c0faf5483f", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/5d81de8e8667da7135d3a32a964087c0faf5483f" }, { - "name": "SUSE-SU-2014:0459", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1064253", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1064253" } ] } diff --git a/2014/0xxx/CVE-2014-0077.json b/2014/0xxx/CVE-2014-0077.json index 3ed126b358f..f88b4dfcfd6 100644 --- a/2014/0xxx/CVE-2014-0077.json +++ b/2014/0xxx/CVE-2014-0077.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0077", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "66678", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/66678" + "url": "http://secunia.com/advisories/59386", + "refsource": "MISC", + "name": "http://secunia.com/advisories/59386" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1064440", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1064440" + "url": "http://secunia.com/advisories/59599", + "refsource": "MISC", + "name": "http://secunia.com/advisories/59599" }, { - "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.10", - "refsource": "CONFIRM", - "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.10" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d8316f3991d207fe32881a9ac20241be8fa2bad0", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d8316f3991d207fe32881a9ac20241be8fa2bad0" }, { - "name": "https://github.com/torvalds/linux/commit/d8316f3991d207fe32881a9ac20241be8fa2bad0", - "refsource": "CONFIRM", - "url": "https://github.com/torvalds/linux/commit/d8316f3991d207fe32881a9ac20241be8fa2bad0" + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.10", + "refsource": "MISC", + "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.10" }, { - "name": "59386", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/59386" + "url": "http://www.securityfocus.com/bid/66678", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/66678" }, { - "name": "59599", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/59599" + "url": "https://github.com/torvalds/linux/commit/d8316f3991d207fe32881a9ac20241be8fa2bad0", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/d8316f3991d207fe32881a9ac20241be8fa2bad0" }, { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d8316f3991d207fe32881a9ac20241be8fa2bad0", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d8316f3991d207fe32881a9ac20241be8fa2bad0" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1064440", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1064440" } ] } diff --git a/2014/0xxx/CVE-2014-0078.json b/2014/0xxx/CVE-2014-0078.json index 3c042927312..6841c8fa102 100644 --- a/2014/0xxx/CVE-2014-0078.json +++ b/2014/0xxx/CVE-2014-0078.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2014-0078 CFME: multiple authorization bypass vulnerabilities in CatalogController" + "value": "The CatalogController in Red Hat CloudForms Management Engine (CFME) before 5.2.3.2 allows remote authenticated users to delete arbitrary catalogs via vectors involving guessing the catalog ID." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Missing Authorization", - "cweId": "CWE-862" + "value": "n/a" } ] } @@ -32,28 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "CloudForms Management Engine 5.x", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:5.2.3.2-1.el6cf", - "version_affected": "!" - }, - { - "version_value": "0:9.2.7-1.1.el6", - "version_affected": "!" - }, - { - "version_value": "0:9.0r2-4.el6cf", - "version_affected": "!" - }, - { - "version_value": "1:3.2.13-6.el6cf", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -71,46 +58,11 @@ "refsource": "MISC", "name": "http://rhn.redhat.com/errata/RHSA-2014-0469.html" }, - { - "url": "https://access.redhat.com/errata/RHSA-2014:0469", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2014:0469" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2014-0078", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2014-0078" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1064556", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1064556" } ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "LOW", - "accessVector": "NETWORK", - "authentication": "SINGLE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 4, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", - "version": "2.0" - } - ] } } \ No newline at end of file diff --git a/2014/0xxx/CVE-2014-0079.json b/2014/0xxx/CVE-2014-0079.json index 45cfeb535ed..47e8428bc59 100644 --- a/2014/0xxx/CVE-2014-0079.json +++ b/2014/0xxx/CVE-2014-0079.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0079", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,17 +27,41 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "MDVSA-2014:044", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:044" + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:044", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:044" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1059903", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1059903" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1059903", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1059903" } ] } diff --git a/2014/9xxx/CVE-2014-9420.json b/2014/9xxx/CVE-2014-9420.json index 76d24447e82..cbf567a00a6 100644 --- a/2014/9xxx/CVE-2014-9420.json +++ b/2014/9xxx/CVE-2014-9420.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "It was found that the Linux kernel's ISO file system implementation did not correctly limit the traversal of Rock Ridge extension Continuation Entries (CE). An attacker with physical access to the system could use this flaw to trigger an infinite loop in the kernel, resulting in a denial of service." + "value": "The rock_continue function in fs/isofs/rock.c in the Linux kernel through 3.18.1 does not restrict the number of Rock Ridge continuation entries, which allows local users to cause a denial of service (infinite loop, and system crash or hang) via a crafted iso9660 image." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Loop with Unreachable Exit Condition ('Infinite Loop')", - "cweId": "CWE-835" + "value": "n/a" } ] } @@ -32,42 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 6", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:2.6.32-504.23.4.el6", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 7", - "version": { - "version_data": [ - { - "version_value": "0:3.10.0-229.7.2.rt56.141.6.el7_1", - "version_affected": "!" - }, - { - "version_value": "0:3.10.0-229.7.2.ael7b", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise MRG 2", - "version": { - "version_data": [ - { - "version_value": "1:3.10.0-229.rt56.153.el6rt", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -195,36 +168,6 @@ "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2014/12/25/4" }, - { - "url": "https://access.redhat.com/errata/RHSA-2015:1081", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2015:1081" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2015:1137", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2015:1137" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2015:1138", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2015:1138" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2015:1139", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2015:1139" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2014-9420", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2014-9420" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1175235", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1175235" - }, { "url": "https://github.com/torvalds/linux/commit/f54e18f1b831c92f6512d2eedb224cd63d607d3d", "refsource": "MISC", @@ -234,31 +177,11 @@ "url": "https://source.android.com/security/bulletin/2017-01-01.html", "refsource": "MISC", "name": "https://source.android.com/security/bulletin/2017-01-01.html" - } - ] - }, - "impact": { - "cvss": [ + }, { - "accessComplexity": "MEDIUM", - "accessVector": "LOCAL", - "authentication": "NONE", - "availabilityImpact": "COMPLETE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 4.7, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", - "version": "2.0" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1175235", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1175235" } ] } diff --git a/2014/9xxx/CVE-2014-9710.json b/2014/9xxx/CVE-2014-9710.json index 4d72f4ab1af..1dd3414c084 100644 --- a/2014/9xxx/CVE-2014-9710.json +++ b/2014/9xxx/CVE-2014-9710.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-9710", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339" + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html" }, { - "name": "SUSE-SU-2015:1489", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1205079", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205079" + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html" }, { - "name": "1032418", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id/1032418" + "url": "http://www.openwall.com/lists/oss-security/2015/03/24/11", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2015/03/24/11" }, { - "name": "[oss-security] 20150324 CVE request Linux kernel: fs: btrfs: non-atomic xattr replace operation", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2015/03/24/11" + "url": "http://www.securitytracker.com/id/1032418", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id/1032418" }, { - "name": "SUSE-SU-2015:1224", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html" + "url": "https://github.com/torvalds/linux/commit/5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339" }, { - "name": "https://github.com/torvalds/linux/commit/5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339", - "refsource": "CONFIRM", - "url": "https://github.com/torvalds/linux/commit/5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205079", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1205079" } ] } diff --git a/2014/9xxx/CVE-2014-9730.json b/2014/9xxx/CVE-2014-9730.json index 6ed21bc0e39..aff1b48a034 100644 --- a/2014/9xxx/CVE-2014-9730.json +++ b/2014/9xxx/CVE-2014-9730.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-9730", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,62 +27,86 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[oss-security] 20150602 CVE request Linux kernel: fs: udf heap overflow in __udf_adinicb_readpage", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2015/06/02/7" + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2", + "refsource": "MISC", + "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2" }, { - "name": "https://github.com/torvalds/linux/commit/e237ec37ec154564f8690c5bd1795339955eeef9", - "refsource": "CONFIRM", - "url": "https://github.com/torvalds/linux/commit/e237ec37ec154564f8690c5bd1795339955eeef9" + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html" }, { - "name": "SUSE-SU-2015:1611", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" + "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e237ec37ec154564f8690c5bd1795339955eeef9", + "refsource": "MISC", + "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e237ec37ec154564f8690c5bd1795339955eeef9" }, { - "name": "SUSE-SU-2015:1324", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1228229", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228229" + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" }, { - "name": "74964", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/74964" + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" }, { - "name": "openSUSE-SU-2015:1382", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" }, { - "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e237ec37ec154564f8690c5bd1795339955eeef9", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e237ec37ec154564f8690c5bd1795339955eeef9" + "url": "http://www.openwall.com/lists/oss-security/2015/06/02/7", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2015/06/02/7" }, { - "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2", - "refsource": "CONFIRM", - "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2" + "url": "http://www.securityfocus.com/bid/74964", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/74964" }, { - "name": "SUSE-SU-2015:1224", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html" + "url": "https://github.com/torvalds/linux/commit/e237ec37ec154564f8690c5bd1795339955eeef9", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/e237ec37ec154564f8690c5bd1795339955eeef9" }, { - "name": "SUSE-SU-2015:1592", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228229", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1228229" } ] } diff --git a/2015/5xxx/CVE-2015-5225.json b/2015/5xxx/CVE-2015-5225.json index 5afa6a338ae..deb57ebb6f6 100644 --- a/2015/5xxx/CVE-2015-5225.json +++ b/2015/5xxx/CVE-2015-5225.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A heap-based buffer overflow issue was found in the QEMU emulator's VNC display driver. It could occur while refreshing the VNC server's display surface using the vnc_refresh_server_surface() routine. A privileged guest user could use this flaw to corrupt the heap memory and crash the QEMU process instance, or to potentially use it to execute arbitrary code on the host." + "value": "Buffer overflow in the vnc_refresh_server_surface function in the VNC display driver in QEMU before 2.4.0.1 allows guest users to cause a denial of service (heap memory corruption and process crash) or possibly execute arbitrary code on the host via unspecified vectors, related to refreshing the server display surface." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Heap-based Buffer Overflow", - "cweId": "CWE-122" + "value": "n/a" } ] } @@ -32,49 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "10:2.1.2-23.el7_1.9", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", - "version": { - "version_data": [ - { - "version_value": "10:2.1.2-23.el7_1.9", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7", - "version": { - "version_data": [ - { - "version_value": "10:2.1.2-23.el7_1.9", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "RHEV 3.X Hypervisor and Agents for RHEL-7", - "version": { - "version_data": [ - { - "version_value": "10:2.1.2-23.el7_1.9", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -137,26 +103,6 @@ "refsource": "MISC", "name": "http://www.securitytracker.com/id/1033547" }, - { - "url": "https://access.redhat.com/errata/RHSA-2015:1772", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2015:1772" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2015:1837", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2015:1837" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2015-5225", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2015-5225" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1255896", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1255896" - }, { "url": "https://lists.gnu.org/archive/html/qemu-devel/2015-08/msg02495.html", "refsource": "MISC", @@ -168,30 +114,5 @@ "name": "https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html" } ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "HIGH", - "accessVector": "ADJACENT_NETWORK", - "authentication": "SINGLE", - "availabilityImpact": "COMPLETE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 6.5, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "COMPLETE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "COMPLETE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", - "version": "2.0" - } - ] } } \ No newline at end of file diff --git a/2015/5xxx/CVE-2015-5229.json b/2015/5xxx/CVE-2015-5229.json index 9cd984b3021..c5c23b19a8d 100644 --- a/2015/5xxx/CVE-2015-5229.json +++ b/2015/5xxx/CVE-2015-5229.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-5229", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1246713", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1246713" + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "refsource": "MISC", + "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { - "name": "84172", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/84172" + "url": "http://rhn.redhat.com/errata/RHSA-2016-0176.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2016-0176.html" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1256285", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1256285" + "url": "http://www.securityfocus.com/bid/84172", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/84172" }, { - "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", - "refsource": "CONFIRM", - "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1246713", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1246713" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1293976", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1293976" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1293976", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1293976" }, { - "name": "RHSA-2016:0176", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2016-0176.html" + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10150", + "refsource": "MISC", + "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10150" }, { - "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10150", - "refsource": "CONFIRM", - "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10150" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1256285", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1256285" } ] } diff --git a/2015/5xxx/CVE-2015-5232.json b/2015/5xxx/CVE-2015-5232.json index 880e21f4bbf..418edfc4079 100644 --- a/2015/5xxx/CVE-2015-5232.json +++ b/2015/5xxx/CVE-2015-5232.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-5232", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,32 +27,56 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://github.com/01org/opa-fm/commit/5f4087aabb5d03c42738b320af0fc60e9df4d1f7", - "refsource": "CONFIRM", - "url": "https://github.com/01org/opa-fm/commit/5f4087aabb5d03c42738b320af0fc60e9df4d1f7" + "url": "http://www.openwall.com/lists/oss-security/2015/09/22/17", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2015/09/22/17" }, { - "name": "[oss-security] 20150922 CVE-2015-5232: various /tmp races in opa-fm, opa-ff", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2015/09/22/17" + "url": "https://github.com/01org/opa-ff/commit/080ab97461d80a01636f77ba6aecc667c3c0087c", + "refsource": "MISC", + "name": "https://github.com/01org/opa-ff/commit/080ab97461d80a01636f77ba6aecc667c3c0087c" }, { - "name": "https://github.com/01org/opa-ff/commit/080ab97461d80a01636f77ba6aecc667c3c0087c", - "refsource": "CONFIRM", - "url": "https://github.com/01org/opa-ff/commit/080ab97461d80a01636f77ba6aecc667c3c0087c" + "url": "https://github.com/01org/opa-fm/commit/5f4087aabb5d03c42738b320af0fc60e9df4d1f7", + "refsource": "MISC", + "name": "https://github.com/01org/opa-fm/commit/5f4087aabb5d03c42738b320af0fc60e9df4d1f7" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1257098", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1257098" + "url": "https://github.com/01org/opa-fm/commit/c5759e7b76f5bf844be6c6641cc1b356bbc83869", + "refsource": "MISC", + "name": "https://github.com/01org/opa-fm/commit/c5759e7b76f5bf844be6c6641cc1b356bbc83869" }, { - "name": "https://github.com/01org/opa-fm/commit/c5759e7b76f5bf844be6c6641cc1b356bbc83869", - "refsource": "CONFIRM", - "url": "https://github.com/01org/opa-fm/commit/c5759e7b76f5bf844be6c6641cc1b356bbc83869" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1257098", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1257098" } ] } diff --git a/2015/5xxx/CVE-2015-5233.json b/2015/5xxx/CVE-2015-5233.json index c802d7d48ae..5a9a7556278 100644 --- a/2015/5xxx/CVE-2015-5233.json +++ b/2015/5xxx/CVE-2015-5233.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A flaw was discovered where Satellite failed to properly enforce permissions on the show and delete actions for reports. An authenticated user with show or delete report permissions could use this flaw to view or delete any reports held in Foreman." + "value": "Foreman before 1.8.4 and 1.9.x before 1.9.1 do not properly apply view_hosts permissions, which allows (1) remote authenticated users with the view_reports permission to read reports from arbitrary hosts or (2) remote authenticated users with the destroy_reports permission to delete reports from arbitrary hosts via direct access to the (a) individual report show/delete pages or (b) APIs." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Access Control", - "cweId": "CWE-284" + "value": "n/a" } ] } @@ -32,88 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Satellite 6.1", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:1.7.2.49-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.0.5-3", - "version_affected": "!" - }, - { - "version_value": "0:1.7.2.7-1.el6", - "version_affected": "!" - }, - { - "version_value": "0:2.6.8-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.2.6-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.3.22-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.4-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.30-7.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.4-11.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.9-11.el6", - "version_affected": "!" - }, - { - "version_value": "0:4.0.2.14-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.0.23-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.4-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:2.2.0.77-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.6-1.el6_6sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.3.10-1.el6", - "version_affected": "!" - }, - { - "version_value": "0:0.9.6-1.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.0.3-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.5-3.el6", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -140,41 +67,6 @@ "url": "https://access.redhat.com/errata/RHSA-2015:2622", "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2015:2622" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2015-5233", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2015-5233" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262443", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1262443" - } - ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "LOW", - "accessVector": "NETWORK", - "authentication": "SINGLE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 5.5, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:P", - "version": "2.0" } ] } diff --git a/2015/5xxx/CVE-2015-5239.json b/2015/5xxx/CVE-2015-5239.json index f9bec49fca7..7f28b2fbc23 100644 --- a/2015/5xxx/CVE-2015-5239.json +++ b/2015/5xxx/CVE-2015-5239.json @@ -1,12 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-5239", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -39,6 +39,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "before 2.1.0" } ] @@ -53,54 +54,54 @@ "references": { "reference_data": [ { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html", "refsource": "MISC", - "name": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html", - "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html" }, { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html", "refsource": "MISC", - "name": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html" + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html" }, { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html", "refsource": "MISC", - "name": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html" + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html" }, { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html", "refsource": "MISC", - "name": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html" + "name": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" }, { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html", "refsource": "MISC", - "name": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html", - "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" + "name": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" }, { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html", "refsource": "MISC", - "name": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html", - "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html" + "name": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html" }, { + "url": "http://www.openwall.com/lists/oss-security/2015/09/02/7", "refsource": "MISC", - "name": "http://www.ubuntu.com/usn/USN-2745-1", - "url": "http://www.ubuntu.com/usn/USN-2745-1" + "name": "http://www.openwall.com/lists/oss-security/2015/09/02/7" }, { + "url": "http://www.ubuntu.com/usn/USN-2745-1", "refsource": "MISC", - "name": "http://www.openwall.com/lists/oss-security/2015/09/02/7", - "url": "http://www.openwall.com/lists/oss-security/2015/09/02/7" + "name": "http://www.ubuntu.com/usn/USN-2745-1" }, { - "refsource": "CONFIRM", - "name": "https://github.com/qemu/qemu/commit/f9a70e79391f6d7c2a912d785239ee8effc1922d", - "url": "https://github.com/qemu/qemu/commit/f9a70e79391f6d7c2a912d785239ee8effc1922d" + "url": "https://github.com/qemu/qemu/commit/f9a70e79391f6d7c2a912d785239ee8effc1922d", + "refsource": "MISC", + "name": "https://github.com/qemu/qemu/commit/f9a70e79391f6d7c2a912d785239ee8effc1922d" }, { + "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14", "refsource": "MISC", - "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14", - "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14" + "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14" } ] } diff --git a/2015/5xxx/CVE-2015-5240.json b/2015/5xxx/CVE-2015-5240.json index 1621a1f712c..072cbc70715 100644 --- a/2015/5xxx/CVE-2015-5240.json +++ b/2015/5xxx/CVE-2015-5240.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A race-condition flaw leading to ACL bypass was discovered in OpenStack Networking (neutron). An authenticated user could change the owner of a port after it was created but before firewall rules were applied, thus preventing firewall control checks from occurring. All OpenStack Networking deployments that used either the ML2 plug-in or a plug-in that relied on the security groups AMQP API were affected." + "value": "Race condition in OpenStack Neutron before 2014.2.4 and 2015.1 before 2015.1.2, when using the ML2 plugin or the security groups AMQP API, allows remote authenticated users to bypass IP anti-spoofing controls by changing the device owner of a port to start with network: before the security group rules are applied." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "cweId": "CWE-362" + "value": "n/a" } ] } @@ -32,49 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:2014.1.5-4.el6ost", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", - "version": { - "version_data": [ - { - "version_value": "0:2014.1.5-4.el7ost", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", - "version": { - "version_data": [ - { - "version_value": "0:2014.2.3-19.el7ost", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7", - "version": { - "version_data": [ - { - "version_value": "0:2015.1.1-7.el7ost", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -97,55 +63,20 @@ "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2015/09/08/9" }, - { - "url": "https://access.redhat.com/errata/RHSA-2015:1909", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2015:1909" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2015-5240", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2015-5240" - }, { "url": "https://bugs.launchpad.net/neutron/+bug/1489111", "refsource": "MISC", "name": "https://bugs.launchpad.net/neutron/+bug/1489111" }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1258458", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1258458" - }, { "url": "https://security.openstack.org/ossa/OSSA-2015-018.html", "refsource": "MISC", "name": "https://security.openstack.org/ossa/OSSA-2015-018.html" - } - ] - }, - "impact": { - "cvss": [ + }, { - "accessComplexity": "MEDIUM", - "accessVector": "NETWORK", - "authentication": "SINGLE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 4.9, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:P", - "version": "2.0" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1258458", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1258458" } ] } diff --git a/2015/5xxx/CVE-2015-5242.json b/2015/5xxx/CVE-2015-5242.json index d510a23854e..7c452c5ebfd 100644 --- a/2015/5xxx/CVE-2015-5242.json +++ b/2015/5xxx/CVE-2015-5242.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-5242", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1258743", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1258743" + "url": "http://rhn.redhat.com/errata/RHSA-2015-1918.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2015-1918.html" }, { - "name": "https://review.openstack.org/#/c/237994/", - "refsource": "CONFIRM", - "url": "https://review.openstack.org/#/c/237994/" + "url": "https://access.redhat.com/solutions/1985893", + "refsource": "MISC", + "name": "https://access.redhat.com/solutions/1985893" }, { - "name": "RHSA-2015:1918", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2015-1918.html" + "url": "https://review.openstack.org/#/c/237994/", + "refsource": "MISC", + "name": "https://review.openstack.org/#/c/237994/" }, { - "name": "https://access.redhat.com/solutions/1985893", - "refsource": "CONFIRM", - "url": "https://access.redhat.com/solutions/1985893" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1258743", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1258743" } ] } diff --git a/2015/5xxx/CVE-2015-5244.json b/2015/5xxx/CVE-2015-5244.json index 35a14b0c277..6837879793f 100644 --- a/2015/5xxx/CVE-2015-5244.json +++ b/2015/5xxx/CVE-2015-5244.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-5244", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://pagure.io/mod_nss/c/34e1ccecb4a7d5054dba2f92b403af9b6ae1e110", - "refsource": "CONFIRM", - "url": "https://pagure.io/mod_nss/c/34e1ccecb4a7d5054dba2f92b403af9b6ae1e110" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175248.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175248.html" }, { - "name": "FEDORA-2015-c76c1c84cf", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175248.html" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176026.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176026.html" }, { - "name": "FEDORA-2016-6aa4dd4f3a", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176026.html" + "url": "https://pagure.io/mod_nss/c/34e1ccecb4a7d5054dba2f92b403af9b6ae1e110", + "refsource": "MISC", + "name": "https://pagure.io/mod_nss/c/34e1ccecb4a7d5054dba2f92b403af9b6ae1e110" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1259216", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1259216" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1259216", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1259216" } ] } diff --git a/2015/5xxx/CVE-2015-5245.json b/2015/5xxx/CVE-2015-5245.json index 6c7737e39de..de0039840d8 100644 --- a/2015/5xxx/CVE-2015-5245.json +++ b/2015/5xxx/CVE-2015-5245.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A feature in Ceph Object Gateway (RGW) allows to return a specific HTTP header that contains the name of a bucket that was accessed. It was found that the returned HTTP headers were not sanitized. An unauthenticated attacker could use this flaw to craft HTTP headers in responses that would confuse the load balancer residing in front of RGW, potentially resulting in a denial of service." + "value": "CRLF injection vulnerability in the Ceph Object Gateway (aka radosgw or RGW) in Ceph before 0.94.4 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted bucket name." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Input Validation", - "cweId": "CWE-20" + "value": "n/a" } ] } @@ -32,320 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Ceph Storage 1.3 for Red Hat Enterprise Linux 7", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:1.2.4-3.el7cp", - "version_affected": "!" - }, - { - "version_value": "0:1.3-11.el7cp", - "version_affected": "!" - }, - { - "version_value": "1:0.94.3-3.el7cp", - "version_affected": "!" - }, - { - "version_value": "0:1.5.27.3-1.el7cp", - "version_affected": "!" - }, - { - "version_value": "0:0.1.1-1.el7cp", - "version_affected": "!" - }, - { - "version_value": "1:1.7.6-2.1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.7.2.33-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "1:1.7.5-2.el7cp", - "version_affected": "!" - }, - { - "version_value": "0:1.7.2.5-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.7.2.13-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.1-2.el7", - "version_affected": "!" - }, - { - "version_value": "0:20130517-7.1fm.gitc4bce43.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.4.1-1.el7cp", - "version_affected": "!" - }, - { - "version_value": "0:3.6.2-4.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.2.3-1.el7cp", - "version_affected": "!" - }, - { - "version_value": "0:0.1.0-1.el7cp", - "version_affected": "!" - }, - { - "version_value": "0:1.6.18-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.0-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.5-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.0.0-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.0.0-8.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.0-6.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.0-4.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.8.0-13.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.2-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:4.0.2.13-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:4.0.10.1-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.10.0-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.8-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.7-5.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.2-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.8.2-4.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.1-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.4.7-8.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:4.0.18-19.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.12.2-10.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.7-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.9.0-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.6.7-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.1-9.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.1.1-15.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.2.1-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.7.1-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.3-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:4.1.3-7.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.10.1-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.1.3-6.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.2.0-1.3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:3.0.2-10.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.2-6.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.5.0-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.4.3-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.11-1.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.2-12.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.3.0-7.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.2-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.0-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1.2-4.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:2.0.5-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.6.21-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.5.9-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.0.4.4-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.1.3-17.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.8.1-26.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.19-7.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.11-8.el7sat", - "version_affected": "!" - }, - { - "version_value": "1:1.4.1-13.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.5.0-7.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.9.2.2-41.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.1.2-3.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.10.0-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "1:1.3.6-27.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.0.2.1-1.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.3.3-18.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:0.6.5-2.el7sat", - "version_affected": "!" - }, - { - "version_value": "0:1.4.1-21.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.7.9-2.el7rhgs", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -368,50 +63,10 @@ "refsource": "MISC", "name": "http://tracker.ceph.com/issues/12537" }, - { - "url": "https://access.redhat.com/errata/RHSA-2015:2066", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2015:2066" - }, { "url": "https://access.redhat.com/errata/RHSA-2015:2512", "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2015:2512" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2015-5245", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2015-5245" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1261606", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1261606" - } - ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "LOW", - "accessVector": "NETWORK", - "authentication": "SINGLE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 5.5, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", - "version": "2.0" } ] } diff --git a/2015/5xxx/CVE-2015-5250.json b/2015/5xxx/CVE-2015-5250.json index 0d98373f865..798f40fc222 100644 --- a/2015/5xxx/CVE-2015-5250.json +++ b/2015/5xxx/CVE-2015-5250.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "It was found that improper error handling in the API server could cause the master process to crash. A user with network access to the master could use this flaw to crash the master process." + "value": "The API server in OpenShift Origin 1.0.5 allows remote attackers to cause a denial of service (master process crash) via crafted JSON data." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Input Validation", - "cweId": "CWE-20" + "value": "n/a" } ] } @@ -32,16 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat OpenShift Enterprise 3.0", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:3.0.1.0-1.git.529.dcab62c.el7ose", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -60,44 +59,14 @@ "name": "https://access.redhat.com/errata/RHSA-2015:1736" }, { - "url": "https://access.redhat.com/security/cve/CVE-2015-5250", + "url": "https://github.com/openshift/origin/issues/4374", "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2015-5250" + "name": "https://github.com/openshift/origin/issues/4374" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1259867", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1259867" - }, - { - "url": "https://github.com/openshift/origin/issues/4374", - "refsource": "MISC", - "name": "https://github.com/openshift/origin/issues/4374" - } - ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "LOW", - "accessVector": "NETWORK", - "authentication": "SINGLE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 4, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", - "version": "2.0" } ] } diff --git a/2015/5xxx/CVE-2015-5260.json b/2015/5xxx/CVE-2015-5260.json index 48864edc3f2..874f864b5be 100644 --- a/2015/5xxx/CVE-2015-5260.json +++ b/2015/5xxx/CVE-2015-5260.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A heap-based buffer overflow flaw was found in the way spice handled certain QXL commands related to the \"surface_id\" parameter. A user in a guest could use this flaw to crash the host QEMU-KVM process or, possibly, execute arbitrary code with the privileges of the host QEMU-KVM process." + "value": "Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via QXL commands related to the surface_id parameter." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Input Validation", - "cweId": "CWE-20" + "value": "n/a" } ] } @@ -32,27 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 6", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:0.12.4-12.el6_7.3", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 7", - "version": { - "version_data": [ - { - "version_value": "0:0.12.4-9.el7_1.3", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -106,54 +94,14 @@ "name": "http://www.ubuntu.com/usn/USN-2766-1" }, { - "url": "https://access.redhat.com/errata/RHSA-2015:1889", + "url": "https://security.gentoo.org/glsa/201606-05", "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2015:1889" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2015:1890", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2015:1890" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2015-5260", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2015-5260" + "name": "https://security.gentoo.org/glsa/201606-05" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1260822", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1260822" - }, - { - "url": "https://security.gentoo.org/glsa/201606-05", - "refsource": "MISC", - "name": "https://security.gentoo.org/glsa/201606-05" - } - ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "MEDIUM", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 5.8, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", - "version": "2.0" } ] } diff --git a/2015/5xxx/CVE-2015-5262.json b/2015/5xxx/CVE-2015-5262.json index 8b4b4d7f7e8..3bca76a78ae 100644 --- a/2015/5xxx/CVE-2015-5262.json +++ b/2015/5xxx/CVE-2015-5262.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-5262", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,82 +27,106 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", - "refsource": "CONFIRM", - "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" + "url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E" }, { - "name": "http://svn.apache.org/viewvc?view=revision&revision=1626784", - "refsource": "CONFIRM", - "url": "http://svn.apache.org/viewvc?view=revision&revision=1626784" + "url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E" }, { - "name": "https://jenkins.io/security/advisory/2018-02-26/", - "refsource": "CONFIRM", - "url": "https://jenkins.io/security/advisory/2018-02-26/" + "url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1261538", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1261538" + "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", + "refsource": "MISC", + "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { - "name": "FEDORA-2015-15590", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167962.html" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167962.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167962.html" }, { - "name": "FEDORA-2015-15589", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167999.html" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167999.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167999.html" }, { - "name": "https://issues.apache.org/jira/browse/HTTPCLIENT-1478", - "refsource": "CONFIRM", - "url": "https://issues.apache.org/jira/browse/HTTPCLIENT-1478" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168030.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168030.html" }, { - "name": "FEDORA-2015-15588", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168030.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00032.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00032.html" }, { - "name": "1033743", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id/1033743" + "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00033.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00033.html" }, { - "name": "USN-2769-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-2769-1" + "url": "http://svn.apache.org/viewvc?view=revision&revision=1626784", + "refsource": "MISC", + "name": "http://svn.apache.org/viewvc?view=revision&revision=1626784" }, { - "refsource": "MLIST", - "name": "[drill-dev] 20191017 Dependencies used by Drill contain known vulnerabilities", - "url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E" + "url": "http://www.securitytracker.com/id/1033743", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id/1033743" }, { - "refsource": "MLIST", - "name": "[drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities", - "url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E" + "url": "http://www.ubuntu.com/usn/USN-2769-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-2769-1" }, { - "refsource": "MLIST", - "name": "[drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities", - "url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E" + "url": "https://issues.apache.org/jira/browse/HTTPCLIENT-1478", + "refsource": "MISC", + "name": "https://issues.apache.org/jira/browse/HTTPCLIENT-1478" }, { - "refsource": "SUSE", - "name": "openSUSE-SU-2020:1873", - "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00032.html" + "url": "https://jenkins.io/security/advisory/2018-02-26/", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2018-02-26/" }, { - "refsource": "SUSE", - "name": "openSUSE-SU-2020:1875", - "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00033.html" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1261538", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1261538" } ] } diff --git a/2015/5xxx/CVE-2015-5273.json b/2015/5xxx/CVE-2015-5273.json index a475bfb8c71..d22c0d990b5 100644 --- a/2015/5xxx/CVE-2015-5273.json +++ b/2015/5xxx/CVE-2015-5273.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "It was found that the ABRT debug information installer (abrt-action-install-debuginfo-to-abrt-cache) did not use temporary directories in a secure way. A local attacker could use the flaw to create symbolic links and files at arbitrary locations as the abrt user." + "value": "The abrt-action-install-debuginfo-to-abrt-cache help program in Automatic Bug Reporting Tool (ABRT) before 2.7.1 allows local users to write to arbitrary files via a symlink attack on unpacked.cpio in a pre-created directory with a predictable name in /var/tmp." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Insecure Temporary File", - "cweId": "CWE-377" + "value": "n/a" } ] } @@ -32,20 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 7", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:2.1.11-35.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.1.11-31.el7", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -84,49 +79,14 @@ "name": "http://www.securityfocus.com/bid/78113" }, { - "url": "https://access.redhat.com/errata/RHSA-2015:2505", + "url": "https://github.com/abrt/abrt/commit/50ee8130fb4cd4ef1af7682a2c85dd99cb99424e", "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2015:2505" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2015-5273", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2015-5273" + "name": "https://github.com/abrt/abrt/commit/50ee8130fb4cd4ef1af7682a2c85dd99cb99424e" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262252", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1262252" - }, - { - "url": "https://github.com/abrt/abrt/commit/50ee8130fb4cd4ef1af7682a2c85dd99cb99424e", - "refsource": "MISC", - "name": "https://github.com/abrt/abrt/commit/50ee8130fb4cd4ef1af7682a2c85dd99cb99424e" - } - ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "MEDIUM", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "NONE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 4.3, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", - "version": "2.0" } ] } diff --git a/2015/5xxx/CVE-2015-5274.json b/2015/5xxx/CVE-2015-5274.json index 01cb914f092..082c7945159 100644 --- a/2015/5xxx/CVE-2015-5274.json +++ b/2015/5xxx/CVE-2015-5274.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A command injection flaw was found in the OpenShift Origin Management Console. A remote, authenticated user permitted to send requests to the Broker could use this flaw to execute arbitrary commands with elevated privileges on the Red Hat OpenShift server." + "value": "rubygem-openshift-origin-console in Red Hat OpenShift 2.2 allows remote authenticated users to execute arbitrary commands via a crafted request to the Broker." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Input Validation", - "cweId": "CWE-20" + "value": "n/a" } ] } @@ -32,16 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat OpenShift Enterprise 2.2", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:1.34.1.3-1.el6op", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -58,46 +57,6 @@ "url": "http://rhn.redhat.com/errata/RHSA-2015-1808.html", "refsource": "MISC", "name": "http://rhn.redhat.com/errata/RHSA-2015-1808.html" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2015:1808", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2015:1808" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2015-5274", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2015-5274" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262518", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1262518" - } - ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "LOW", - "accessVector": "NETWORK", - "authentication": "SINGLE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 6.5, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", - "version": "2.0" } ] } diff --git a/2015/5xxx/CVE-2015-5279.json b/2015/5xxx/CVE-2015-5279.json index 7a45e115b34..548fdde5f28 100644 --- a/2015/5xxx/CVE-2015-5279.json +++ b/2015/5xxx/CVE-2015-5279.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A heap buffer overflow flaw was found in the way QEMU's NE2000 NIC emulation implementation handled certain packets received over the network. A privileged user inside a guest could use this flaw to crash the QEMU instance (denial of service) or potentially execute arbitrary code on the host." + "value": "Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Heap-based Buffer Overflow", - "cweId": "CWE-122" + "value": "n/a" } ] } @@ -32,53 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 5", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:83-274.el5_11", - "version_affected": "!" - }, - { - "version_value": "0:3.0.3-147.el5_11", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 6", - "version": { - "version_data": [ - { - "version_value": "2:0.12.1.2-2.479.el6_7.2", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", - "version": { - "version_data": [ - { - "version_value": "2:0.12.1.2-2.479.el6_7.2", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "RHEV 3.X Hypervisor and Agents for RHEL-6", - "version": { - "version_data": [ - { - "version_value": "2:0.12.1.2-2.479.el6_7.2", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -176,71 +138,11 @@ "refsource": "MISC", "name": "http://www.securitytracker.com/id/1033569" }, - { - "url": "https://access.redhat.com/errata/RHSA-2015:1896", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2015:1896" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2015:1923", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2015:1923" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2015:1924", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2015:1924" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2015:1925", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2015:1925" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2015:2065", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2015:2065" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2015-5279", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2015-5279" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1256672", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1256672" - }, { "url": "https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg03984.html", "refsource": "MISC", "name": "https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg03984.html" } ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "HIGH", - "accessVector": "ADJACENT_NETWORK", - "authentication": "SINGLE", - "availabilityImpact": "COMPLETE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 6.5, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "COMPLETE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "COMPLETE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", - "version": "2.0" - } - ] } } \ No newline at end of file diff --git a/2015/5xxx/CVE-2015-5283.json b/2015/5xxx/CVE-2015-5283.json index 07cbbd269d0..0feb3969f27 100644 --- a/2015/5xxx/CVE-2015-5283.json +++ b/2015/5xxx/CVE-2015-5283.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A NULL pointer dereference flaw was found in the SCTP implementation. A local user could use this flaw to cause a denial of service on the system by triggering a kernel panic when creating multiple sockets in parallel while the system did not have the SCTP module loaded." + "value": "The sctp_init function in net/sctp/protocol.c in the Linux kernel before 4.2.3 has an incorrect sequence of protocol-initialization steps, which allows local users to cause a denial of service (panic or memory corruption) by creating SCTP sockets before all of the steps have finished." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Initialization", - "cweId": "CWE-665" + "value": "n/a" } ] } @@ -32,20 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 7", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:3.10.0-327.rt56.204.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.10.0-327.el7", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -98,16 +93,6 @@ "refsource": "MISC", "name": "http://www.ubuntu.com/usn/USN-2829-2" }, - { - "url": "https://access.redhat.com/errata/RHSA-2015:2152", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2015:2152" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2015:2411", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2015:2411" - }, { "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8e2d61e0aed2b7c4ecb35844fe07e0b2b762dee4", "refsource": "MISC", @@ -133,16 +118,6 @@ "refsource": "MISC", "name": "http://www.securitytracker.com/id/1033808" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2015-5283", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2015-5283" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1257528", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1257528" - }, { "url": "https://github.com/torvalds/linux/commit/8e2d61e0aed2b7c4ecb35844fe07e0b2b762dee4", "refsource": "MISC", @@ -152,37 +127,11 @@ "url": "https://security-tracker.debian.org/tracker/CVE-2015-5283", "refsource": "MISC", "name": "https://security-tracker.debian.org/tracker/CVE-2015-5283" - } - ] - }, - "credits": [ - { - "lang": "en", - "value": "This issue was discovered by Ji Jianwen (Red Hat engineering)." - } - ], - "impact": { - "cvss": [ + }, { - "accessComplexity": "MEDIUM", - "accessVector": "LOCAL", - "authentication": "NONE", - "availabilityImpact": "COMPLETE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 4.7, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", - "version": "2.0" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1257528", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1257528" } ] } diff --git a/2015/5xxx/CVE-2015-5292.json b/2015/5xxx/CVE-2015-5292.json index 240adee20ab..0b2df15b2e6 100644 --- a/2015/5xxx/CVE-2015-5292.json +++ b/2015/5xxx/CVE-2015-5292.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "It was found that SSSD's Privilege Attribute Certificate (PAC) responder plug-in would leak a small amount of memory on each authentication request. A remote attacker could potentially use this flaw to exhaust all available memory on the system by making repeated requests to a Kerberized daemon application configured to authenticate using the PAC responder plug-in." + "value": "Memory leak in the Privilege Attribute Certificate (PAC) responder plugin (sssd_pac_plugin.so) in System Security Services Daemon (SSSD) 1.10 before 1.13.1 allows remote authenticated users to cause a denial of service (memory consumption) via a large number of logins that trigger parsing of PAC blobs during Kerberos authentication." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Missing Release of Memory after Effective Lifetime", - "cweId": "CWE-401" + "value": "n/a" } ] } @@ -32,27 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 6", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:1.12.4-47.el6_7.4", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 7", - "version": { - "version_data": [ - { - "version_value": "0:1.13.0-40.el7", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -110,26 +98,6 @@ "refsource": "MISC", "name": "http://www.securitytracker.com/id/1034038" }, - { - "url": "https://access.redhat.com/errata/RHSA-2015:2019", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2015:2019" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2015:2355", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2015:2355" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2015-5292", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2015-5292" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1267580", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1267580" - }, { "url": "https://fedorahosted.org/sssd/attachment/ticket/2803/0001-Fix-memory-leak-in-sssdpac_verify.patch", "refsource": "MISC", @@ -144,31 +112,11 @@ "url": "https://fedorahosted.org/sssd/wiki/Releases/Notes-1.13.1", "refsource": "MISC", "name": "https://fedorahosted.org/sssd/wiki/Releases/Notes-1.13.1" - } - ] - }, - "impact": { - "cvss": [ + }, { - "accessComplexity": "HIGH", - "accessVector": "NETWORK", - "authentication": "SINGLE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 2.1, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:H/Au:S/C:N/I:N/A:P", - "version": "2.0" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1267580", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1267580" } ] } diff --git a/2015/5xxx/CVE-2015-5293.json b/2015/5xxx/CVE-2015-5293.json index 15a6389d046..6af801c6b58 100644 --- a/2015/5xxx/CVE-2015-5293.json +++ b/2015/5xxx/CVE-2015-5293.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-5293", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,17 +27,41 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://access.redhat.com/security/cve/CVE-2015-5293", - "refsource": "CONFIRM", - "url": "https://access.redhat.com/security/cve/CVE-2015-5293" + "url": "https://access.redhat.com/security/cve/CVE-2015-5293", + "refsource": "MISC", + "name": "https://access.redhat.com/security/cve/CVE-2015-5293" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1267714", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1267714" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1267714", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1267714" } ] } diff --git a/2015/5xxx/CVE-2015-5295.json b/2015/5xxx/CVE-2015-5295.json index c00ac06477d..16473b902a4 100644 --- a/2015/5xxx/CVE-2015-5295.json +++ b/2015/5xxx/CVE-2015-5295.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability was discovered in the OpenStack Orchestration service (heat), where a specially formatted template could be used to trick the heat-engine service into opening a local file. Although the file contents are never disclosed to the end user, an OpenStack-authenticated attacker could use this flaw to cause a denial of service or determine whether a given file name is present on the server." + "value": "The template-validate command in OpenStack Orchestration API (Heat) before 2015.1.3 (kilo) and 5.0.x before 5.0.1 (liberty) allows remote authenticated users to cause a denial of service (memory consumption) or determine the existence of local files via the resource type in a template, as demonstrated by file:///dev/zero." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Uncontrolled Resource Consumption", - "cweId": "CWE-400" + "value": "n/a" } ] } @@ -32,49 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:2014.1.5-7.el6ost", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", - "version": { - "version_data": [ - { - "version_value": "0:2014.1.5-7.el7ost", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", - "version": { - "version_data": [ - { - "version_value": "0:2014.2.3-11.el7ost", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7", - "version": { - "version_data": [ - { - "version_value": "0:2015.1.2-9.el7ost", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -107,71 +73,16 @@ "refsource": "MISC", "name": "http://www.securityfocus.com/bid/81438" }, - { - "url": "https://access.redhat.com/errata/RHSA-2016:0266", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2016:0266" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2016:0440", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2016:0440" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2016:0441", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2016:0441" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2016:0442", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2016:0442" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2015-5295", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2015-5295" - }, { "url": "https://bugs.launchpad.net/heat/+bug/1496277", "refsource": "MISC", "name": "https://bugs.launchpad.net/heat/+bug/1496277" }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298295", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1298295" - }, { "url": "https://security.openstack.org/ossa/OSSA-2016-003.html", "refsource": "MISC", "name": "https://security.openstack.org/ossa/OSSA-2016-003.html" } ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "LOW", - "accessVector": "NETWORK", - "authentication": "SINGLE", - "availabilityImpact": "COMPLETE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 6.8, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", - "version": "2.0" - } - ] } } \ No newline at end of file diff --git a/2015/5xxx/CVE-2015-5302.json b/2015/5xxx/CVE-2015-5302.json index bf8baa0f0d0..c5943848590 100644 --- a/2015/5xxx/CVE-2015-5302.json +++ b/2015/5xxx/CVE-2015-5302.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "It was found that ABRT may have exposed non-public information to Red Hat Bugzilla during crash reporting. A bug in the libreport library caused changes made by a user in files included in a crash report to be discarded. As a result, Red Hat Bugzilla attachments may contain data that was not intended to be made public, including host names, IP addresses, or command line options." + "value": "libreport 2.0.7 before 2.6.3 only saves changes to the first file when editing a crash report, which allows remote attackers to obtain sensitive information via unspecified vectors related to the (1) backtrace, (2) cmdline, (3) environ, (4) open_fds, (5) maps, (6) smaps, (7) hostname, (8) remote, (9) ks.cfg, or (10) anaconda-tb file attachment included in a Red Hat Bugzilla bug report." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Insertion of Sensitive Information Into Sent Data", - "cweId": "CWE-201" + "value": "n/a" } ] } @@ -32,31 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 6", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:2.0.9-25.el6_7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 7", - "version": { - "version_data": [ - { - "version_value": "0:2.1.11-35.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.1.11-31.el7", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -79,11 +63,6 @@ "refsource": "MISC", "name": "http://rhn.redhat.com/errata/RHSA-2015-2505.html" }, - { - "url": "https://access.redhat.com/errata/RHSA-2015:2505", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2015:2505" - }, { "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172695.html", "refsource": "MISC", @@ -100,55 +79,14 @@ "name": "http://www.securityfocus.com/bid/77685" }, { - "url": "https://access.redhat.com/errata/RHSA-2015:2504", + "url": "https://github.com/abrt/libreport/commit/257578a23d1537a2d235aaa2b1488ee4f818e360", "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2015:2504" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2015-5302", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2015-5302" + "name": "https://github.com/abrt/libreport/commit/257578a23d1537a2d235aaa2b1488ee4f818e360" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1270903", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1270903" - }, - { - "url": "https://github.com/abrt/libreport/commit/257578a23d1537a2d235aaa2b1488ee4f818e360", - "refsource": "MISC", - "name": "https://github.com/abrt/libreport/commit/257578a23d1537a2d235aaa2b1488ee4f818e360" - } - ] - }, - "credits": [ - { - "lang": "en", - "value": "This issue was discovered by Bastien Nocera (Red Hat)." - } - ], - "impact": { - "cvss": [ - { - "accessComplexity": "HIGH", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "NONE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 2.6, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", - "version": "2.0" } ] } diff --git a/2015/5xxx/CVE-2015-5303.json b/2015/5xxx/CVE-2015-5303.json index 64700a31ac7..61ff2b68033 100644 --- a/2015/5xxx/CVE-2015-5303.json +++ b/2015/5xxx/CVE-2015-5303.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-5303", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,17 +27,41 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "RHSA-2015:2650", - "refsource": "REDHAT", - "url": "https://access.redhat.com/errata/RHSA-2015:2650" + "url": "https://access.redhat.com/errata/RHSA-2015:2650", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2015:2650" }, { - "name": "https://bugs.launchpad.net/tripleo/+bug/1516027", - "refsource": "CONFIRM", - "url": "https://bugs.launchpad.net/tripleo/+bug/1516027" + "url": "https://bugs.launchpad.net/tripleo/+bug/1516027", + "refsource": "MISC", + "name": "https://bugs.launchpad.net/tripleo/+bug/1516027" } ] } diff --git a/2015/5xxx/CVE-2015-5304.json b/2015/5xxx/CVE-2015-5304.json index 5955fde9273..e12f31dffb0 100644 --- a/2015/5xxx/CVE-2015-5304.json +++ b/2015/5xxx/CVE-2015-5304.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-5304", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "RHSA-2015:2541", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2015-2541.html" + "url": "http://rhn.redhat.com/errata/RHSA-2015-2538.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2015-2538.html" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1273046", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273046" + "url": "http://rhn.redhat.com/errata/RHSA-2015-2539.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2015-2539.html" }, { - "name": "1034280", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id/1034280" + "url": "http://rhn.redhat.com/errata/RHSA-2015-2540.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2015-2540.html" }, { - "name": "RHSA-2015:2540", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2015-2540.html" + "url": "http://rhn.redhat.com/errata/RHSA-2015-2541.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2015-2541.html" }, { - "name": "RHSA-2015:2542", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2015-2542.html" + "url": "http://rhn.redhat.com/errata/RHSA-2015-2542.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2015-2542.html" }, { - "name": "RHSA-2015:2538", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2015-2538.html" + "url": "http://www.securitytracker.com/id/1034280", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id/1034280" }, { - "name": "RHSA-2015:2539", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2015-2539.html" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273046", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1273046" } ] } diff --git a/2015/5xxx/CVE-2015-5305.json b/2015/5xxx/CVE-2015-5305.json index c314416af70..e72b803a23b 100644 --- a/2015/5xxx/CVE-2015-5305.json +++ b/2015/5xxx/CVE-2015-5305.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Kubernetes fails to validate object name types before passing the data to etcd. As the etcd service generates keys based on the object name type this can lead to a directory path traversal." + "value": "Directory traversal vulnerability in Kubernetes, as used in Red Hat OpenShift Enterprise 3.0, allows attackers to write to arbitrary files via a crafted object type name, which is not properly handled before passing it to etcd." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", - "cweId": "CWE-22" + "value": "n/a" } ] } @@ -32,16 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat OpenShift Enterprise 3.0", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:3.0.2.0-0.git.20.656dc3e.el7ose", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -59,41 +58,11 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2015:1945" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2015-5305", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2015-5305" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273969", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1273969" } ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "LOW", - "accessVector": "NETWORK", - "authentication": "SINGLE", - "availabilityImpact": "NONE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 4, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", - "version": "2.0" - } - ] } } \ No newline at end of file diff --git a/2015/5xxx/CVE-2015-5329.json b/2015/5xxx/CVE-2015-5329.json index e51df79bc68..9c3b94c3410 100644 --- a/2015/5xxx/CVE-2015-5329.json +++ b/2015/5xxx/CVE-2015-5329.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A flaw was found in the director (openstack-tripleo-heat-templates) where the RabbitMQ credentials defaulted to guest/guest and supplied values in the configuration were not used. As a result, all deployed overclouds used the same credentials (guest/guest). A remote non-authenticated attacker could use this flaw to access RabbitMQ services in the deployed cloud." + "value": "The TripleO Heat templates (tripleo-heat-templates), as used in Red Hat Enterprise Linux OpenStack Platform 7.0, do not properly use the configured RabbitMQ credentials, which makes it easier for remote attackers to obtain access to services in deployed overclouds by leveraging knowledge of the default credentials." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Use of Hard-coded Credentials", - "cweId": "CWE-798" + "value": "n/a" } ] } @@ -32,20 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux OpenStack Platform director 7.0 for RHEL 7", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:0.8.6-94.el7ost", - "version_affected": "!" - }, - { - "version_value": "0:0.0.10-22.el7ost", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -62,41 +57,6 @@ "url": "https://access.redhat.com/errata/RHSA-2015:2650", "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2015:2650" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2015-5329", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2015-5329" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1281777", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1281777" - } - ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "LOW", - "accessVector": "ADJACENT_NETWORK", - "authentication": "NONE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 5.8, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", - "version": "2.0" } ] } diff --git a/2015/5xxx/CVE-2015-5745.json b/2015/5xxx/CVE-2015-5745.json index aba1122a6b8..e627f016b31 100644 --- a/2015/5xxx/CVE-2015-5745.json +++ b/2015/5xxx/CVE-2015-5745.json @@ -1,12 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-5745", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -39,6 +39,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "before 2.4.0" } ] @@ -53,44 +54,44 @@ "references": { "reference_data": [ { + "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13", "refsource": "MISC", - "name": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html" + "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13" }, { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html", "refsource": "MISC", - "name": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html" + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html" }, { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html", "refsource": "MISC", - "name": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html" + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html" }, { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html", "refsource": "MISC", - "name": "https://lists.gnu.org/archive/html/qemu-devel/2015-07/msg05458.html", - "url": "https://lists.gnu.org/archive/html/qemu-devel/2015-07/msg05458.html" + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html" }, { + "url": "http://www.openwall.com/lists/oss-security/2015/08/06/3", "refsource": "MISC", - "name": "http://www.openwall.com/lists/oss-security/2015/08/06/3", - "url": "http://www.openwall.com/lists/oss-security/2015/08/06/3" + "name": "http://www.openwall.com/lists/oss-security/2015/08/06/3" }, { + "url": "http://www.openwall.com/lists/oss-security/2015/08/06/5", "refsource": "MISC", - "name": "http://www.openwall.com/lists/oss-security/2015/08/06/5", - "url": "http://www.openwall.com/lists/oss-security/2015/08/06/5" + "name": "http://www.openwall.com/lists/oss-security/2015/08/06/5" }, { + "url": "https://github.com/qemu/qemu/commit/7882080388be5088e72c425b02223c02e6cb4295", "refsource": "MISC", - "name": "https://github.com/qemu/qemu/commit/7882080388be5088e72c425b02223c02e6cb4295", - "url": "https://github.com/qemu/qemu/commit/7882080388be5088e72c425b02223c02e6cb4295" + "name": "https://github.com/qemu/qemu/commit/7882080388be5088e72c425b02223c02e6cb4295" }, { + "url": "https://lists.gnu.org/archive/html/qemu-devel/2015-07/msg05458.html", "refsource": "MISC", - "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13", - "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13" + "name": "https://lists.gnu.org/archive/html/qemu-devel/2015-07/msg05458.html" } ] }