redhat 7 data

This commit is contained in:
booboy 2020-10-23 04:59:29 -05:00
parent 04e994800c
commit 4f09b9d4ce
653 changed files with 653 additions and 0 deletions

File diff suppressed because one or more lines are too long

View file

@ -0,0 +1 @@
[{"CVE":"CVE-2008-1686","severity":"important","public_date":"2008-04-10T00:00:00Z","advisories":["RHSA-2008:0235"],"bugzilla":"441239","bugzilla_description":"CVE-2008-1686 speex, libfishsound: insufficient boundary checks","cvss_score":null,"cvss_scoring_vector":null,"CWE":null,"affected_packages":["speex-0:1.0.4-4.el4_6.1","speex-0:1.0.5-4.el5_1.1"],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1686.json"}]

View file

@ -0,0 +1 @@
[{"CVE":"CVE-2017-15108","severity":"low","public_date":null,"advisories":[],"bugzilla":"1510864","bugzilla_description":"CVE-2017-15108 spice-vdagent: Improper validation of xfers->save_dir in vdagent_file_xfers_data()","cvss_score":null,"cvss_scoring_vector":null,"CWE":"CWE-78","affected_packages":[],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15108.json","cvss3_scoring_vector":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L","cvss3_score":"6.5"}]

View file

@ -0,0 +1 @@
[{"CVE":"CVE-2011-0012","severity":"low","public_date":"2011-04-07T00:00:00Z","advisories":["RHSA-2011:0426"],"bugzilla":"639869","bugzilla_description":"CVE-2011-0012 spice-xpi: symlink attack on usbrdrctl log file","cvss_score":2.1,"cvss_scoring_vector":"AV:L/AC:L/Au:N/C:N/I:P/A:N","CWE":null,"affected_packages":["spice-xpi-0:2.4-1.el6_0.2"],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0012.json"},{"CVE":"CVE-2011-1179","severity":"moderate","public_date":"2011-04-07T00:00:00Z","advisories":["RHSA-2011:0426","RHSA-2011:0427"],"bugzilla":"689931","bugzilla_description":"CVE-2011-1179 spice-xpi: unitialized pointer writes possible when getting plugin properties","cvss_score":5.1,"cvss_scoring_vector":"AV:N/AC:H/Au:N/C:P/I:P/A:P","CWE":null,"affected_packages":["spice-xpi-0:2.2-2.3.el5_6.1","spice-xpi-0:2.4-1.el6_0.2"],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1179.json"},{"CVE":"CVE-2010-2792","severity":"moderate","public_date":"2010-08-25T00:00:00Z","advisories":["RHSA-2010:0632","RHSA-2010:0651"],"bugzilla":"620350","bugzilla_description":"CVE-2010-2792 spice-xpi/qspice-client unix socket race","cvss_score":3.3,"cvss_scoring_vector":"AV:L/AC:M/Au:N/C:P/I:P/A:N","CWE":null,"affected_packages":["spice-xpi-0:2.2-2.3.el5_5","qspice-client-0:0.3.0-4.el5_5"],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2792.json"},{"CVE":"CVE-2010-2794","severity":"low","public_date":"2010-08-25T00:00:00Z","advisories":["RHSA-2010:0651"],"bugzilla":"620356","bugzilla_description":"CVE-2010-2794 spice-xpi symlink attack","cvss_score":2.1,"cvss_scoring_vector":"AV:L/AC:L/Au:N/C:N/I:P/A:N","CWE":null,"affected_packages":["spice-xpi-0:2.2-2.3.el5_5"],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2794.json"}]

File diff suppressed because one or more lines are too long

View file

@ -0,0 +1 @@
[{"CVE":"CVE-2015-4645","severity":"moderate","public_date":"2015-06-17T00:00:00Z","advisories":[],"bugzilla":"1234886","bugzilla_description":"CVE-2015-4645 squashfs-tools: integer overflow in read_fragment_table_4","cvss_score":5.1,"cvss_scoring_vector":"AV:N/AC:H/Au:N/C:P/I:P/A:P","CWE":"CWE-190","affected_packages":[],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4645.json"},{"CVE":"CVE-2015-4646","severity":"moderate","public_date":"2015-06-17T00:00:00Z","advisories":[],"bugzilla":"1234887","bugzilla_description":"CVE-2015-4646 squashfs-tools: stack overflow in read_fragment_table_4 due to fix for CVE-2015-4645","cvss_score":5.1,"cvss_scoring_vector":"AV:N/AC:H/Au:N/C:P/I:P/A:P","CWE":"CWE-121","affected_packages":[],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4646.json"},{"CVE":"CVE-2012-4024","severity":"moderate","public_date":"2012-07-18T00:00:00Z","advisories":[],"bugzilla":"842458","bugzilla_description":"CVE-2012-4024 squashfs-tools: remote arbitrary code execution via crafted list file","cvss_score":5.1,"cvss_scoring_vector":"AV:N/AC:H/Au:N/C:P/I:P/A:P","CWE":null,"affected_packages":[],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4024.json"},{"CVE":"CVE-2012-4025","severity":"moderate","public_date":"2012-07-18T00:00:00Z","advisories":[],"bugzilla":"842460","bugzilla_description":"CVE-2012-4025 squashfs-tools: integer overflow in queue_init() may lead to abitrary code execution","cvss_score":5.1,"cvss_scoring_vector":"AV:N/AC:H/Au:N/C:P/I:P/A:P","CWE":"CWE-190","affected_packages":[],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4025.json"}]

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

View file

@ -0,0 +1 @@
[{"CVE":"CVE-2016-6321","severity":"moderate","public_date":"2016-10-27T00:00:00Z","advisories":[],"bugzilla":"1318562","bugzilla_description":"CVE-2016-6321 tar: Bypassing the extract path name","cvss_score":5.1,"cvss_scoring_vector":"AV:N/AC:H/Au:N/C:P/I:P/A:P","CWE":"CWE-22","affected_packages":[],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6321.json"},{"CVE":"CVE-2013-1793","severity":"moderate","public_date":"2015-07-23T00:00:00Z","advisories":[],"bugzilla":"916767","bugzilla_description":"CVE-2013-1793 openstack-utils: openstack-db insecure password creation for services","cvss_score":5.0,"cvss_scoring_vector":"AV:N/AC:L/Au:N/C:P/I:N/A:N","CWE":null,"affected_packages":[],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1793.json"},{"CVE":"CVE-2007-4134","severity":"moderate","public_date":"2007-08-21T00:00:00Z","advisories":["RHSA-2007:0873"],"bugzilla":"253856","bugzilla_description":"CVE-2007-4134 star directory traversal vulnerability","cvss_score":null,"cvss_scoring_vector":null,"CWE":null,"affected_packages":["star-0:1.5a75-2","star-0:1.5a25-8","star-0:1.5a08-5"],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4134.json"}]

View file

@ -0,0 +1 @@
[{"CVE":"CVE-2015-3644","severity":"important","public_date":"2015-05-14T00:00:00Z","advisories":[],"bugzilla":"1221673","bugzilla_description":"CVE-2015-3644 stunnel: authentication bypass with the \"redirect\" option","cvss_score":6.4,"cvss_scoring_vector":"AV:N/AC:L/Au:N/C:P/I:P/A:N","CWE":null,"affected_packages":[],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3644.json"},{"CVE":"CVE-2014-0016","severity":"moderate","public_date":"2014-03-05T00:00:00Z","advisories":[],"bugzilla":"1072180","bugzilla_description":"CVE-2014-0016 stunnel: Improper initialization of PRNG after fork()","cvss_score":4.3,"cvss_scoring_vector":"AV:N/AC:M/Au:N/C:P/I:N/A:N","CWE":null,"affected_packages":[],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0016.json"},{"CVE":"CVE-2013-1762","severity":"moderate","public_date":"2013-03-03T00:00:00Z","advisories":["RHSA-2013:0714"],"bugzilla":"917839","bugzilla_description":"CVE-2013-1762 Stunnel: buffer overflow vulnerability due to incorrect integer conversion in the NTLM authentication of the CONNECT protocol negotiation","cvss_score":5.1,"cvss_scoring_vector":"AV:N/AC:H/Au:N/C:P/I:P/A:P","CWE":null,"affected_packages":["stunnel-0:4.29-3.el6_4"],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1762.json"},{"CVE":"CVE-2011-2940","severity":"important","public_date":"2011-08-18T00:00:00Z","advisories":[],"bugzilla":"732068","bugzilla_description":"CVE-2011-2940 stunnel: heap corruption flaw in 4.4x leads to remote DoS and possible code execution","cvss_score":6.8,"cvss_scoring_vector":"AV:N/AC:M/Au:N/C:P/I:P/A:P","CWE":null,"affected_packages":[],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2940.json"}]

View file

@ -0,0 +1 @@
[{"CVE":"CVE-2016-4455","severity":"moderate","public_date":"2016-05-25T00:00:00Z","advisories":["RHSA-2017:0698","RHSA-2016:2592"],"bugzilla":"1340525","bugzilla_description":"CVE-2016-4455 subscription-manager: sensitive world readable files in /var/lib/rhsm/","cvss_score":1.7,"cvss_scoring_vector":"AV:L/AC:L/Au:S/C:P/I:N/A:N","CWE":"CWE-732","affected_packages":["subscription-manager-0:1.18.10-1.el6","subscription-manager-0:1.17.15-1.el7"],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4455.json","cvss3_scoring_vector":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","cvss3_score":"3.3"},{"CVE":"CVE-2012-6137","severity":"moderate","public_date":"2013-05-06T00:00:00Z","advisories":["RHSA-2013:0788"],"bugzilla":"885130","bugzilla_description":"CVE-2012-6137 subscription-manager: rhn-migrate-classic-to-rhsm missing SSL certificate verification","cvss_score":4.3,"cvss_scoring_vector":"AV:N/AC:M/Au:N/C:N/I:P/A:N","CWE":null,"affected_packages":["subscription-manager-0:1.1.23.1-1.el6_4","subscription-manager-0:1.0.24.1-1.el5_9"],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6137.json"},{"CVE":"CVE-2017-2663","severity":"moderate","public_date":null,"advisories":[],"bugzilla":"1434100","bugzilla_description":"CVE-2017-2663 subscription-manager: unsafe dbus interface","cvss_score":null,"cvss_scoring_vector":null,"CWE":"CWE-270","affected_packages":[],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2663.json","cvss3_scoring_vector":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H","cvss3_score":"8.2"}]

File diff suppressed because one or more lines are too long

View file

@ -0,0 +1 @@
[{"CVE":"CVE-2019-19725","severity":"important","public_date":"2019-12-09T00:00:00Z","advisories":[],"bugzilla":"1784740","bugzilla_description":"CVE-2019-19725 sysstat: double free in check_file_actlst() in sa_common.c may lead to arbitrary code execution","cvss_score":null,"cvss_scoring_vector":null,"CWE":"CWE-672","affected_packages":[],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19725.json","cvss3_scoring_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","cvss3_score":"9.8"},{"CVE":"CVE-2019-16167","severity":"low","public_date":"2019-08-03T00:00:00Z","advisories":[],"bugzilla":"1768970","bugzilla_description":"CVE-2019-16167 sysstat: memory corruption due to an integer overflow in remap_struct in sa_common.c","cvss_score":null,"cvss_scoring_vector":null,"CWE":"CWE-190","affected_packages":[],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16167.json","cvss3_scoring_vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","cvss3_score":"5.5"},{"CVE":"CVE-2018-19416","severity":"low","public_date":"2018-11-21T00:00:00Z","advisories":[],"bugzilla":"1652728","bugzilla_description":"CVE-2018-19416 sysstat: Out-of-bounds read in remap_struct function in sa_common.c","cvss_score":null,"cvss_scoring_vector":null,"CWE":"CWE-125","affected_packages":[],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19416.json","cvss3_scoring_vector":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N","cvss3_score":"4.7"},{"CVE":"CVE-2018-19517","severity":"low","public_date":"2018-11-21T00:00:00Z","advisories":[],"bugzilla":"1679544","bugzilla_description":"CVE-2018-19517 sysstat: Out of bounds read in remap_struct function in sa_common.c","cvss_score":null,"cvss_scoring_vector":null,"CWE":"CWE-119","affected_packages":[],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19517.json","cvss3_scoring_vector":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","cvss3_score":"5.5"},{"CVE":"CVE-2007-3852","severity":"low","public_date":"2007-08-10T00:00:00Z","advisories":["RHSA-2011:1005"],"bugzilla":"251200","bugzilla_description":"CVE-2007-3852 sysstat insecure temporary file usage","cvss_score":1.9,"cvss_scoring_vector":"AV:L/AC:M/Au:N/C:N/I:P/A:N","CWE":"CWE-377","affected_packages":["sysstat-0:7.0.2-11.el5"],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3852.json"},{"CVE":"CVE-2004-0107","severity":"moderate","public_date":"2004-03-10T00:00:00Z","advisories":["RHSA-2004:093","RHSA-2004:053"],"bugzilla":"1617152","bugzilla_description":"CVE-2004-0107 security flaw","cvss_score":null,"cvss_scoring_vector":null,"CWE":null,"affected_packages":["sysstat-0:4.0.7-4.EL3.2"],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0107.json"},{"CVE":"CVE-2004-0108","severity":"moderate","public_date":"2004-03-10T00:00:00Z","advisories":["RHSA-2004:053"],"bugzilla":"1617153","bugzilla_description":"CVE-2004-0108 security flaw","cvss_score":null,"cvss_scoring_vector":null,"CWE":null,"affected_packages":["sysstat-0:4.0.7-4.EL3.2"],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0108.json"}]

View file

@ -0,0 +1 @@
[{"CVE":"CVE-2011-4405","severity":"moderate","public_date":"2011-11-16T00:00:00Z","advisories":[],"bugzilla":"758374","bugzilla_description":"CVE-2011-4405 system-config-printer: possible MITM due to use of insecure connections","cvss_score":5.8,"cvss_scoring_vector":"AV:N/AC:M/Au:N/C:P/I:P/A:N","CWE":null,"affected_packages":[],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4405.json"},{"CVE":"CVE-2011-2899","severity":"moderate","public_date":"2011-07-30T00:00:00Z","advisories":["RHSA-2011:1196"],"bugzilla":"728348","bugzilla_description":"CVE-2011-2899 system-config-printer: possible arbitrary code execution in pysmb.py due to improper escaping of hostnames","cvss_score":5.1,"cvss_scoring_vector":"AV:N/AC:H/Au:N/C:P/I:P/A:P","CWE":null,"affected_packages":["system-config-printer-0:0.6.116.10-1.6.el4","system-config-printer-0:0.7.32.10-1.el5_7.1"],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2899.json"},{"CVE":"CVE-2011-2520","severity":"moderate","public_date":"2011-07-18T00:00:00Z","advisories":["RHSA-2011:0953"],"bugzilla":"717985","bugzilla_description":"CVE-2011-2520 system-config-firewall: privilege escalation flaw via use of python pickle","cvss_score":6.0,"cvss_scoring_vector":"AV:L/AC:H/Au:S/C:C/I:C/A:C","CWE":"CWE-502","affected_packages":["system-config-firewall-0:1.2.27-3.el6_1.3","system-config-printer-0:1.1.16-17.el6_1.2"],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2520.json"}]

File diff suppressed because one or more lines are too long

View file

@ -0,0 +1 @@
[{"CVE":"CVE-2012-0875","severity":"moderate","public_date":"2012-02-20T00:00:00Z","advisories":["RHSA-2012:0376"],"bugzilla":"795913","bugzilla_description":"CVE-2012-0875 systemtap: kernel panic when processing malformed DWARF unwind data","cvss_score":5.2,"cvss_scoring_vector":"AV:L/AC:L/Au:S/C:P/I:N/A:C","CWE":null,"affected_packages":["systemtap-0:1.6-7.el5_8","systemtap-0:1.6-5.el6_2"],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0875.json"},{"CVE":"CVE-2011-2502","severity":"moderate","public_date":"2011-07-25T00:00:00Z","advisories":["RHSA-2011:1088"],"bugzilla":"716476","bugzilla_description":"CVE-2011-2502 systemtap: insufficient security check when loading uprobes kernel module","cvss_score":6.8,"cvss_scoring_vector":"AV:L/AC:L/Au:S/C:C/I:C/A:C","CWE":null,"affected_packages":["systemtap-0:1.4-6.el6_1.2"],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2502.json"},{"CVE":"CVE-2011-2503","severity":"moderate","public_date":"2011-07-25T00:00:00Z","advisories":["RHSA-2011:1088","RHSA-2011:1089"],"bugzilla":"716489","bugzilla_description":"CVE-2011-2503 systemtap: signed module loading race condition","cvss_score":6.0,"cvss_scoring_vector":"AV:L/AC:H/Au:S/C:C/I:C/A:C","CWE":null,"affected_packages":["systemtap-0:1.3-9.el5","systemtap-0:1.4-6.el6_1.2"],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2503.json"},{"CVE":"CVE-2011-1769","severity":"moderate","public_date":"2011-05-11T00:00:00Z","advisories":["RHSA-2011:0841","RHSA-2011:0842"],"bugzilla":"702687","bugzilla_description":"CVE-2011-1769 systemtap: does not guard against DWARF operations div-by-zero errors, which can cause a kernel panic","cvss_score":4.6,"cvss_scoring_vector":"AV:A/AC:H/Au:N/C:N/I:N/A:C","CWE":null,"affected_packages":["systemtap-0:1.3-4.el5_6.1","systemtap-0:1.4-6.el6_1.1"],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1769.json"},{"CVE":"CVE-2011-1781","severity":"moderate","public_date":"2011-05-11T00:00:00Z","advisories":["RHSA-2011:0842"],"bugzilla":"703972","bugzilla_description":"CVE-2011-1781 systemtap: divide by zero stack unwinding flaw","cvss_score":4.6,"cvss_scoring_vector":"AV:A/AC:H/Au:N/C:N/I:N/A:C","CWE":null,"affected_packages":["systemtap-0:1.4-6.el6_1.1"],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1781.json"},{"CVE":"CVE-2010-4170","severity":"important","public_date":"2010-11-17T00:00:00Z","advisories":["RHSA-2010:0895","RHSA-2010:0894"],"bugzilla":"653604","bugzilla_description":"CVE-2010-4170 Systemtap: Insecure loading of modules","cvss_score":7.2,"cvss_scoring_vector":"AV:L/AC:L/Au:N/C:C/I:C/A:C","CWE":"CWE-284","affected_packages":["systemtap-0:1.1-3.el5_5.3","systemtap-0:1.2-11.el6_0","systemtap-0:0.6.2-2.el4_8.3"],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4170.json"},{"CVE":"CVE-2010-4171","severity":"low","public_date":"2010-11-17T00:00:00Z","advisories":["RHSA-2010:0894"],"bugzilla":"653606","bugzilla_description":"CVE-2010-4171 Systemtap: Ability to remove unused modules by unprivileged user","cvss_score":2.1,"cvss_scoring_vector":"AV:L/AC:L/Au:N/C:N/I:N/A:P","CWE":null,"affected_packages":["systemtap-0:1.1-3.el5_5.3","systemtap-0:1.2-11.el6_0"],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4171.json"},{"CVE":"CVE-2010-0411","severity":"moderate","public_date":"2010-01-29T00:00:00Z","advisories":["RHSA-2010:0125","RHSA-2010:0124"],"bugzilla":"559719","bugzilla_description":"CVE-2010-0411 systemtap: Crash with systemtap script using __get_argv()","cvss_score":6.0,"cvss_scoring_vector":"AV:L/AC:H/Au:S/C:C/I:C/A:C","CWE":null,"affected_packages":["systemtap-0:0.6.2-2.el4_8.1","systemtap-0:0.9.7-5.el5_4.3"],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0411.json"},{"CVE":"CVE-2009-4273","severity":"important","public_date":"2009-12-18T00:00:00Z","advisories":["RHSA-2010:0124"],"bugzilla":"550172","bugzilla_description":"CVE-2009-4273 systemtap: remote code execution via stap-server","cvss_score":7.9,"cvss_scoring_vector":"AV:A/AC:M/Au:N/C:C/I:C/A:C","CWE":"CWE-78","affected_packages":["systemtap-0:0.9.7-5.el5_4.3"],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4273.json"},{"CVE":"CVE-2009-0784","severity":"moderate","public_date":"2009-03-25T00:00:00Z","advisories":["RHSA-2009:0373"],"bugzilla":"489808","bugzilla_description":"CVE-2009-0784 systemtap: race condition leads to privilege escalation","cvss_score":6.6,"cvss_scoring_vector":"AV:L/AC:M/Au:S/C:C/I:C/A:C","CWE":null,"affected_packages":["systemtap-0:0.7.2-3.el5_3","systemtap-0:0.6.2-2.el4_7"],"resource_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0784.json"}]

Some files were not shown because too many files have changed in this diff Show more