Auto-Update: 2025-04-03T22:00:20.777363+00:00

This commit is contained in:
cad-safe-bot 2025-04-03 22:03:57 +00:00
parent 4ca368f310
commit 06e6621079
131 changed files with 4471 additions and 778 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2007-3010",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-09-18T21:17:00.000",
"lastModified": "2025-02-07T15:15:11.303",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T20:40:41.910",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2010-10006",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-18T00:15:11.420",
"lastModified": "2024-11-21T01:13:23.610",
"lastModified": "2025-04-03T20:15:15.440",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
@ -39,6 +39,26 @@
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -104,6 +124,20 @@
"value": "CWE-203"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-203"
},
{
"lang": "en",
"value": "CWE-208"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2012-0507",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2012-06-07T22:55:17.883",
"lastModified": "2025-02-10T20:15:32.507",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T21:01:25.113",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -517,7 +517,8 @@
"url": "http://blogs.technet.com/b/mmpc/archive/2012/03/20/an-interesting-case-of-jre-sandbox-breach-cve-2012-0507.aspx",
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
"Third Party Advisory",
"Broken Link"
]
},
{
@ -687,42 +688,48 @@
"url": "http://secunia.com/advisories/48589",
"source": "secalert_us@oracle.com",
"tags": [
"Not Applicable"
"Not Applicable",
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/48692",
"source": "secalert_us@oracle.com",
"tags": [
"Not Applicable"
"Not Applicable",
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/48915",
"source": "secalert_us@oracle.com",
"tags": [
"Not Applicable"
"Not Applicable",
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/48948",
"source": "secalert_us@oracle.com",
"tags": [
"Not Applicable"
"Not Applicable",
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/48950",
"source": "secalert_us@oracle.com",
"tags": [
"Not Applicable"
"Not Applicable",
"Broken Link"
]
},
{
"url": "http://weblog.ikvm.net/PermaLink.aspx?guid=cd48169a-9405-4f63-9087-798c4a1866d3",
"source": "secalert_us@oracle.com",
"tags": [
"Exploit"
"Exploit",
"Broken Link"
]
},
{
@ -746,7 +753,8 @@
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
"VDB Entry",
"Broken Link"
]
},
{
@ -760,7 +768,8 @@
"url": "http://blogs.technet.com/b/mmpc/archive/2012/03/20/an-interesting-case-of-jre-sandbox-breach-cve-2012-0507.aspx",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
"Third Party Advisory",
"Broken Link"
]
},
{
@ -930,42 +939,48 @@
"url": "http://secunia.com/advisories/48589",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
"Not Applicable",
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/48692",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
"Not Applicable",
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/48915",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
"Not Applicable",
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/48948",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
"Not Applicable",
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/48950",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
"Not Applicable",
"Broken Link"
]
},
{
"url": "http://weblog.ikvm.net/PermaLink.aspx?guid=cd48169a-9405-4f63-9087-798c4a1866d3",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
"Exploit",
"Broken Link"
]
},
{
@ -989,7 +1004,8 @@
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
"VDB Entry",
"Broken Link"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2013-2596",
"sourceIdentifier": "cve@mitre.org",
"published": "2013-04-13T02:59:46.627",
"lastModified": "2025-02-07T15:15:13.020",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T20:40:47.920",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2013-3660",
"sourceIdentifier": "cve@mitre.org",
"published": "2013-05-24T20:55:01.903",
"lastModified": "2025-02-07T15:15:13.630",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T20:40:54.747",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2014-7169",
"sourceIdentifier": "cve@mitre.org",
"published": "2014-09-25T01:55:04.367",
"lastModified": "2025-02-10T20:15:37.017",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T20:41:00.940",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2015-1187",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-09-21T16:29:00.147",
"lastModified": "2025-02-07T15:15:14.100",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T20:28:00.793",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -630,7 +630,6 @@
"url": "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10052",
"source": "cve@mitre.org",
"tags": [
"Permissions Required",
"Vendor Advisory"
]
},
@ -639,7 +638,8 @@
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
"VDB Entry",
"Broken Link"
]
},
{
@ -648,7 +648,8 @@
"tags": [
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
"Third Party Advisory",
"Broken Link"
]
},
{
@ -682,7 +683,6 @@
"url": "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10052",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Vendor Advisory"
]
},
@ -691,7 +691,8 @@
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
"VDB Entry",
"Broken Link"
]
},
{
@ -700,7 +701,8 @@
"tags": [
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
"Third Party Advisory",
"Broken Link"
]
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2015-2291",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-08-09T18:29:00.933",
"lastModified": "2025-02-04T21:15:08.600",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T20:27:51.273",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -158,7 +158,8 @@
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
"VDB Entry",
"Broken Link"
]
},
{
@ -190,7 +191,8 @@
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
"VDB Entry",
"Broken Link"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2015-2419",
"sourceIdentifier": "secure@microsoft.com",
"published": "2015-07-14T21:59:33.283",
"lastModified": "2025-02-10T19:15:34.547",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T21:01:31.323",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2015-3035",
"sourceIdentifier": "cve@mitre.org",
"published": "2015-04-22T01:59:02.553",
"lastModified": "2025-02-04T21:15:08.993",
"vulnStatus": "Modified",
"lastModified": "2025-04-03T20:41:19.937",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2016-9563",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-11-23T02:59:06.370",
"lastModified": "2025-02-07T15:15:14.340",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T20:41:26.637",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -141,7 +141,8 @@
"url": "https://erpscan.io/advisories/erpscan-16-034-sap-netweaver-java-xxe-vulnerability-bc-bmt-bpm-dsk-component/",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
"Third Party Advisory",
"Broken Link"
]
},
{
@ -164,7 +165,8 @@
"url": "https://erpscan.io/advisories/erpscan-16-034-sap-netweaver-java-xxe-vulnerability-bc-bmt-bpm-dsk-component/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
"Third Party Advisory",
"Broken Link"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-12637",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-08-07T20:29:01.120",
"lastModified": "2025-03-27T03:15:12.880",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T20:27:39.877",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -130,7 +130,10 @@
"references": [
{
"url": "https://web.archive.org/web/20170807202056/http://www.sh0w.top/index.php/archives/7/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-15944",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-12-11T17:29:00.490",
"lastModified": "2025-02-07T14:15:42.553",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T20:28:14.033",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-9841",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-06-27T17:29:00.177",
"lastModified": "2025-02-07T15:15:15.160",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T20:26:59.540",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-6530",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-03-06T20:29:00.987",
"lastModified": "2025-02-04T21:15:16.167",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T20:28:21.333",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-0863",
"sourceIdentifier": "secure@microsoft.com",
"published": "2019-05-16T19:29:00.927",
"lastModified": "2025-02-07T17:15:16.993",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T21:01:36.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -109,38 +109,93 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0"
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64"
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "28A7FEE9-B473-48A0-B0ED-A5CC1E44194C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"matchCriteriaId": "AEE2E768-0F45-46E1-B6D7-087917109D98"
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3"
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "0A1BC97A-263E-4291-8AEF-02EE4E6031E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB"
"criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1"
"criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "8733BF37-7BF2-409D-9452-DA8A92DA1124"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"matchCriteriaId": "3FB5CDAE-C713-4D9D-9D6A-2C2E8924A4BB"
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "555C22C7-356D-4DA7-8CED-DA7423BBC6CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "D76003FB-EE99-4D8E-B6A0-B13C2041E5A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "40151476-C0FD-4336-8194-039E8827B7C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "C1CFB53B-B17B-47BD-BAC1-C6C5D168FFB6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "73D24713-D897-408D-893B-77A61982597D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "345FCD64-D37B-425B-B64C-8B1640B7E850"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "9E1ED169-6F03-4BD5-B227-5FA54DB40AD7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "B6A0DB01-49CB-4445-AFE8-57C2186857BA"
},
{
"vulnerable": true,
@ -157,6 +212,16 @@
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "FD3218D1-BE39-4CEB-A88F-E715B722862B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "FFE3495D-291C-46B6-B758-23E16A53A7C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
@ -182,16 +247,6 @@
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"matchCriteriaId": "CAACE735-003E-4ACB-A82E-C0CF97D7F013"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"matchCriteriaId": "5B921FDB-8E7D-427E-82BE-4432585080CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-0880",
"sourceIdentifier": "secure@microsoft.com",
"published": "2019-07-15T19:15:15.687",
"lastModified": "2024-11-21T04:17:26.037",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T21:01:49.180",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
@ -89,38 +89,93 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0"
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64"
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "28A7FEE9-B473-48A0-B0ED-A5CC1E44194C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"matchCriteriaId": "AEE2E768-0F45-46E1-B6D7-087917109D98"
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3"
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "0A1BC97A-263E-4291-8AEF-02EE4E6031E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB"
"criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1"
"criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "8733BF37-7BF2-409D-9452-DA8A92DA1124"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"matchCriteriaId": "3FB5CDAE-C713-4D9D-9D6A-2C2E8924A4BB"
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "555C22C7-356D-4DA7-8CED-DA7423BBC6CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "D76003FB-EE99-4D8E-B6A0-B13C2041E5A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "40151476-C0FD-4336-8194-039E8827B7C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "C1CFB53B-B17B-47BD-BAC1-C6C5D168FFB6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "73D24713-D897-408D-893B-77A61982597D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "345FCD64-D37B-425B-B64C-8B1640B7E850"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "9E1ED169-6F03-4BD5-B227-5FA54DB40AD7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "B6A0DB01-49CB-4445-AFE8-57C2186857BA"
},
{
"vulnerable": true,
@ -132,6 +187,11 @@
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "FFE3495D-291C-46B6-B758-23E16A53A7C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
@ -147,16 +207,6 @@
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"matchCriteriaId": "CAACE735-003E-4ACB-A82E-C0CF97D7F013"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"matchCriteriaId": "5B921FDB-8E7D-427E-82BE-4432585080CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-0903",
"sourceIdentifier": "secure@microsoft.com",
"published": "2019-05-16T19:29:02.303",
"lastModified": "2025-02-07T17:15:17.173",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T21:01:40.810",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,8 @@
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
@ -36,15 +36,13 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
@ -111,38 +109,93 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0"
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64"
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "28A7FEE9-B473-48A0-B0ED-A5CC1E44194C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"matchCriteriaId": "AEE2E768-0F45-46E1-B6D7-087917109D98"
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3"
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "0A1BC97A-263E-4291-8AEF-02EE4E6031E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB"
"criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1"
"criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "8733BF37-7BF2-409D-9452-DA8A92DA1124"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"matchCriteriaId": "3FB5CDAE-C713-4D9D-9D6A-2C2E8924A4BB"
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "555C22C7-356D-4DA7-8CED-DA7423BBC6CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "D76003FB-EE99-4D8E-B6A0-B13C2041E5A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "40151476-C0FD-4336-8194-039E8827B7C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "C1CFB53B-B17B-47BD-BAC1-C6C5D168FFB6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "73D24713-D897-408D-893B-77A61982597D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "345FCD64-D37B-425B-B64C-8B1640B7E850"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "9E1ED169-6F03-4BD5-B227-5FA54DB40AD7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "B6A0DB01-49CB-4445-AFE8-57C2186857BA"
},
{
"vulnerable": true,
@ -159,6 +212,16 @@
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "FD3218D1-BE39-4CEB-A88F-E715B722862B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "FFE3495D-291C-46B6-B758-23E16A53A7C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
@ -189,16 +252,6 @@
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"matchCriteriaId": "CAACE735-003E-4ACB-A82E-C0CF97D7F013"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"matchCriteriaId": "5B921FDB-8E7D-427E-82BE-4432585080CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-1064",
"sourceIdentifier": "secure@microsoft.com",
"published": "2019-06-12T14:29:04.273",
"lastModified": "2025-02-07T17:15:17.363",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T21:01:45.020",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,8 @@
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
@ -36,15 +36,13 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
@ -121,49 +119,104 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64"
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"matchCriteriaId": "AEE2E768-0F45-46E1-B6D7-087917109D98"
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "0A1BC97A-263E-4291-8AEF-02EE4E6031E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3"
"criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB"
"criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "8733BF37-7BF2-409D-9452-DA8A92DA1124"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1"
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "555C22C7-356D-4DA7-8CED-DA7423BBC6CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"matchCriteriaId": "3FB5CDAE-C713-4D9D-9D6A-2C2E8924A4BB"
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "D76003FB-EE99-4D8E-B6A0-B13C2041E5A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "40151476-C0FD-4336-8194-039E8827B7C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "C1CFB53B-B17B-47BD-BAC1-C6C5D168FFB6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "73D24713-D897-408D-893B-77A61982597D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "345FCD64-D37B-425B-B64C-8B1640B7E850"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "9E1ED169-6F03-4BD5-B227-5FA54DB40AD7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "B6A0DB01-49CB-4445-AFE8-57C2186857BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_1709:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "9EFB4440-2B6B-486F-94D4-7D9C80301E51"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "FD3218D1-BE39-4CEB-A88F-E715B722862B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "FFE3495D-291C-46B6-B758-23E16A53A7C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"matchCriteriaId": "CAACE735-003E-4ACB-A82E-C0CF97D7F013"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"matchCriteriaId": "5B921FDB-8E7D-427E-82BE-4432585080CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-11707",
"sourceIdentifier": "security@mozilla.org",
"published": "2019-07-23T14:15:15.233",
"lastModified": "2025-02-07T13:15:26.000",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T21:03:18.177",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -119,15 +119,15 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"versionEndExcluding": "60.7.3",
"matchCriteriaId": "E680E873-7A88-4BB5-BB42-38E72969EA9F"
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
"versionEndExcluding": "60.7.1",
"matchCriteriaId": "45BDFED1-E029-417D-AB4A-E7BBF625E994"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"versionEndExcluding": "60.7.1",
"matchCriteriaId": "16273954-2CE5-4472-8EF9-B117AE31F704"
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"versionEndExcluding": "60.7.3",
"matchCriteriaId": "E680E873-7A88-4BB5-BB42-38E72969EA9F"
},
{
"vulnerable": true,

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-1129",
"sourceIdentifier": "secure@microsoft.com",
"published": "2019-07-15T19:15:20.967",
"lastModified": "2025-02-07T17:15:17.550",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T21:01:55.130",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,8 @@
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
@ -36,15 +36,13 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
@ -121,38 +119,83 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"matchCriteriaId": "AEE2E768-0F45-46E1-B6D7-087917109D98"
"criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3"
"criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "8733BF37-7BF2-409D-9452-DA8A92DA1124"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB"
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "555C22C7-356D-4DA7-8CED-DA7423BBC6CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1"
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"matchCriteriaId": "3FB5CDAE-C713-4D9D-9D6A-2C2E8924A4BB"
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "D76003FB-EE99-4D8E-B6A0-B13C2041E5A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"matchCriteriaId": "CAACE735-003E-4ACB-A82E-C0CF97D7F013"
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "40151476-C0FD-4336-8194-039E8827B7C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"matchCriteriaId": "5B921FDB-8E7D-427E-82BE-4432585080CF"
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "C1CFB53B-B17B-47BD-BAC1-C6C5D168FFB6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "73D24713-D897-408D-893B-77A61982597D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "345FCD64-D37B-425B-B64C-8B1640B7E850"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "9E1ED169-6F03-4BD5-B227-5FA54DB40AD7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "B6A0DB01-49CB-4445-AFE8-57C2186857BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "FD3218D1-BE39-4CEB-A88F-E715B722862B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "FFE3495D-291C-46B6-B758-23E16A53A7C3"
},
{
"vulnerable": true,

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-1130",
"sourceIdentifier": "secure@microsoft.com",
"published": "2019-07-15T19:15:21.047",
"lastModified": "2025-02-07T17:15:17.753",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T21:02:00.477",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,8 @@
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
@ -36,15 +36,13 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
@ -121,38 +119,93 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0"
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64"
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "28A7FEE9-B473-48A0-B0ED-A5CC1E44194C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"matchCriteriaId": "AEE2E768-0F45-46E1-B6D7-087917109D98"
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3"
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "0A1BC97A-263E-4291-8AEF-02EE4E6031E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB"
"criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1"
"criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "8733BF37-7BF2-409D-9452-DA8A92DA1124"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"matchCriteriaId": "3FB5CDAE-C713-4D9D-9D6A-2C2E8924A4BB"
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "555C22C7-356D-4DA7-8CED-DA7423BBC6CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "D76003FB-EE99-4D8E-B6A0-B13C2041E5A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "40151476-C0FD-4336-8194-039E8827B7C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "C1CFB53B-B17B-47BD-BAC1-C6C5D168FFB6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "73D24713-D897-408D-893B-77A61982597D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "345FCD64-D37B-425B-B64C-8B1640B7E850"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "9E1ED169-6F03-4BD5-B227-5FA54DB40AD7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "B6A0DB01-49CB-4445-AFE8-57C2186857BA"
},
{
"vulnerable": true,
@ -164,6 +217,16 @@
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "FD3218D1-BE39-4CEB-A88F-E715B722862B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "FFE3495D-291C-46B6-B758-23E16A53A7C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
@ -179,16 +242,6 @@
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"matchCriteriaId": "CAACE735-003E-4ACB-A82E-C0CF97D7F013"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"matchCriteriaId": "5B921FDB-8E7D-427E-82BE-4432585080CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-1132",
"sourceIdentifier": "secure@microsoft.com",
"published": "2019-07-15T19:15:21.107",
"lastModified": "2025-02-07T17:15:17.943",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T21:02:09.750",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,8 @@
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
@ -36,15 +36,13 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-1215",
"sourceIdentifier": "secure@microsoft.com",
"published": "2019-09-11T22:15:14.587",
"lastModified": "2025-02-07T17:15:18.327",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T20:46:54.473",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -119,38 +119,93 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0"
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64"
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "28A7FEE9-B473-48A0-B0ED-A5CC1E44194C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"matchCriteriaId": "AEE2E768-0F45-46E1-B6D7-087917109D98"
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3"
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "0A1BC97A-263E-4291-8AEF-02EE4E6031E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB"
"criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1"
"criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "8733BF37-7BF2-409D-9452-DA8A92DA1124"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"matchCriteriaId": "3FB5CDAE-C713-4D9D-9D6A-2C2E8924A4BB"
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "555C22C7-356D-4DA7-8CED-DA7423BBC6CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "D76003FB-EE99-4D8E-B6A0-B13C2041E5A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "40151476-C0FD-4336-8194-039E8827B7C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "C1CFB53B-B17B-47BD-BAC1-C6C5D168FFB6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "73D24713-D897-408D-893B-77A61982597D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "345FCD64-D37B-425B-B64C-8B1640B7E850"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "9E1ED169-6F03-4BD5-B227-5FA54DB40AD7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "B6A0DB01-49CB-4445-AFE8-57C2186857BA"
},
{
"vulnerable": true,
@ -167,6 +222,16 @@
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "FD3218D1-BE39-4CEB-A88F-E715B722862B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "FFE3495D-291C-46B6-B758-23E16A53A7C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
@ -197,16 +262,6 @@
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"matchCriteriaId": "CAACE735-003E-4ACB-A82E-C0CF97D7F013"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"matchCriteriaId": "5B921FDB-8E7D-427E-82BE-4432585080CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-1253",
"sourceIdentifier": "secure@microsoft.com",
"published": "2019-09-11T22:15:16.337",
"lastModified": "2025-02-07T16:15:29.200",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T20:47:24.857",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -119,28 +119,73 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1DD582C-1660-4E6E-81A1-537BD1307A99"
"criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC160B20-3EA0-49A0-A857-4E7A1C2D74E2"
"criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "8733BF37-7BF2-409D-9452-DA8A92DA1124"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00345596-E9E0-4096-8DC6-0212F4747A13"
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "555C22C7-356D-4DA7-8CED-DA7423BBC6CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E332666-2E03-468E-BC30-299816D6E8ED"
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A363CE8F-F399-4B6E-9E7D-349792F95DDB"
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "D76003FB-EE99-4D8E-B6A0-B13C2041E5A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "40151476-C0FD-4336-8194-039E8827B7C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "C1CFB53B-B17B-47BD-BAC1-C6C5D168FFB6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "73D24713-D897-408D-893B-77A61982597D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "345FCD64-D37B-425B-B64C-8B1640B7E850"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "9E1ED169-6F03-4BD5-B227-5FA54DB40AD7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "B6A0DB01-49CB-4445-AFE8-57C2186857BA"
},
{
"vulnerable": true,
@ -149,8 +194,8 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:*:*",
"matchCriteriaId": "530DF8C9-467C-4F4F-9FCA-CDD934BADF3C"
"criteria": "cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "FFE3495D-291C-46B6-B758-23E16A53A7C3"
},
{
"vulnerable": true,

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-13272",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-07-17T13:15:10.687",
"lastModified": "2025-02-04T21:15:16.633",
"vulnStatus": "Modified",
"lastModified": "2025-04-03T20:28:35.577",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-17621",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-12-30T17:15:19.857",
"lastModified": "2025-02-04T21:15:18.170",
"vulnStatus": "Modified",
"lastModified": "2025-04-03T20:05:08.703",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-19356",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-02-07T23:15:10.013",
"lastModified": "2025-02-04T21:15:18.653",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T20:05:28.917",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-9670",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-05-29T22:29:01.507",
"lastModified": "2025-02-25T02:00:02.097",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T20:28:28.127",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-15069",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-06-29T18:15:12.313",
"lastModified": "2025-02-07T02:00:02.403",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T20:05:52.630",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-22658",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-20T19:15:12.843",
"lastModified": "2024-11-21T05:13:21.127",
"lastModified": "2025-04-03T21:15:37.287",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-494"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-25223",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-09-25T04:23:04.857",
"lastModified": "2025-02-03T15:15:12.253",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T20:07:39.410",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-30900",
"sourceIdentifier": "product-security@apple.com",
"published": "2021-08-24T19:15:18.083",
"lastModified": "2025-01-29T18:15:42.770",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T20:52:23.230",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -119,9 +119,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "14.8.1",
"matchCriteriaId": "A9DB9916-6DA1-4A32-86A2-AD8DC5246709"
"matchCriteriaId": "DD8D9814-E083-498D-BAC3-6E8FD1A259B7"
},
{
"vulnerable": true,

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-31979",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-07-14T18:15:09.597",
"lastModified": "2025-02-07T17:15:21.370",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T20:47:32.703",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-33641",
"sourceIdentifier": "securities@openeuler.org",
"published": "2023-01-20T21:15:10.803",
"lastModified": "2024-11-21T06:09:15.587",
"lastModified": "2025-04-03T20:15:16.000",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-4314",
"sourceIdentifier": "zowe-security@lists.openmainframeproject.org",
"published": "2023-01-18T16:15:11.130",
"lastModified": "2024-12-19T17:00:28.533",
"vulnStatus": "Analyzed",
"lastModified": "2025-04-03T20:15:16.207",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
@ -59,6 +79,20 @@
"value": "CWE-287"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
},
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-44228",
"sourceIdentifier": "security@apache.org",
"published": "2021-12-10T10:15:09.143",
"lastModified": "2025-02-04T15:15:13.773",
"vulnStatus": "Modified",
"lastModified": "2025-04-03T20:53:22.977",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -119,6 +119,146 @@
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:6bk1602-0aa12-0tp0_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.7.0",
"matchCriteriaId": "BD64FC36-CC7B-4FD7-9845-7EA1DDB0E627"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:6bk1602-0aa12-0tp0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF99FE8F-40D0-48A8-9A40-43119B259535"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:6bk1602-0aa22-0tp0_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.7.0",
"matchCriteriaId": "D0012304-B1C8-460A-B891-42EBF96504F5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:6bk1602-0aa22-0tp0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3F61BCB-64FA-463C-8B95-8868995EDBC0"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:6bk1602-0aa32-0tp0_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.7.0",
"matchCriteriaId": "B02BCF56-D9D3-4BF3-85A2-D445E997F5EC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:6bk1602-0aa32-0tp0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5A189B7-DDBF-4B84-997F-637CEC5FF12B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:6bk1602-0aa42-0tp0_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.7.0",
"matchCriteriaId": "4A2DB5BA-1065-467A-8FB6-81B5EC29DC0C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:6bk1602-0aa42-0tp0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "035AFD6F-E560-43C8-A283-8D80DAA33025"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:6bk1602-0aa52-0tp0_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.7.0",
"matchCriteriaId": "809EB87E-561A-4DE5-9FF3-BBEE0FA3706E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:6bk1602-0aa52-0tp0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4594FF76-A1F8-4457-AE90-07D051CD0DCB"
}
]
}
]
},
{
"nodes": [
{
@ -205,24 +345,30 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:captial:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:siemens:capital:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2019.1",
"matchCriteriaId": "07856DAA-EDB4-4522-BA16-CD302C9E39EF"
"matchCriteriaId": "9AAF12D5-7961-4344-B0CC-BE1C673BFE1F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:captial:2019.1:-:*:*:*:*:*:*",
"matchCriteriaId": "F7AD819D-D093-472E-AA47-1A925111E4C8"
"criteria": "cpe:2.3:a:siemens:capital:2019.1:-:*:*:*:*:*:*",
"matchCriteriaId": "19CB7B44-1877-4739-AECB-3E995ED03FC9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:captial:2019.1:sp1912:*:*:*:*:*:*",
"matchCriteriaId": "2D07A11A-A3C6-4D44-B2E0-A8358D23947A"
"criteria": "cpe:2.3:a:siemens:capital:2019.1:sp1912:*:*:*:*:*:*",
"matchCriteriaId": "A883D9C2-F2A4-459F-8000-EE288DC0DD17"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:comos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "61597661-A3B0-4A14-AA6B-C911E0063390"
"versionEndExcluding": "10.4.2",
"matchCriteriaId": "9CD4AC6F-B8D3-4588-B3BD-55C9BAF4AAAC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:desigo_cc_advanced_reports:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8AFD64AC-0826-48FB-91B0-B8DF5ECC8775"
},
{
"vulnerable": true,
@ -292,13 +438,9 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:energyip_prepay:3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1F0C3D5E-579F-42C6-9D8C-37969A1D17D2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:energyip_prepay:3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2C16C460-9482-4A22-92AC-1AE0E87D7F28"
"criteria": "cpe:2.3:a:siemens:energyip_prepay:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.8.0.12",
"matchCriteriaId": "536C7527-27E6-41C9-8ED8-564DD0DC4EA0"
},
{
"vulnerable": true,
@ -335,8 +477,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:mindsphere:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2021-12-11",
"matchCriteriaId": "6423B1A7-F09F-421A-A0AC-3059CB89B110"
"versionEndExcluding": "2021-12-16",
"matchCriteriaId": "25FADB1B-988D-4DB9-9138-7542AFDEB672"
},
{
"vulnerable": true,
@ -352,8 +494,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:opcenter_intelligence:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.2",
"matchCriteriaId": "C74B9880-FFF9-48CA-974F-54FB80F30D2D"
"versionStartIncluding": "3.2",
"versionEndExcluding": "3.5",
"matchCriteriaId": "C07AFA19-21AE-4C7E-AA95-69599834C0EC"
},
{
"vulnerable": true,
@ -373,18 +516,10 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:siguard_dsa:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "00E03FB6-37F9-4559-8C86-F203D6782920"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:siguard_dsa:4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "90439591-BA01-4007-A2B6-B316548D4595"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:siguard_dsa:4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E1F3B8B4-4D1B-4913-BD5F-1A04B47F829A"
"criteria": "cpe:2.3:a:siemens:siguard_dsa:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.2",
"versionEndExcluding": "4.4.1",
"matchCriteriaId": "9A4B950B-4527-491B-B111-046DB1CCC037"
},
{
"vulnerable": true,
@ -521,6 +656,16 @@
"criteria": "cpe:2.3:a:siemens:vesys:2019.1:sp1912:*:*:*:*:*:*",
"matchCriteriaId": "18BBEF7C-F686-4129-8EE9-0F285CE38845"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:vesys:2020.1:-:*:*:*:*:*:*",
"matchCriteriaId": "264C7817-0CD5-4370-BC39-E1DF3E932E16"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:vesys:2021.1:-:*:*:*:*:*:*",
"matchCriteriaId": "C7442C42-D493-46B9-BCC2-2C62EAD5B945"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:xpedition_enterprise:-:*:*:*:*:*:*:*",
@ -541,11 +686,6 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:audio_development_kit:-:*:*:*:*:*:*:*",
"matchCriteriaId": "099344DD-8AEE-49A0-88A8-691A8A1E651F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:computer_vision_annotation_tool:-:*:*:*:*:*:*:*",
@ -553,9 +693,9 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:data_center_manager:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:intel:datacenter_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.1",
"matchCriteriaId": "8555F365-2BFD-4A0A-A7D0-1459241758B3"
"matchCriteriaId": "EAD1E1F3-F06B-4D17-8854-2CDA7E6D872D"
},
{
"vulnerable": true,
@ -572,16 +712,6 @@
"criteria": "cpe:2.3:a:intel:secure_device_onboard:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22BEE177-D117-478C-8EAD-9606DEDF9FD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:sensor_solution_firmware_development_kit:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F021E2E7-0D8F-4336-82A6-77E521347C4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:system_debugger:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F66B0A2-22C0-41D5-B866-1764DEC12CB2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:system_studio:-:*:*:*:*:*:*:*",
@ -645,8 +775,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sonicwall:email_security:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.12",
"matchCriteriaId": "B5BAA8A5-74B3-48EB-8287-302927197A4E"
"versionEndExcluding": "10.0.13",
"matchCriteriaId": "CA7D45EF-18F7-43C6-9B51-ABAB7B0CA3CD"
}
]
}
@ -673,6 +803,11 @@
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:brocade_san_navigator:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25FA7A4D-B0E2-423E-8146-E221AE2D6120"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:cloud_insights:-:*:*:*:*:*:*:*",
@ -702,6 +837,16 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "F3A48D58-4291-4D3C-9CEA-BF12183468A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:solidfire_\\&_hci_storage_node:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D452B464-1200-4B72-9A89-42DC58486191"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:solidfire_enterprise_sds:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D18075A-E8D6-48B8-A7FA-54E336A434A2"
}
]
}
@ -2338,14 +2483,14 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:bentley:synchro:*:*:*:*:pro:*:*:*",
"versionStartIncluding": "6.1",
"versionEndExcluding": "6.4.3.2",
"matchCriteriaId": "8CD3B3D3-CC14-4278-9914-F7C6E86D3119"
"versionEndExcluding": "6.2.4.2",
"matchCriteriaId": "452D8730-F273-4AB4-9221-E82EC2CAAFD8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bentley:synchro_4d:*:*:*:*:pro:*:*:*",
"versionEndExcluding": "6.2.4.2",
"matchCriteriaId": "0C5D6BF7-A818-4C7D-A305-91EB622271AC"
"versionEndExcluding": "6.4.3.2",
"matchCriteriaId": "F2EF5054-EECB-4489-B27A-AACB96B25B97"
}
]
}
@ -2456,7 +2601,8 @@
"source": "security@apache.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
"VDB Entry",
"Broken Link"
]
},
{
@ -2919,7 +3065,8 @@
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
"VDB Entry",
"Broken Link"
]
},
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-0316",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-01-23T15:15:13.703",
"lastModified": "2024-11-21T06:38:21.753",
"lastModified": "2025-04-03T20:15:16.417",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-20492",
"sourceIdentifier": "security@android.com",
"published": "2023-01-26T21:15:27.833",
"lastModified": "2024-11-21T06:42:55.050",
"lastModified": "2025-04-03T20:15:16.587",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-770"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-20493",
"sourceIdentifier": "security@android.com",
"published": "2023-01-26T21:15:28.060",
"lastModified": "2024-11-21T06:42:55.163",
"lastModified": "2025-04-03T20:15:16.793",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-1284"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1284"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-20494",
"sourceIdentifier": "security@android.com",
"published": "2023-01-26T21:15:28.293",
"lastModified": "2024-11-21T06:42:55.277",
"lastModified": "2025-04-03T21:15:37.523",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-770"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3100",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-01-18T17:15:10.173",
"lastModified": "2024-11-21T07:18:49.680",
"lastModified": "2025-04-03T20:15:17.363",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,13 +36,33 @@
},
"exploitabilityScore": 1.6,
"impactScore": 4.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3806",
"sourceIdentifier": "vulnerabilities@zephyrproject.org",
"published": "2023-01-25T02:01:19.820",
"lastModified": "2024-11-21T07:20:16.320",
"lastModified": "2025-04-03T20:15:17.550",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41082",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-03T01:15:08.843",
"lastModified": "2025-03-07T16:15:36.047",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T20:53:33.510",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -144,11 +144,17 @@
},
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2022-41082-microsoft-exchange-server-remote-code-execution-vulnerability-detection-script",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2022-41082-microsoft-exchange-server-remote-code-execution-vulnerability-mitigation-script",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4235",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-01-18T22:15:10.537",
"lastModified": "2024-11-21T07:34:50.750",
"lastModified": "2025-04-03T20:15:17.933",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4305",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-01-23T15:15:14.283",
"lastModified": "2024-11-21T07:34:58.757",
"lastModified": "2025-04-03T20:15:18.120",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4485",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-01-23T15:15:14.937",
"lastModified": "2024-11-21T07:35:21.500",
"lastModified": "2025-04-03T20:15:18.280",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4542",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-01-23T15:15:15.070",
"lastModified": "2024-11-21T07:35:27.390",
"lastModified": "2025-04-03T20:15:18.443",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4545",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-01-23T15:15:15.137",
"lastModified": "2024-11-21T07:35:27.730",
"lastModified": "2025-04-03T20:15:18.597",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4650",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-01-23T15:15:15.843",
"lastModified": "2024-11-21T07:35:40.313",
"lastModified": "2025-04-03T20:15:18.753",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4715",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-01-23T15:15:16.323",
"lastModified": "2024-11-21T07:35:47.310",
"lastModified": "2025-04-03T20:15:18.930",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4718",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-01-23T15:15:17.017",
"lastModified": "2024-11-21T07:35:48.173",
"lastModified": "2025-04-03T20:15:19.097",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4753",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-01-23T15:15:17.447",
"lastModified": "2024-11-21T07:35:52.520",
"lastModified": "2025-04-03T20:15:19.260",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4775",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-01-23T15:15:17.733",
"lastModified": "2024-11-21T07:35:55.117",
"lastModified": "2025-04-03T20:15:19.420",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-48126",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-20T15:15:16.003",
"lastModified": "2024-11-21T07:32:53.563",
"lastModified": "2025-04-03T21:15:37.700",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-48191",
"sourceIdentifier": "security@trendmicro.com",
"published": "2023-01-20T07:15:12.010",
"lastModified": "2024-11-21T07:32:57.027",
"lastModified": "2025-04-03T20:15:17.747",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-367"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-367"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0040",
"sourceIdentifier": "cve@forums.swift.org",
"published": "2023-01-18T19:15:11.163",
"lastModified": "2024-11-21T07:36:26.600",
"lastModified": "2025-04-03T20:15:19.573",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -59,6 +79,16 @@
"value": "CWE-74"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0126",
"sourceIdentifier": "PSIRT@sonicwall.com",
"published": "2023-01-19T20:15:10.850",
"lastModified": "2024-11-21T07:36:36.320",
"lastModified": "2025-04-03T20:15:19.763",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0164",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-01-18T22:15:10.597",
"lastModified": "2024-11-21T07:36:40.150",
"lastModified": "2025-04-03T20:15:19.967",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0242",
"sourceIdentifier": "cve@rapid7.com",
"published": "2023-01-18T21:15:11.093",
"lastModified": "2024-11-21T07:36:49.083",
"lastModified": "2025-04-03T20:15:20.143",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0290",
"sourceIdentifier": "cve@rapid7.com",
"published": "2023-01-18T22:15:10.647",
"lastModified": "2024-11-21T07:36:54.347",
"lastModified": "2025-04-03T20:15:20.340",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
@ -59,6 +79,16 @@
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0396",
"sourceIdentifier": "vulnerabilities@zephyrproject.org",
"published": "2023-01-25T02:02:06.200",
"lastModified": "2024-11-21T07:37:06.553",
"lastModified": "2025-04-03T20:15:20.587",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0444",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2023-01-26T21:18:08.363",
"lastModified": "2024-11-21T07:37:11.570",
"lastModified": "2025-04-03T20:15:20.780",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20198",
"sourceIdentifier": "psirt@cisco.com",
"published": "2023-10-16T16:15:10.023",
"lastModified": "2024-11-21T07:40:48.700",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T20:54:08.693",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20904",
"sourceIdentifier": "security@android.com",
"published": "2023-01-26T21:18:10.987",
"lastModified": "2024-11-21T07:41:47.513",
"lastModified": "2025-04-03T21:15:37.883",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20905",
"sourceIdentifier": "security@android.com",
"published": "2023-01-26T21:18:11.047",
"lastModified": "2024-11-21T07:41:47.690",
"lastModified": "2025-04-03T21:15:38.050",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20908",
"sourceIdentifier": "security@android.com",
"published": "2023-01-26T21:18:11.117",
"lastModified": "2024-11-21T07:41:47.917",
"lastModified": "2025-04-03T21:15:38.220",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-400"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-22339",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-01-20T03:15:10.770",
"lastModified": "2024-11-21T07:44:35.593",
"lastModified": "2025-04-03T20:15:21.440",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-22366",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-01-17T10:15:11.943",
"lastModified": "2024-11-21T07:44:38.497",
"lastModified": "2025-04-03T20:15:21.643",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-824"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-824"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-22373",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-01-20T03:15:10.937",
"lastModified": "2024-11-21T07:44:39.200",
"lastModified": "2025-04-03T20:15:21.867",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23488",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2023-01-20T18:15:10.470",
"lastModified": "2024-11-21T07:46:17.217",
"lastModified": "2025-04-03T20:15:22.187",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23489",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2023-01-20T18:15:10.530",
"lastModified": "2024-11-21T07:46:17.330",
"lastModified": "2025-04-03T20:15:22.350",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23490",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2023-01-20T19:15:18.440",
"lastModified": "2024-11-21T07:46:17.440",
"lastModified": "2025-04-03T20:15:22.517",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23491",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2023-01-20T19:15:18.493",
"lastModified": "2024-11-21T07:46:17.540",
"lastModified": "2025-04-03T20:15:22.710",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23492",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2023-01-20T19:15:18.543",
"lastModified": "2024-11-21T07:46:17.650",
"lastModified": "2025-04-03T20:15:22.913",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23749",
"sourceIdentifier": "security@joomla.org",
"published": "2023-01-17T20:15:11.983",
"lastModified": "2024-11-21T07:46:45.430",
"lastModified": "2025-04-03T20:15:23.100",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-74"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26083",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-06T16:15:07.843",
"lastModified": "2025-02-03T15:15:15.960",
"vulnStatus": "Modified",
"lastModified": "2025-04-03T20:07:55.157",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44487",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-10T14:15:10.883",
"lastModified": "2025-03-07T19:15:36.157",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T20:26:45.303",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -2990,11 +2990,19 @@
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/10/6",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/10/7",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/13/4",
@ -3040,7 +3048,8 @@
"url": "http://www.openwall.com/lists/oss-security/2023/10/20/8",
"source": "cve@mitre.org",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
@ -3373,7 +3382,10 @@
},
{
"url": "https://github.com/grpc/grpc/releases/tag/v1.59.2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://github.com/h2o/h2o/pull/3291",
@ -3626,87 +3638,150 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html",
@ -4024,7 +4099,8 @@
"url": "http://www.openwall.com/lists/oss-security/2023/10/20/8",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20439",
"sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-04T17:15:13.210",
"lastModified": "2025-04-01T22:15:20.950",
"vulnStatus": "Modified",
"lastModified": "2025-04-03T20:58:41.483",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-45198",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-03T20:15:23.363",
"lastModified": "2025-04-03T20:15:23.363",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "insightsoftware Spark JDBC 2.6.21 has a remote code execution vulnerability. Attackers can inject malicious parameters into the JDBC URL, triggering JNDI injection during the process when the JDBC Driver uses this URL to connect to the database. This can further lead to remote code execution."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/azraelxuemo/ef11311ae0633cbd3d794f73c64e3877",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-45199",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-03T21:15:38.400",
"lastModified": "2025-04-03T21:15:38.400",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "insightsoftware Hive JDBC through 2.6.13 has a remote code execution vulnerability. Attackers can inject malicious parameters into the JDBC URL, triggering JNDI injection during the process when the JDBC Driver uses this URL to connect to the database. This can further lead to remote code execution."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/azraelxuemo/d019ad079d540ef28870dbd9552a7c62",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-47212",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-03T21:15:38.523",
"lastModified": "2025-04-03T21:15:38.523",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Iglu Server 0.13.0 and below. It involves sending very large payloads to a particular API endpoint of Iglu Server and can render it completely unresponsive. If the operation of Iglu Server is not restored, event processing in the pipeline would eventually halt."
}
],
"metrics": {},
"references": [
{
"url": "https://support.snowplow.io/hc/en-us/articles/26318139354909-Update-Critical-Snowplow-Security-Updates-Impact-on-Open-Source-Software-Users",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-47213",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-03T21:15:38.647",
"lastModified": "2025-04-03T21:15:38.647",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered affecting Enrich 5.1.0 and below. It involves sending a maliciously crafted Snowplow event to the pipeline. Upon receiving this event and trying to validate it, Enrich crashes and attempts to restart indefinitely. As a result, event processing would be halted."
}
],
"metrics": {},
"references": [
{
"url": "https://support.snowplow.io/hc/en-us/articles/26318139354909-Update-Critical-Snowplow-Security-Updates-Impact-on-Open-Source-Software-Users",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-47214",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-03T21:15:38.760",
"lastModified": "2025-04-03T21:15:38.760",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Iglu Server 0.13.0 and below. It is similar to CVE-2024-47212, but involves a different kind of malicious payload. As above, it can render Iglu Server completely unresponsive. If the operation of Iglu Server is not restored, event processing in the pipeline would eventually halt."
}
],
"metrics": {},
"references": [
{
"url": "https://support.snowplow.io/hc/en-us/articles/26318139354909-Update-Critical-Snowplow-Security-Updates-Impact-on-Open-Source-Software-Users",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-47215",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-03T21:15:38.873",
"lastModified": "2025-04-03T21:15:38.873",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Snowbridge setups sending data to Google Tag Manager Server Side. It involves attaching an invalid GTM SS preview header to events, causing them to be retried indefinitely. As a result, the performance of forwarding events to GTM SS overall can be affected (latency, throughput)."
}
],
"metrics": {},
"references": [
{
"url": "https://support.snowplow.io/hc/en-us/articles/26318139354909-Update-Critical-Snowplow-Security-Updates-Impact-on-Open-Source-Software-Users",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-47217",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-03T21:15:38.983",
"lastModified": "2025-04-03T21:15:38.983",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Iglu Server 0.13.0 and below. It is similar to CVE-2024-47214, but involves an authenticated endpoint. It can render Iglu Server completely unresponsive. If the operation of Iglu Server is not restored, event processing in the pipeline would eventually halt."
}
],
"metrics": {},
"references": [
{
"url": "https://support.snowplow.io/hc/en-us/articles/26318139354909-Update-Critical-Snowplow-Security-Updates-Impact-on-Open-Source-Software-Users",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51567",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-29T23:15:04.307",
"lastModified": "2025-02-05T20:15:44.913",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T20:40:23.433",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-56528",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-03T21:15:39.100",
"lastModified": "2025-04-03T21:15:39.100",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This vulnerability affects Snowplow Collector 3.x before 3.3.0 (unless it\u2019s set up behind a reverse proxy that establishes payload limits). It involves sending very large payloads to the Collector and can render it unresponsive to the rest of the requests. As a result, data would not enter the pipeline and would be potentially lost."
}
],
"metrics": {},
"references": [
{
"url": "https://support.snowplow.io/hc/en-us/articles/26318139354909-Update-Critical-Snowplow-Security-Updates-Impact-on-Open-Source-Software-Users",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,16 +2,43 @@
"id": "CVE-2025-1805",
"sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"published": "2025-04-02T13:15:40.927",
"lastModified": "2025-04-02T14:58:07.527",
"lastModified": "2025-04-03T20:15:23.610",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Crypt::Salt for Perl version 0.01 uses insecure rand() function when generating salts for cryptographic purposes."
},
{
"lang": "es",
"value": "Crypt::Salt para Perl versi\u00f3n 0.01 utiliza la funci\u00f3n insegura rand () al generar sales para fines criptogr\u00e1ficos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21333",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-01-14T18:15:58.530",
"lastModified": "2025-03-07T17:15:21.473",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T20:58:48.423",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -136,11 +136,19 @@
},
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-21333-elevated-privilege-exposure-in-windows-hyper-v-by-microsoft-detection-script",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-21333-elevated-privilege-exposure-in-windows-hyper-v-by-microsoft-mitigation-script",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-24095",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:16.117",
"lastModified": "2025-04-01T20:26:22.890",
"lastModified": "2025-04-03T21:15:39.227",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with additional entitlement checks. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4. An app may be able to bypass Privacy preferences."
},
{
"lang": "es",
"value": "Este problema se solucion\u00f3 con comprobaciones de derechos adicionales. Este problema est\u00e1 corregido en visionOS 2.4, iOS 18.4 y iPadOS 18.4. Es posible que una aplicaci\u00f3n pueda omitir las preferencias de privacidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-288"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",

View File

@ -2,16 +2,59 @@
"id": "CVE-2025-24216",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:19.593",
"lastModified": "2025-04-01T20:26:22.890",
"lastModified": "2025-04-03T21:15:39.373",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.4, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, Safari 18.4. Processing maliciously crafted web content may lead to an unexpected Safari crash."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 mejorando la gesti\u00f3n de la memoria. Este problema est\u00e1 corregido en visionOS 2.4, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 y iPadOS 18.4, macOS Sequoia 15.4 y Safari 18.4. El procesamiento de contenido web malintencionado puede provocar un bloqueo inesperado de Safari."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-508"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24813",
"sourceIdentifier": "security@apache.org",
"published": "2025-03-10T17:15:35.067",
"lastModified": "2025-04-02T22:15:18.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T20:59:51.680",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -484,6 +484,21 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
}
]
}
]
}
],
"references": [
@ -504,19 +519,32 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2025/04/msg00003.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20250321-0001/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-24813-detect-apache-tomcat-rce",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-24813-mitigate-apache-tomcat-rce",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/absholi7ly/POC-CVE-2025-24813/blob/main/README.md",

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-26817",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-03T20:15:23.837",
"lastModified": "2025-04-03T20:15:23.837",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Netwrix Password Secure 9.2.0.32454 allows OS command injection."
}
],
"metrics": {},
"references": [
{
"url": "https://helpcenter.netwrix.com/bundle/PasswordSecure_9.2_ReleaseNotes/resource/Netwrix_PasswordSecure_9.2_BugFixList.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://security.netwrix.com/advisories/adv-2025-009",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-26818",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-03T20:15:23.980",
"lastModified": "2025-04-03T20:15:23.980",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Netwrix Password Secure through 9.2 allows command injection."
}
],
"metrics": {},
"references": [
{
"url": "https://helpcenter.netwrix.com/bundle/PasswordSecure_9.2_ReleaseNotes/resource/Netwrix_PasswordSecure_9.2_BugFixList.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://security.netwrix.com/advisories/adv-2025-009",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-26852",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-20T20:15:32.497",
"lastModified": "2025-04-01T20:25:45.290",
"vulnStatus": "Analyzed",
"lastModified": "2025-04-03T21:15:39.520",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,26 +36,6 @@
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-26853",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-20T20:15:32.640",
"lastModified": "2025-04-01T20:25:34.267",
"vulnStatus": "Analyzed",
"lastModified": "2025-04-03T21:15:39.683",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,26 +36,6 @@
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-29064",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-03T20:15:24.117",
"lastModified": "2025-04-03T20:15:24.117",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in TOTOLINK x18 v.9.1.0cu.2024_B20220329 allows a remote attacker to execute arbitrary code via the sub_410E54 function of the cstecgi.cgi."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/kn0sky/cve/blob/main/TOTOLINK%20X18/OS%20Command%20Injection%20setLanguageCfg_lang.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-29069",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-01T20:15:17.607",
"lastModified": "2025-04-02T13:15:44.570",
"lastModified": "2025-04-03T20:15:24.247",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
@ -16,6 +16,10 @@
{
"lang": "en",
"value": "A heap buffer overflow vulnerability has been identified in the lcms2-2.16. The vulnerability exists in the UnrollChunkyBytes function in cmspack.c, which is responsible for handling color space transformations. NOTE: this is disputed by the Supplier because the finding identified a bug in a third-party calling program, not in lcms."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad de desbordamiento del b\u00fafer de mont\u00f3n en lcms2-2.16. Esta vulnerabilidad se encuentra en la funci\u00f3n UnrollChunkyBytes de cmspack.c, responsable de gestionar las transformaciones del espacio de color."
}
],
"metrics": {},
@ -27,6 +31,10 @@
{
"url": "https://github.com/mm2/Little-CMS/issues/476#issuecomment-2696670843",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/mm2/Little-CMS/issues/476#issuecomment-2770644813",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-29462",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-03T20:15:24.383",
"lastModified": "2025-04-03T20:15:24.383",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow vulnerability has been discovered in Tenda Ac15 V15.13.07.13. The vulnerability occurs when the webCgiGetUploadFile function calls the socketRead function to process HTTP request messages, resulting in the overwriting of a buffer on the stack."
}
],
"metrics": {},
"references": [
{
"url": "https://hackmd.io/@7QWW9EKUSNGgPWZNOHkL2w/Sk4xbvejyx",
"source": "cve@mitre.org"
}
]
}

Some files were not shown because too many files have changed in this diff Show More