René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

601 lines
22 KiB
JSON

{
"id": "CVE-2002-1337",
"sourceIdentifier": "cve@mitre.org",
"published": "2003-03-07T05:00:00.000",
"lastModified": "2018-10-30T16:26:22.763",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer en Sendmail 5.79 a la 8.12.7 que permite a atacantes remotos la ejecuci\u00f3n arbitraria de c\u00f3digo mediante ciertos campos de direcci\u00f3n formateados, relativos a comentarios de cabecera de emisor y receptor, procesados por la funci\u00f3n crackaddr del fichero headers.c."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:advanced_message_server:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FABD33DF-FEC4-4519-B2ED-4E498A7329FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:advanced_message_server:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2455BE6E-7540-4545-B40A-0366BDA6AE7E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:2.6:*:nt:*:*:*:*:*",
"matchCriteriaId": "3300A5FC-69D9-4F19-AB0E-0273F5ECF45C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:2.6.1:*:nt:*:*:*:*:*",
"matchCriteriaId": "EC340D43-0E4D-4365-A604-9DDF3BD62039"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:3.0:*:nt:*:*:*:*:*",
"matchCriteriaId": "E43CBCA0-47B1-4992-A636-A0BF4441B91A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:3.0.1:*:nt:*:*:*:*:*",
"matchCriteriaId": "2FA4711B-319B-4410-A1B5-C6D8C4B1EC68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:3.0.2:*:nt:*:*:*:*:*",
"matchCriteriaId": "F4981D22-AA6B-4901-95BA-F1BB893828B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:5.59:*:*:*:*:*:*:*",
"matchCriteriaId": "5DFC5B8B-9102-46A9-9BD3-5CC0B671383F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:5.61:*:*:*:*:*:*:*",
"matchCriteriaId": "51BC02ED-17B1-44B3-97DB-F626A2BD2524"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:5.65:*:*:*:*:*:*:*",
"matchCriteriaId": "EF58EBCB-5735-4569-957D-C37CC38F0823"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D30A1136-074A-460D-9794-DDD530626800"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "76A9602B-8E5A-4BF4-81F5-D1152D09FCAD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EFD0B100-D822-4EBF-8EC9-ADAB8141116B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "196D77DF-E6D4-46D0-BC2C-8804A587CA25"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B743E5A3-6B15-4877-9424-A1F1A4214B73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.10:*:*:*:*:*:*:*",
"matchCriteriaId": "76A60742-7815-4658-A6F7-147AA48C24B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9A1A24F2-9C6B-4DF0-AB04-55D051812DD1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "120271B8-08A9-4C21-A108-0DA61095A006"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "84E6ECDA-DF65-47FF-A42F-FD5C1D864FA3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7AA859AF-4E4E-4077-8E98-523E617A1DDC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A9791650-C367-43B6-A0F4-5BB56CE10778"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8340DDA8-77DD-4AEB-B267-F86F64A851B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "07DCBBEE-1DF0-40FE-B755-1FC35CF16788"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*",
"matchCriteriaId": "581626E7-47B5-4819-B34F-B6DFD07A12F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8BBE9A4A-8AB9-4A97-A106-970FEB08952C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:*",
"matchCriteriaId": "BD99394C-5408-4A01-8D4E-417FFFFDE9C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:*",
"matchCriteriaId": "AAB59A24-87DE-4CAD-A2BA-AFCC0B2A55B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:*",
"matchCriteriaId": "97D641EF-0B69-45A1-B85E-3C9C93AB9D42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:*",
"matchCriteriaId": "8972211B-6A5B-4095-9CBB-CEF4C23C9C65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*",
"matchCriteriaId": "8F81A2AD-90A0-4B97-86A3-92690A0FCA71"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "598F74BA-2B71-435E-92B8-9DEADB3311A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "79A46DF2-8EEB-40C8-B1CA-01BC064BD25E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "581E5904-1A2B-49FF-BE3F-D42019AD816B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B6CC4C83-4FB9-4344-AFCB-C260659F81DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CAF763B4-58E3-4868-8C92-47DE3E4E5F40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8A4FCB77-7FAC-4A4B-851C-2F352B44D3CB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*",
"matchCriteriaId": "6FEB3923-8F4B-4523-84F9-17D1CFA37F8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:*",
"matchCriteriaId": "58CD19B4-4BFD-4DE8-B21F-6B6CDE6793C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5492A89B-8140-4CF7-BE81-09C25A64373A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B2A6D5AF-2134-4EC5-B53A-CE95B5505325"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1B5FE819-E570-4AEE-BF0C-B9B1960A1AB8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "913AF73A-F6DE-4FAF-8A09-02CD33784B27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "661A9B85-09EE-4D38-9160-8EEA6BE07BD7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DD930C49-512B-4114-8A97-80B1816CFCFA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7E8553E3-578B-4BE3-BBAD-5589338586E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E7EE5C8E-8E2E-4C98-B8C5-B590E44B1EAC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2A3930ED-DE49-4F01-A904-5D66E34832F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A3A51855-94DD-4F2E-BFF8-4ABE4613F962"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "74C77927-A67A-4C1B-BB80-18148E1F0FE0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9C9D22E3-18F8-42F9-993E-81E832B0B125"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7BABB5CA-26F4-4DB6-9D43-1C82751DCCA1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sgi:freeware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E7970668-A80C-461D-A779-A8A6880D319B"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D1FD0EB4-E744-4465-AFEE-A3C807C9C993"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gentoo:linux:1.4:rc2:*:*:*:*:*:*",
"matchCriteriaId": "1D866A7D-F0B9-4EA3-93C6-1E7C2C2A861F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*",
"matchCriteriaId": "38BFA923-7D80-4F01-AF9F-6F13209948AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
"matchCriteriaId": "EDE44C49-172C-4899-8CC8-29AA99A7CD2F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
"matchCriteriaId": "771931F7-9180-4EBD-8627-E1CF17D24647"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3DB008E3-9A00-4D28-8826-A9FCC9F65314"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*",
"matchCriteriaId": "EDD9BE2B-7255-4FC1-B452-E8370632B03F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*",
"matchCriteriaId": "EBD0DC0A-ACAD-4870-9C0F-3095F2AC8CCD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E10D9BF9-FCC7-4680-AD3A-95757FC005EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "78E8C3A4-9FA7-4F2A-8C65-D4404715E674"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DBA2E3A3-EB9B-4B20-B754-EEC914FB1D47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7AC78BA4-70F4-4B9F-93C2-B107E4DCC418"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "28A10F5A-067E-4DD8-B585-ABCD6F6B324E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "34EBF074-78C8-41AF-88F1-DA6726E56F8B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*",
"matchCriteriaId": "8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*",
"matchCriteriaId": "1894C542-AA81-40A9-BF47-AE24C93C1ACB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*",
"matchCriteriaId": "A711CDC2-412C-499D-9FA6-7F25B06267C6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*",
"matchCriteriaId": "0B837BB7-5F62-4CD5-9C64-8553C28EA8A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "369207B4-96FA-4324-9445-98FAE8ECF5DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "08003947-A4F1-44AC-84C6-9F8D097EB759"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A2475113-CFE4-41C8-A86F-F2DA6548D224"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:windriver:bsdos:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "18B197B3-AA07-440F-A733-80B7CE07B3D2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:windriver:bsdos:4.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "42761237-75A9-4E8C-8202-3CA3EB3D1ACC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:windriver:bsdos:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7FAFD2BC-330C-4357-B8C7-F451C6282869"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:windriver:platform_sa:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2151D858-F6D4-472E-9CC7-A8EA26E27CC7"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:hp:alphaserver_sc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5556D665-3792-4832-9EEE-D1122C9BF98E"
}
]
}
]
}
],
"references": [
{
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-002.txt.asc",
"source": "cve@mitre.org"
},
{
"url": "ftp://ftp.sco.com/pub/updates/OpenServer/CSSA-2003-SCO.6",
"source": "cve@mitre.org"
},
{
"url": "ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.5",
"source": "cve@mitre.org"
},
{
"url": "ftp://patches.sgi.com/support/free/security/advisories/20030301-01-P",
"source": "cve@mitre.org"
},
{
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000571",
"source": "cve@mitre.org"
},
{
"url": "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2003:028",
"source": "cve@mitre.org"
},
{
"url": "http://marc.info/?l=bugtraq&m=104673778105192&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://marc.info/?l=bugtraq&m=104678739608479&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://marc.info/?l=bugtraq&m=104678862109841&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://marc.info/?l=bugtraq&m=104678862409849&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://marc.info/?l=bugtraq&m=104679411316818&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://www-1.ibm.com/support/search.wss?rs=0&q=IY40500&apar=only",
"source": "cve@mitre.org"
},
{
"url": "http://www-1.ibm.com/support/search.wss?rs=0&q=IY40501&apar=only",
"source": "cve@mitre.org"
},
{
"url": "http://www-1.ibm.com/support/search.wss?rs=0&q=IY40502&apar=only",
"source": "cve@mitre.org"
},
{
"url": "http://www.cert.org/advisories/CA-2003-07.html",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.debian.org/security/2003/dsa-257",
"source": "cve@mitre.org"
},
{
"url": "http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.iss.net/security_center/static/10748.php",
"source": "cve@mitre.org"
},
{
"url": "http://www.kb.cert.org/vuls/id/398025",
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2003-073.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2003-074.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2003-227.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/6991",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.sendmail.org/8.12.8.html",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2222",
"source": "cve@mitre.org"
}
]
}