diff --git a/CVE-2013/CVE-2013-45xx/CVE-2013-4511.json b/CVE-2013/CVE-2013-45xx/CVE-2013-4511.json index 8f7b2ea5a67..29a2c0891b9 100644 --- a/CVE-2013/CVE-2013-45xx/CVE-2013-4511.json +++ b/CVE-2013/CVE-2013-45xx/CVE-2013-4511.json @@ -2,8 +2,8 @@ "id": "CVE-2013-4511", "sourceIdentifier": "secalert@redhat.com", "published": "2013-11-12T14:35:12.197", - "lastModified": "2023-02-13T04:47:04.380", - "vulnStatus": "Modified", + "lastModified": "2023-12-15T15:48:43.767", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -63,1443 +63,30 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndIncluding": "3.11.7", - "matchCriteriaId": "74676759-D357-4224-9C07-7FCAB195A0CD" + "versionStartIncluding": "2.6.12", + "versionEndExcluding": "3.2.53", + "matchCriteriaId": "43911295-AEFA-4B19-89E9-48D2A2B613E0" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*", - "matchCriteriaId": "D30AEC07-3CBD-4F4F-9646-BEAA1D98750B" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.3", + "versionEndExcluding": "3.4.69", + "matchCriteriaId": "F1C3B911-4978-48C7-AFF7-8C938606D108" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*", - "matchCriteriaId": "C2AA8E68-691B-499C-AEDD-3C0BFFE70044" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.5", + "versionEndExcluding": "3.10.19", + "matchCriteriaId": "42C255A0-67F5-4C50-B054-2C005D650CA3" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*", - "matchCriteriaId": "9440475B-5960-4066-A204-F30AAFC87846" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*", - "matchCriteriaId": "53BCFBFB-6AF0-4525-8623-7633CC5E17DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*", - "matchCriteriaId": "6ED4E86A-74F0-436A-BEB4-3F4EE93A5421" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*", - "matchCriteriaId": "BF0365B0-8E16-4F30-BD92-5DD538CC8135" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*", - "matchCriteriaId": "079505E8-2942-4C33-93D1-35ADA4C39E72" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "38989541-2360-4E0A-AE5A-3D6144AA6114" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "4E51646B-7A0E-40F3-B8C9-239C1DA81DD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "42A8A507-F8E2-491C-A144-B2448A1DB26E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "901FC6F3-2C2A-4112-AE27-AB102BBE8DEE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "203AD334-DB9F-41B0-A4D1-A6C158EF8C40" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "B3611753-E440-410F-8250-600C996A4B8E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "9739BB47-EEAF-42F1-A557-2AE2EA9526A3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "5A95E3BB-0AFC-4C2E-B9BE-C975E902A266" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "482A6C9A-9B8E-4D1C-917A-F16370745E7C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*", - "matchCriteriaId": "C6D87357-63E0-41D0-9F02-1BCBF9A77E63" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*", - "matchCriteriaId": "3765A2D6-2D78-4FB1-989E-D5106BFA3F5E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*", - "matchCriteriaId": "F54257DB-7023-43C4-AC4D-9590B815CD92" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*", - "matchCriteriaId": "61FF5FCD-A4A1-4803-AC53-320A4C838AF6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*", - "matchCriteriaId": "9F096553-064F-46A2-877B-F32F163A0F49" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*", - "matchCriteriaId": "C0D762D1-E3AD-40EA-8D39-83EEB51B5E85" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*", - "matchCriteriaId": "A6187D19-7148-4B87-AD7E-244FF9EE0FA6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*", - "matchCriteriaId": "99AC64C2-E391-485C-9CD7-BA09C8FA5E63" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*", - "matchCriteriaId": "8CDA5E95-7805-441B-BEF7-4448EA45E964" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*", - "matchCriteriaId": "51561053-6C28-4F38-BC9B-3F7A7508EB72" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*", - "matchCriteriaId": "118F4A5B-C498-4FC3-BE28-50D18EBE4F22" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*", - "matchCriteriaId": "BD38EBE6-FE1A-4B55-9FB5-07952253B7A5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*", - "matchCriteriaId": "3A491E47-82AD-4055-9444-2EC0D6715326" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*", - "matchCriteriaId": "13C5FD16-23B6-467F-9438-5B554922F974" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*", - "matchCriteriaId": "9C67235F-5B51-4BF7-89EC-4810F720246F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*", - "matchCriteriaId": "08405DEF-05F4-45F0-AC95-DBF914A36D93" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*", - "matchCriteriaId": "1A7B9C4B-4A41-4175-9F07-191C1EE98C1F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*", - "matchCriteriaId": "B306E0A8-4D4A-4895-8128-A500D30A7E0C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*", - "matchCriteriaId": "295C839A-F34E-4853-A926-55EABC639412" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*", - "matchCriteriaId": "2AFD5F49-7EF9-4CFE-95BD-8FD19B500B0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*", - "matchCriteriaId": "00B3DDDD-B2F6-4753-BA38-65A24017857D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*", - "matchCriteriaId": "33FCD39E-F4BF-432D-9CF9-F195CF5844F3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*", - "matchCriteriaId": "C7308690-CB0D-4758-B80F-D2ADCD2A9D66" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*", - "matchCriteriaId": "313A470B-8A2B-478A-82B5-B27D2718331C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*", - "matchCriteriaId": "83FF021E-07E3-41CC-AAE8-D99D7FF24B9D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*", - "matchCriteriaId": "F72412E3-8DA9-4CC9-A426-B534202ADBA4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*", - "matchCriteriaId": "FCAA9D7A-3C3E-4C0B-9D38-EA80E68C2E46" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*", - "matchCriteriaId": "4A9E3AE5-3FCF-4CBB-A30B-082BCFBFB0CB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*", - "matchCriteriaId": "CF715657-4C3A-4392-B85D-1BBF4DE45D89" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*", - "matchCriteriaId": "4B63C618-AC3D-4EF7-AFDF-27B9BF482B78" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*", - "matchCriteriaId": "C33DA5A9-5E40-4365-9602-82FB4DCD15B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*", - "matchCriteriaId": "EFAFDB74-40BD-46FA-89AC-617EB2C7160B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*", - "matchCriteriaId": "CF5F17DA-30A7-40CF-BD7C-CEDF06D64617" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*", - "matchCriteriaId": "71A276F5-BD9D-4C1B-90DF-9B0C15B6F7DF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*", - "matchCriteriaId": "F8F6EBEC-3C29-444B-BB85-6EF239B59EC1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.45:*:*:*:*:*:*:*", - "matchCriteriaId": "FDB91302-FD18-44CF-A8A8-B31483328539" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.46:*:*:*:*:*:*:*", - "matchCriteriaId": "9B81DC2B-46FA-4640-AD6C-2A404D94BA0B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.47:*:*:*:*:*:*:*", - "matchCriteriaId": "BA6A1663-BC4C-4FC9-B5EB-A52EDED17B26" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.48:*:*:*:*:*:*:*", - "matchCriteriaId": "69C33D6C-6B9F-49F4-B505-E7B589CDEC50" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.49:*:*:*:*:*:*:*", - "matchCriteriaId": "C464796B-2F31-4159-A132-82A0C74137B7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.50:*:*:*:*:*:*:*", - "matchCriteriaId": "1D6C6E46-FE29-4D2D-A0EC-43DA5112BCC3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.51:*:*:*:*:*:*:*", - "matchCriteriaId": "1A370E91-73A1-4D62-8E7B-696B920203F8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.52:*:*:*:*:*:*:*", - "matchCriteriaId": "340197CD-9645-4B7E-B976-F3F5A7D4C5BE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.53:*:*:*:*:*:*:*", - "matchCriteriaId": "96030636-0C4A-4A10-B768-525D6A0E18CB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.54:*:*:*:*:*:*:*", - "matchCriteriaId": "A42D8419-914F-4AD6-B0E9-C1290D514FF1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.55:*:*:*:*:*:*:*", - "matchCriteriaId": "F4E2C88B-42EA-4F4F-B1F6-A9332EC6888B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.56:*:*:*:*:*:*:*", - "matchCriteriaId": "2449D13B-3314-4182-832F-03F6B11AA31F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.57:*:*:*:*:*:*:*", - "matchCriteriaId": "9A35B66C-F050-4462-A58E-FEE061B5582E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.58:*:*:*:*:*:*:*", - "matchCriteriaId": "1B551164-0167-49BB-A3AE-4034BDA3DCB4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.59:*:*:*:*:*:*:*", - "matchCriteriaId": "7244278E-49B6-4405-A14C-F3540C8F5AF8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.60:*:*:*:*:*:*:*", - "matchCriteriaId": "B4C3E4B8-7274-4ABB-B7CE-6A39C183CE18" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.61:*:*:*:*:*:*:*", - "matchCriteriaId": "6501EDB9-4847-47F8-90EE-B295626E4CDC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.62:*:*:*:*:*:*:*", - "matchCriteriaId": "2D676D48-7521-45E2-8563-6B966FF86A35" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.63:*:*:*:*:*:*:*", - "matchCriteriaId": "3B69FA17-0AB9-4986-A5A7-2A4C1DD24222" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.64:*:*:*:*:*:*:*", - "matchCriteriaId": "7BC35593-96C7-41F0-B738-1568F8129121" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.65:*:*:*:*:*:*:*", - "matchCriteriaId": "38D23794-0E7C-4FA5-A7A8-CF940E3FA962" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.66:*:*:*:*:*:*:*", - "matchCriteriaId": "008E1E7D-4C20-4560-9288-EF532ADB0029" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.67:*:*:*:*:*:*:*", - "matchCriteriaId": "3B3A7044-A92E-47A9-A7BD-35E5B575F5FD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.68:*:*:*:*:*:*:*", - "matchCriteriaId": "783E2980-B6AB-489E-B157-B6A2E10A32CA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3DFFE5A6-6A67-4992-84A3-C0F05FACDEAD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*", - "matchCriteriaId": "13BBD2A3-AE10-48B9-8776-4FB1CAC37D44" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*", - "matchCriteriaId": "B25680CC-8918-4F27-8D7E-A6579215450B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*", - "matchCriteriaId": "92C48B4C-410C-4BA8-A28A-B2E928320FCC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*", - "matchCriteriaId": "CB447523-855B-461E-8197-95169BE86EB0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B155BBDF-6DF6-4FF5-9C41-D8A5266DCC67" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "28476DEC-9630-4B40-9D4D-9BC151DC4CA4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "5646880A-2355-4BDD-89E7-825863A0311F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7FF99148-267A-46F8-9927-A9082269BAF6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "A783C083-5D9C-48F9-B5A6-A97A9604FB19" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "2B817A24-03AC-46CD-BEFA-505457FD2A5D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*", - "matchCriteriaId": "51CF1BCE-090E-4B70-BA16-ACB74411293B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*", - "matchCriteriaId": "187AAD67-10D7-4B57-B4C6-00443E246AF3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*", - "matchCriteriaId": "F341CE88-C5BC-4CDD-9CB5-B6BAD7152E63" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*", - "matchCriteriaId": "37ACE2A6-C229-4236-8E9F-235F008F3AA0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "D3220B70-917F-4F9F-8A3B-2BF581281E8D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:x86:*", - "matchCriteriaId": "7D47A395-821D-4BFF-996E-E849D9A40217" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*", - "matchCriteriaId": "99372D07-C06A-41FA-9843-6D57F99AB5AF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*", - "matchCriteriaId": "2B9DC110-D260-4DB4-B8B0-EF1D160ADA07" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*", - "matchCriteriaId": "6192FE84-4D53-40D4-AF61-78CE7136141A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*", - "matchCriteriaId": "42FEF3CF-1302-45EB-89CC-3786FE4BAC1F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*", - "matchCriteriaId": "AE6A6B58-2C89-4DE4-BA57-78100818095C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*", - "matchCriteriaId": "1D467F87-2F13-4D26-9A93-E0BA526FEA24" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FE348F7B-02DE-47D5-8011-F83DA9426021" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:x86:*", - "matchCriteriaId": "8A603291-33B4-4195-B52D-D2A9938089C1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E91594EA-F0A3-41B3-A9C6-F7864FC2F229" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "9E1ECCDB-0208-48F6-B44F-16CC0ECE3503" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "FBA8B5DE-372E-47E0-A0F6-BE286D509CC3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "9A1CA083-2CF8-45AE-9E15-1AA3A8352E3B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*", - "matchCriteriaId": "19D69A49-5290-4C5F-8157-719AD58D253D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*", - "matchCriteriaId": "290BD969-42E7-47B0-B21B-06DE4865432C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*", - "matchCriteriaId": "23A9E29E-DE78-4C73-9FBD-C2410F5FC8B8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*", - "matchCriteriaId": "018434C9-E75F-45CB-A169-DAB4B1D864D7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*", - "matchCriteriaId": "DC0AC68F-EC58-4C4F-8CBC-A59ECC00CCDE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*", - "matchCriteriaId": "C123C844-F6D7-471E-A62E-F756042FB1CD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*", - "matchCriteriaId": "A11C38BB-7FA2-49B0-AAC9-83DB387A06DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*", - "matchCriteriaId": "61F3733C-E5F6-4855-B471-DF3FB823613B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*", - "matchCriteriaId": "1DDCA75F-9A06-4457-9A45-38A38E7F7086" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*", - "matchCriteriaId": "7AEA837E-7864-4003-8DB7-111ED710A7E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*", - "matchCriteriaId": "B6FE471F-2D1F-4A1D-A197-7E46B75787E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA9E6AB-58DC-4EC5-A25C-11F9D0B38BF7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*", - "matchCriteriaId": "DC6B8DB3-B05B-41A2-B091-342D66AAE8F5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*", - "matchCriteriaId": "958F0FF8-33EF-4A71-A0BD-572C85211DBA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*", - "matchCriteriaId": "FBA39F48-B02F-4C48-B304-DA9CCA055244" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*", - "matchCriteriaId": "1FF841F3-48A7-41D7-9C45-A8170435A5EB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*", - "matchCriteriaId": "EF506916-A6DC-4B1E-90E5-959492AF55F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*", - "matchCriteriaId": "B3CDAD1F-2C6A-48C0-8FAB-C2659373FA25" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*", - "matchCriteriaId": "4FFE4B22-C96A-43D0-B993-F51EDD9C5E0E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*", - "matchCriteriaId": "F571CC8B-B212-4553-B463-1DB01D616E8A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*", - "matchCriteriaId": "84E3E151-D437-48ED-A529-731EEFF88567" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*", - "matchCriteriaId": "E9E3EA3C-CCA5-4433-86E0-3D02C4757A0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*", - "matchCriteriaId": "F7AC4F7D-9FA6-4CF1-B2E9-70BF7D4D177C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*", - "matchCriteriaId": "3CE3A80D-9648-43CC-8F99-D741ED6552BF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*", - "matchCriteriaId": "C8A98C03-A465-41B4-A551-A26FEC7FFD94" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AFB76697-1C2F-48C0-9B14-517EC053D4B3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*", - "matchCriteriaId": "BED88DFD-1DC5-4505-A441-44ECDEF0252D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*", - "matchCriteriaId": "DBFD2ACD-728A-4082-BB6A-A1EF6E58E47D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*", - "matchCriteriaId": "C31B0E51-F62D-4053-B04F-FC4D5BC373D2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*", - "matchCriteriaId": "A914303E-1CB6-4AAD-9F5F-DE5433C4E814" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*", - "matchCriteriaId": "203BBA69-90B2-4C5E-8023-C14180742421" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*", - "matchCriteriaId": "0DBFAB53-B889-4028-AC0E-7E165B152A18" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*", - "matchCriteriaId": "FE409AEC-F677-4DEF-8EB7-2C35809043CE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "578EC12B-402F-4AD4-B8F8-C9B2CAB06891" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "877002ED-8097-4BB4-BB88-6FC6306C38B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "76294CE3-D72C-41D5-9E0F-B693D0042699" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "916E97D4-1FAB-42F5-826B-653B1C0909A8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*", - "matchCriteriaId": "33FD2217-C5D0-48C1-AD74-3527127FEF9C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*", - "matchCriteriaId": "2E92971F-B629-4E0A-9A50-8B235F9704B8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*", - "matchCriteriaId": "EDD3A069-3829-4EE2-9D5A-29459F29D4C1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*", - "matchCriteriaId": "A4A0964C-CEB2-41D7-A69C-1599B05B6171" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "0F960FA6-F904-4A4E-B483-44C70090E9A1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:x86:*", - "matchCriteriaId": "8C3D9C66-933A-469E-9073-75015A8AD17D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*", - "matchCriteriaId": "261C1B41-C9E0-414F-8368-51C0C0B8AD38" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:x86:*", - "matchCriteriaId": "C92F29A0-DEFF-49E4-AE86-5DBDAD51C677" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*", - "matchCriteriaId": "5CCA261D-2B97-492F-89A0-5F209A804350" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:x86:*", - "matchCriteriaId": "5690A703-390D-4D8A-9258-2F47116DAB4F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*", - "matchCriteriaId": "1B1C0C68-9194-473F-BE5E-EC7F184899FA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:x86:*", - "matchCriteriaId": "AB1EDDA7-15AF-4B45-A931-DFCBB1EEB701" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*", - "matchCriteriaId": "D7A6AC9E-BEA6-44B0-B3B3-F0F94E32424A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:x86:*", - "matchCriteriaId": "952FE0DC-B2ED-4080-BF29-A2C265E83FEF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*", - "matchCriteriaId": "16038328-9399-4B85-B777-BA4757D02C9B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:x86:*", - "matchCriteriaId": "1CE7ABDB-6572-40E8-B952-CBE52C999858" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*", - "matchCriteriaId": "16CA2757-FA8D-43D9-96E8-D3C0EB6E1DEF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:x86:*", - "matchCriteriaId": "0F417186-D1ED-4A31-92B2-83DEDA1AF272" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*", - "matchCriteriaId": "E8CB5481-5EAE-401E-BD7E-D3095CCA9E94" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:x86:*", - "matchCriteriaId": "3D4FCFAE-918C-4886-9A17-08A5B94D35F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A0F36FAC-141D-476D-84C5-A558C199F904" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:x86:*", - "matchCriteriaId": "830D2914-C9FE-406F-AFCE-7A04BB9E2896" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "51D64824-25F6-4761-BD6A-29038A143744" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:x86:*", - "matchCriteriaId": "F4B791B5-2EB5-403A-90CC-B219F6277D1F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E284C8A1-740F-454D-A774-99CD3A21B594" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:x86:*", - "matchCriteriaId": "2BA5F34D-7490-4B2B-A7E6-8450F9C1FC31" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "C70D72AE-0CBF-4324-9935-57E28EC6279C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:x86:*", - "matchCriteriaId": "B803FE64-FC8D-4650-9FB9-FEEED4340416" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "F674B06B-7E86-4E41-9126-8152D0DDABAE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:x86:*", - "matchCriteriaId": "4C560A9A-2388-4980-9E88-118C5EB806B7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*", - "matchCriteriaId": "7039B3EC-8B22-413E-B582-B4BEC6181241" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*", - "matchCriteriaId": "35CF1DD2-80B9-4476-8963-5C3EF52B33F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*", - "matchCriteriaId": "BFB0B05B-A5CE-4B9C-AE7F-83062868D35B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*", - "matchCriteriaId": "D166A66E-7454-47EC-BB56-861A9AFEAFE1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*", - "matchCriteriaId": "7DA94F50-2A62-4300-BF4D-A342AAE35629" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*", - "matchCriteriaId": "252D937B-50DC-444F-AE73-5FCF6203DF27" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*", - "matchCriteriaId": "F6D8EE51-02C1-47BC-A92C-0A8ABEFD28FF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*", - "matchCriteriaId": "7F20A5D7-3B38-4911-861A-04C8310D5916" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*", - "matchCriteriaId": "D472DE3A-71D8-4F40-9DDE-85929A2B047D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*", - "matchCriteriaId": "B2AED943-65A8-4FDB-BBD0-CCEF8682A48C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*", - "matchCriteriaId": "D4640185-F3D8-4575-A71D-4C889A93DE2C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*", - "matchCriteriaId": "144CCF7C-025E-4879-B2E7-ABB8E4390BE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*", - "matchCriteriaId": "B6FAA052-0B2B-40CE-8C98-919B8D08A5ED" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*", - "matchCriteriaId": "4B5A53DE-9C83-4A6B-96F3-23C03BF445D9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*", - "matchCriteriaId": "063EB879-CB05-4E33-AA90-9E43516839B5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*", - "matchCriteriaId": "2D25764F-4B02-4C65-954E-8C7D6632DE00" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*", - "matchCriteriaId": "F31F5BF3-CD0A-465C-857F-273841BCD28A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*", - "matchCriteriaId": "FF302C8A-079B-42B9-B455-CD9083BFA067" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*", - "matchCriteriaId": "744999C0-33D3-4363-B3DB-E0D02CDD3918" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.25:*:*:*:*:*:*:*", - "matchCriteriaId": "C2E77A76-2A60-45D8-9337-867BC22C5110" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.26:*:*:*:*:*:*:*", - "matchCriteriaId": "C9F4AAE7-C870-46B7-B559-2949737BE777" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.27:*:*:*:*:*:*:*", - "matchCriteriaId": "20FA2824-20B0-48B8-BB0A-4904C1D3E8AA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.28:*:*:*:*:*:*:*", - "matchCriteriaId": "9F9B347E-61AC-419F-9701-B862BBFA46F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.29:*:*:*:*:*:*:*", - "matchCriteriaId": "989F351C-8B7C-4C1B-AFA2-AE9431576368" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.30:*:*:*:*:*:*:*", - "matchCriteriaId": "8D22172A-9FA7-42E0-8451-165D8E47A573" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.31:*:*:*:*:*:*:*", - "matchCriteriaId": "CE31624C-94F9-45D8-9B4A-D0028F10602F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.32:*:*:*:*:*:*:*", - "matchCriteriaId": "70967A83-28F6-4568-9ADA-6EF232E5BBC2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "962B0C45-AB29-4383-AC16-C6E8245D0FF7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "A0EE126B-74B2-4F79-BFE1-3DC169F3F9B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "392075E0-A9C7-4B4A-90F9-7F1ADFF5EFA7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*", - "matchCriteriaId": "ECC66968-06F0-4874-A95A-A292C36E45C1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*", - "matchCriteriaId": "5FE986E6-1068-4E1B-8EAB-DF1EAF32B4E3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*", - "matchCriteriaId": "543E8536-1A8E-4E76-B89F-1B1F9F26FAB8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*", - "matchCriteriaId": "EC2B45E3-31E1-4B46-85FA-3A84E75B8F84" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6:*:*:*:*:*:*:*", - "matchCriteriaId": "DDB8CC75-D3EE-417C-A83D-CB6D666FE595" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "09A072F1-7BEE-4236-ACBB-55DB8FEF4A03" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E19D5A58-17D6-4502-A57A-70B2F84817A4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D58BA035-1204-4DFA-98A1-12111FB6222E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.4:*:*:*:*:*:*:*", - "matchCriteriaId": "A17F2E87-8EB8-476A-B5B5-9AE5CF53D9FE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "A8CCC101-5852-4299-9B67-EA1B149D58C0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.6:*:*:*:*:*:*:*", - "matchCriteriaId": "B8074D32-C252-4AD3-A579-1C5EDDD7014B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.7:*:*:*:*:*:*:*", - "matchCriteriaId": "962AA802-8179-4606-AAC0-9363BAEABC9F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.8:*:*:*:*:*:*:*", - "matchCriteriaId": "1286C858-D5A2-45F3-86D1-E50FE53FB23C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*", - "matchCriteriaId": "5AC4A13E-F560-4D01-98A3-E2A2B82EB25B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*", - "matchCriteriaId": "942C462A-5398-4BB9-A792-598682E1FEF2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*", - "matchCriteriaId": "B852F7E0-0282-483D-BB4D-18CB7A4F1392" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*", - "matchCriteriaId": "53ED9A31-99CC-41C8-8B72-5B2A9B49AA6C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EFD646BC-62F7-47CF-B0BE-768F701F7D9A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F43D418E-87C1-4C83-9FF1-4F45B4F452DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*", - "matchCriteriaId": "680D0E00-F29A-487C-8770-8E7EAC672B7C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.4:*:*:*:*:*:*:*", - "matchCriteriaId": "2DCA96A4-A836-4E94-A39C-3AD3EA1D9611" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.5:*:*:*:*:*:*:*", - "matchCriteriaId": "753C05E3-B603-4E36-B9BA-FAEDCBF62A7D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.6:*:*:*:*:*:*:*", - "matchCriteriaId": "E385C2E0-B9F1-4564-8E6D-56FD9E762405" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.7:*:*:*:*:*:*:*", - "matchCriteriaId": "041335D4-05E1-4004-9381-28AAD5994B47" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.8:*:*:*:*:*:*:*", - "matchCriteriaId": "370F2AE5-3DBC-46B9-AC70-F052C9229C00" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.9:*:*:*:*:*:*:*", - "matchCriteriaId": "7A971BE3-259D-4494-BBC5-12793D92DB57" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.10:*:*:*:*:*:*:*", - "matchCriteriaId": "8E4719A6-FDEA-4714-A830-E23A52AE90BC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "1A6E41FB-38CE-49F2-B796-9A5AA648E73F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*", - "matchCriteriaId": "93523FE1-5993-46CB-9299-7C8C1A04E873" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*", - "matchCriteriaId": "27ADC356-6BE9-43A3-9E0B-393DC4B1559A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*", - "matchCriteriaId": "4F543D23-1774-4D14-A7D1-AD49EDEA94DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.4:*:*:*:*:*:*:*", - "matchCriteriaId": "FC323F58-CA00-4C3C-BA4D-CC2C0A6E5F43" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.5:*:*:*:*:*:*:*", - "matchCriteriaId": "FEA0B2E3-668D-40ED-9D3D-709EB6449F8D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.6:*:*:*:*:*:*:*", - "matchCriteriaId": "3431B258-4EC8-4E7F-87BB-4D934880601E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.7:*:*:*:*:*:*:*", - "matchCriteriaId": "1B09FA1E-8B28-4F2A-BA7E-8E1C40365970" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.8:*:*:*:*:*:*:*", - "matchCriteriaId": "91917120-9D68-41C0-8B5D-85C256BC6200" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.9:*:*:*:*:*:*:*", - "matchCriteriaId": "AAD268A0-096C-4C31-BEC5-D47F5149D462" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.10:*:*:*:*:*:*:*", - "matchCriteriaId": "32BD2427-C47F-4660-A1D9-448E500EF5B9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.11:*:*:*:*:*:*:*", - "matchCriteriaId": "02048CE5-81C7-4DFB-BC40-CE4C86B7E022" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.12:*:*:*:*:*:*:*", - "matchCriteriaId": "934D2B37-0575-4A75-B00B-0028316D6DF0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.13:*:*:*:*:*:*:*", - "matchCriteriaId": "06754C21-995C-4850-A4DC-F21826C0F8C5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*", - "matchCriteriaId": "42633FF9-FB0C-4095-B4A1-8D623A98683B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*", - "matchCriteriaId": "08C04619-89A2-4B15-82A2-48BCC662C1F1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*", - "matchCriteriaId": "5B039196-7159-476C-876A-C61242CC41DA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*", - "matchCriteriaId": "3A9E0457-53C9-44DD-ACFB-31EE1D1E060E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*", - "matchCriteriaId": "BEE406E7-87BA-44BA-BF61-673E6CC44A2F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*", - "matchCriteriaId": "29FBA173-658F-45DC-8205-934CACD67166" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc7:*:*:*:*:*:*", - "matchCriteriaId": "139700F0-BA32-40CF-B9DF-C9C450384FDE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E578085C-3968-4543-BEBA-EE3C3CB4FA02" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4DCFA441-68FB-4559-A245-FF0B79DE43CA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8C2508D8-6571-4B81-A0D7-E494CCD039CE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:*:*", - "matchCriteriaId": "8B516926-5E86-4C0A-85F3-F64E1FCDA249" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:*:*", - "matchCriteriaId": "069D774D-79BE-479F-BF4E-F021AD808114" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:*:*", - "matchCriteriaId": "D15B27A9-46E0-4DDF-A00C-29F8F1F18D73" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:*:*", - "matchCriteriaId": "A381BB4A-28B4-4672-87EE-91B3DDD6C71A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:*:*", - "matchCriteriaId": "922F80CF-937D-4FA2-AFF2-6E47FFE9E1E9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.8:*:*:*:*:*:*:*", - "matchCriteriaId": "A548ADF4-9E3B-407C-A5ED-05150EB3A185" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.9:*:*:*:*:*:*:*", - "matchCriteriaId": "9C623230-4497-41B9-9BD2-7A6CFDD77983" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.10:*:*:*:*:*:*:*", - "matchCriteriaId": "C72FA8A6-60A6-4486-A245-7BEF8B2A2711" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.11:*:*:*:*:*:*:*", - "matchCriteriaId": "0A498D90-BB99-405E-9FA6-1FBFE179787E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.0:*:*:*:*:*:arm64:*", - "matchCriteriaId": "C8409226-20A1-4549-9E11-6D0C3C38DCCE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0D32776-8ADB-4E79-846A-C0C99FED19E0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B7D01673-D13F-487F-81B6-1279C187277E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.3:*:*:*:*:*:*:*", - "matchCriteriaId": "ADB27A3E-78E4-40F7-9716-A1099B0D85FB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.4:*:*:*:*:*:*:*", - "matchCriteriaId": "16E7136A-A8A6-4BF5-AF5D-AFB5C7A10712" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.5:*:*:*:*:*:*:*", - "matchCriteriaId": "6FE127AC-E61D-427A-B998-D60DF5AABA21" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.6:*:*:*:*:*:*:*", - "matchCriteriaId": "3819FF99-AEC5-4466-8542-D395419E4308" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.7:*:*:*:*:*:*:*", - "matchCriteriaId": "E621FA1A-464B-4D2A-A0D6-EDA475A3709B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.8:*:*:*:*:*:*:*", - "matchCriteriaId": "B760B422-EA11-43AB-B6D2-CA54E7229663" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.9:*:*:*:*:*:*:*", - "matchCriteriaId": "D2CA7BBC-917C-4F31-A442-465C30444836" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.10:*:*:*:*:*:*:*", - "matchCriteriaId": "AE778000-4FD5-4032-86CE-5930EF4CB7C1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.11:*:*:*:*:*:*:*", - "matchCriteriaId": "B3344EEB-F037-48FE-81DC-67F6384F7D9A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.12:*:*:*:*:*:*:*", - "matchCriteriaId": "0244B0CA-9C67-4F06-BFBA-1F257112AC08" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.13:*:*:*:*:*:*:*", - "matchCriteriaId": "2148C13F-4BB0-4D46-A688-F7C726D12497" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.14:*:*:*:*:*:*:*", - "matchCriteriaId": "9871AF57-9158-4A41-8340-596B4463289A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.15:*:*:*:*:*:*:*", - "matchCriteriaId": "2A875207-DF01-4240-8895-49B62693D27B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.16:*:*:*:*:*:*:*", - "matchCriteriaId": "FE04A172-6F3B-4E3B-8D4D-564740FABAAF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.17:*:*:*:*:*:*:*", - "matchCriteriaId": "CFEEF8C4-7DC2-4230-B58C-337F39A4DFAF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.18:*:*:*:*:*:*:*", - "matchCriteriaId": "9F74DB5C-5096-438C-8C8A-6D337A2FD06A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11:*:*:*:*:*:*:*", - "matchCriteriaId": "639E3A57-A9E7-40E6-8929-81CCC0060EFB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.1:*:*:*:*:*:*:*", - "matchCriteriaId": "07012ADD-F521-40A8-B067-E87C2238A3D2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.2:*:*:*:*:*:*:*", - "matchCriteriaId": "3F5FF393-3F89-4274-B82B-F671358072ED" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E348698F-54D1-4F5E-B701-CFAF50881E0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.4:*:*:*:*:*:*:*", - "matchCriteriaId": "932205D9-3514-4289-9B55-C7A169276930" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.5:*:*:*:*:*:*:*", - "matchCriteriaId": "2ECB2D33-F517-480F-8A6F-99D9D6C49596" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.6:*:*:*:*:*:*:*", - "matchCriteriaId": "D16F68DD-E2D4-4AA4-AB81-3796C2947E37" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.11", + "versionEndExcluding": "3.11.8", + "matchCriteriaId": "27B041B3-6592-459F-85F6-943D103DB90E" } ] } @@ -1509,75 +96,130 @@ "references": [ { "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7314e613d5ff9f0934f7a0f74ed7973b903315d1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00045.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2013/11/04/22", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2036-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2037-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2066-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2067-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2068-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2069-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2070-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2071-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2072-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2073-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2074-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2075-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2076-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1", @@ -1591,7 +233,8 @@ "url": "https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.12.bz2", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Patch", + "Third Party Advisory" ] } ] diff --git a/CVE-2013/CVE-2013-63xx/CVE-2013-6383.json b/CVE-2013/CVE-2013-63xx/CVE-2013-6383.json index 35db32fc306..f61f5c0eeb6 100644 --- a/CVE-2013/CVE-2013-63xx/CVE-2013-6383.json +++ b/CVE-2013/CVE-2013-63xx/CVE-2013-6383.json @@ -2,8 +2,8 @@ "id": "CVE-2013-6383", "sourceIdentifier": "secalert@redhat.com", "published": "2013-11-27T04:43:33.247", - "lastModified": "2023-02-13T04:49:49.903", - "vulnStatus": "Modified", + "lastModified": "2023-12-15T16:09:14.220", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -63,1363 +63,30 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndIncluding": "3.11.7", - "matchCriteriaId": "74676759-D357-4224-9C07-7FCAB195A0CD" + "versionStartIncluding": "2.6.12", + "versionEndExcluding": "3.2.53", + "matchCriteriaId": "43911295-AEFA-4B19-89E9-48D2A2B613E0" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*", - "matchCriteriaId": "D30AEC07-3CBD-4F4F-9646-BEAA1D98750B" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.3", + "versionEndExcluding": "3.4.69", + "matchCriteriaId": "F1C3B911-4978-48C7-AFF7-8C938606D108" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*", - "matchCriteriaId": "C2AA8E68-691B-499C-AEDD-3C0BFFE70044" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.5", + "versionEndExcluding": "3.10.19", + "matchCriteriaId": "42C255A0-67F5-4C50-B054-2C005D650CA3" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*", - "matchCriteriaId": "9440475B-5960-4066-A204-F30AAFC87846" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*", - "matchCriteriaId": "53BCFBFB-6AF0-4525-8623-7633CC5E17DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*", - "matchCriteriaId": "6ED4E86A-74F0-436A-BEB4-3F4EE93A5421" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*", - "matchCriteriaId": "BF0365B0-8E16-4F30-BD92-5DD538CC8135" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*", - "matchCriteriaId": "079505E8-2942-4C33-93D1-35ADA4C39E72" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "38989541-2360-4E0A-AE5A-3D6144AA6114" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "4E51646B-7A0E-40F3-B8C9-239C1DA81DD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "42A8A507-F8E2-491C-A144-B2448A1DB26E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "901FC6F3-2C2A-4112-AE27-AB102BBE8DEE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "203AD334-DB9F-41B0-A4D1-A6C158EF8C40" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "B3611753-E440-410F-8250-600C996A4B8E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "9739BB47-EEAF-42F1-A557-2AE2EA9526A3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "5A95E3BB-0AFC-4C2E-B9BE-C975E902A266" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "482A6C9A-9B8E-4D1C-917A-F16370745E7C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*", - "matchCriteriaId": "C6D87357-63E0-41D0-9F02-1BCBF9A77E63" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*", - "matchCriteriaId": "3765A2D6-2D78-4FB1-989E-D5106BFA3F5E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*", - "matchCriteriaId": "F54257DB-7023-43C4-AC4D-9590B815CD92" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*", - "matchCriteriaId": "61FF5FCD-A4A1-4803-AC53-320A4C838AF6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*", - "matchCriteriaId": "9F096553-064F-46A2-877B-F32F163A0F49" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*", - "matchCriteriaId": "C0D762D1-E3AD-40EA-8D39-83EEB51B5E85" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*", - "matchCriteriaId": "A6187D19-7148-4B87-AD7E-244FF9EE0FA6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*", - "matchCriteriaId": "99AC64C2-E391-485C-9CD7-BA09C8FA5E63" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*", - "matchCriteriaId": "8CDA5E95-7805-441B-BEF7-4448EA45E964" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*", - "matchCriteriaId": "51561053-6C28-4F38-BC9B-3F7A7508EB72" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*", - "matchCriteriaId": "118F4A5B-C498-4FC3-BE28-50D18EBE4F22" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*", - "matchCriteriaId": "BD38EBE6-FE1A-4B55-9FB5-07952253B7A5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*", - "matchCriteriaId": "3A491E47-82AD-4055-9444-2EC0D6715326" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*", - "matchCriteriaId": "13C5FD16-23B6-467F-9438-5B554922F974" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*", - "matchCriteriaId": "9C67235F-5B51-4BF7-89EC-4810F720246F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*", - "matchCriteriaId": "08405DEF-05F4-45F0-AC95-DBF914A36D93" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*", - "matchCriteriaId": "1A7B9C4B-4A41-4175-9F07-191C1EE98C1F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*", - "matchCriteriaId": "B306E0A8-4D4A-4895-8128-A500D30A7E0C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*", - "matchCriteriaId": "295C839A-F34E-4853-A926-55EABC639412" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*", - "matchCriteriaId": "2AFD5F49-7EF9-4CFE-95BD-8FD19B500B0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*", - "matchCriteriaId": "00B3DDDD-B2F6-4753-BA38-65A24017857D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*", - "matchCriteriaId": "33FCD39E-F4BF-432D-9CF9-F195CF5844F3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*", - "matchCriteriaId": "C7308690-CB0D-4758-B80F-D2ADCD2A9D66" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*", - "matchCriteriaId": "313A470B-8A2B-478A-82B5-B27D2718331C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*", - "matchCriteriaId": "83FF021E-07E3-41CC-AAE8-D99D7FF24B9D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*", - "matchCriteriaId": "F72412E3-8DA9-4CC9-A426-B534202ADBA4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*", - "matchCriteriaId": "FCAA9D7A-3C3E-4C0B-9D38-EA80E68C2E46" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*", - "matchCriteriaId": "4A9E3AE5-3FCF-4CBB-A30B-082BCFBFB0CB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*", - "matchCriteriaId": "CF715657-4C3A-4392-B85D-1BBF4DE45D89" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*", - "matchCriteriaId": "4B63C618-AC3D-4EF7-AFDF-27B9BF482B78" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*", - "matchCriteriaId": "C33DA5A9-5E40-4365-9602-82FB4DCD15B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*", - "matchCriteriaId": "EFAFDB74-40BD-46FA-89AC-617EB2C7160B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*", - "matchCriteriaId": "CF5F17DA-30A7-40CF-BD7C-CEDF06D64617" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*", - "matchCriteriaId": "71A276F5-BD9D-4C1B-90DF-9B0C15B6F7DF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*", - "matchCriteriaId": "F8F6EBEC-3C29-444B-BB85-6EF239B59EC1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.45:*:*:*:*:*:*:*", - "matchCriteriaId": "FDB91302-FD18-44CF-A8A8-B31483328539" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.46:*:*:*:*:*:*:*", - "matchCriteriaId": "9B81DC2B-46FA-4640-AD6C-2A404D94BA0B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.47:*:*:*:*:*:*:*", - "matchCriteriaId": "BA6A1663-BC4C-4FC9-B5EB-A52EDED17B26" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.48:*:*:*:*:*:*:*", - "matchCriteriaId": "69C33D6C-6B9F-49F4-B505-E7B589CDEC50" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.49:*:*:*:*:*:*:*", - "matchCriteriaId": "C464796B-2F31-4159-A132-82A0C74137B7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.50:*:*:*:*:*:*:*", - "matchCriteriaId": "1D6C6E46-FE29-4D2D-A0EC-43DA5112BCC3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.51:*:*:*:*:*:*:*", - "matchCriteriaId": "1A370E91-73A1-4D62-8E7B-696B920203F8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.52:*:*:*:*:*:*:*", - "matchCriteriaId": "340197CD-9645-4B7E-B976-F3F5A7D4C5BE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.53:*:*:*:*:*:*:*", - "matchCriteriaId": "96030636-0C4A-4A10-B768-525D6A0E18CB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.54:*:*:*:*:*:*:*", - "matchCriteriaId": "A42D8419-914F-4AD6-B0E9-C1290D514FF1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.55:*:*:*:*:*:*:*", - "matchCriteriaId": "F4E2C88B-42EA-4F4F-B1F6-A9332EC6888B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.56:*:*:*:*:*:*:*", - "matchCriteriaId": "2449D13B-3314-4182-832F-03F6B11AA31F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.57:*:*:*:*:*:*:*", - "matchCriteriaId": "9A35B66C-F050-4462-A58E-FEE061B5582E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.58:*:*:*:*:*:*:*", - "matchCriteriaId": "1B551164-0167-49BB-A3AE-4034BDA3DCB4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.59:*:*:*:*:*:*:*", - "matchCriteriaId": "7244278E-49B6-4405-A14C-F3540C8F5AF8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.60:*:*:*:*:*:*:*", - "matchCriteriaId": "B4C3E4B8-7274-4ABB-B7CE-6A39C183CE18" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.61:*:*:*:*:*:*:*", - "matchCriteriaId": "6501EDB9-4847-47F8-90EE-B295626E4CDC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.62:*:*:*:*:*:*:*", - "matchCriteriaId": "2D676D48-7521-45E2-8563-6B966FF86A35" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.63:*:*:*:*:*:*:*", - "matchCriteriaId": "3B69FA17-0AB9-4986-A5A7-2A4C1DD24222" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.64:*:*:*:*:*:*:*", - "matchCriteriaId": "7BC35593-96C7-41F0-B738-1568F8129121" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.65:*:*:*:*:*:*:*", - "matchCriteriaId": "38D23794-0E7C-4FA5-A7A8-CF940E3FA962" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.66:*:*:*:*:*:*:*", - "matchCriteriaId": "008E1E7D-4C20-4560-9288-EF532ADB0029" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.67:*:*:*:*:*:*:*", - "matchCriteriaId": "3B3A7044-A92E-47A9-A7BD-35E5B575F5FD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.68:*:*:*:*:*:*:*", - "matchCriteriaId": "783E2980-B6AB-489E-B157-B6A2E10A32CA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3DFFE5A6-6A67-4992-84A3-C0F05FACDEAD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*", - "matchCriteriaId": "13BBD2A3-AE10-48B9-8776-4FB1CAC37D44" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*", - "matchCriteriaId": "B25680CC-8918-4F27-8D7E-A6579215450B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*", - "matchCriteriaId": "92C48B4C-410C-4BA8-A28A-B2E928320FCC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*", - "matchCriteriaId": "CB447523-855B-461E-8197-95169BE86EB0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B155BBDF-6DF6-4FF5-9C41-D8A5266DCC67" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "28476DEC-9630-4B40-9D4D-9BC151DC4CA4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "5646880A-2355-4BDD-89E7-825863A0311F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7FF99148-267A-46F8-9927-A9082269BAF6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "A783C083-5D9C-48F9-B5A6-A97A9604FB19" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "2B817A24-03AC-46CD-BEFA-505457FD2A5D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*", - "matchCriteriaId": "51CF1BCE-090E-4B70-BA16-ACB74411293B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*", - "matchCriteriaId": "187AAD67-10D7-4B57-B4C6-00443E246AF3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*", - "matchCriteriaId": "F341CE88-C5BC-4CDD-9CB5-B6BAD7152E63" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*", - "matchCriteriaId": "37ACE2A6-C229-4236-8E9F-235F008F3AA0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "D3220B70-917F-4F9F-8A3B-2BF581281E8D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*", - "matchCriteriaId": "99372D07-C06A-41FA-9843-6D57F99AB5AF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*", - "matchCriteriaId": "2B9DC110-D260-4DB4-B8B0-EF1D160ADA07" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*", - "matchCriteriaId": "6192FE84-4D53-40D4-AF61-78CE7136141A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*", - "matchCriteriaId": "42FEF3CF-1302-45EB-89CC-3786FE4BAC1F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*", - "matchCriteriaId": "AE6A6B58-2C89-4DE4-BA57-78100818095C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*", - "matchCriteriaId": "1D467F87-2F13-4D26-9A93-E0BA526FEA24" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FE348F7B-02DE-47D5-8011-F83DA9426021" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E91594EA-F0A3-41B3-A9C6-F7864FC2F229" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "9E1ECCDB-0208-48F6-B44F-16CC0ECE3503" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "FBA8B5DE-372E-47E0-A0F6-BE286D509CC3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "9A1CA083-2CF8-45AE-9E15-1AA3A8352E3B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*", - "matchCriteriaId": "19D69A49-5290-4C5F-8157-719AD58D253D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*", - "matchCriteriaId": "290BD969-42E7-47B0-B21B-06DE4865432C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*", - "matchCriteriaId": "23A9E29E-DE78-4C73-9FBD-C2410F5FC8B8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*", - "matchCriteriaId": "018434C9-E75F-45CB-A169-DAB4B1D864D7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*", - "matchCriteriaId": "DC0AC68F-EC58-4C4F-8CBC-A59ECC00CCDE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*", - "matchCriteriaId": "C123C844-F6D7-471E-A62E-F756042FB1CD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*", - "matchCriteriaId": "A11C38BB-7FA2-49B0-AAC9-83DB387A06DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*", - "matchCriteriaId": "61F3733C-E5F6-4855-B471-DF3FB823613B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*", - "matchCriteriaId": "1DDCA75F-9A06-4457-9A45-38A38E7F7086" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*", - "matchCriteriaId": "7AEA837E-7864-4003-8DB7-111ED710A7E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*", - "matchCriteriaId": "B6FE471F-2D1F-4A1D-A197-7E46B75787E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA9E6AB-58DC-4EC5-A25C-11F9D0B38BF7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*", - "matchCriteriaId": "DC6B8DB3-B05B-41A2-B091-342D66AAE8F5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*", - "matchCriteriaId": "958F0FF8-33EF-4A71-A0BD-572C85211DBA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*", - "matchCriteriaId": "FBA39F48-B02F-4C48-B304-DA9CCA055244" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*", - "matchCriteriaId": "1FF841F3-48A7-41D7-9C45-A8170435A5EB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*", - "matchCriteriaId": "EF506916-A6DC-4B1E-90E5-959492AF55F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*", - "matchCriteriaId": "B3CDAD1F-2C6A-48C0-8FAB-C2659373FA25" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*", - "matchCriteriaId": "4FFE4B22-C96A-43D0-B993-F51EDD9C5E0E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*", - "matchCriteriaId": "F571CC8B-B212-4553-B463-1DB01D616E8A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*", - "matchCriteriaId": "84E3E151-D437-48ED-A529-731EEFF88567" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*", - "matchCriteriaId": "E9E3EA3C-CCA5-4433-86E0-3D02C4757A0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*", - "matchCriteriaId": "F7AC4F7D-9FA6-4CF1-B2E9-70BF7D4D177C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*", - "matchCriteriaId": "3CE3A80D-9648-43CC-8F99-D741ED6552BF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*", - "matchCriteriaId": "C8A98C03-A465-41B4-A551-A26FEC7FFD94" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AFB76697-1C2F-48C0-9B14-517EC053D4B3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*", - "matchCriteriaId": "BED88DFD-1DC5-4505-A441-44ECDEF0252D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*", - "matchCriteriaId": "DBFD2ACD-728A-4082-BB6A-A1EF6E58E47D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*", - "matchCriteriaId": "C31B0E51-F62D-4053-B04F-FC4D5BC373D2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*", - "matchCriteriaId": "A914303E-1CB6-4AAD-9F5F-DE5433C4E814" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*", - "matchCriteriaId": "203BBA69-90B2-4C5E-8023-C14180742421" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*", - "matchCriteriaId": "0DBFAB53-B889-4028-AC0E-7E165B152A18" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*", - "matchCriteriaId": "FE409AEC-F677-4DEF-8EB7-2C35809043CE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "578EC12B-402F-4AD4-B8F8-C9B2CAB06891" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "877002ED-8097-4BB4-BB88-6FC6306C38B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "76294CE3-D72C-41D5-9E0F-B693D0042699" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "916E97D4-1FAB-42F5-826B-653B1C0909A8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*", - "matchCriteriaId": "33FD2217-C5D0-48C1-AD74-3527127FEF9C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*", - "matchCriteriaId": "2E92971F-B629-4E0A-9A50-8B235F9704B8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*", - "matchCriteriaId": "EDD3A069-3829-4EE2-9D5A-29459F29D4C1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*", - "matchCriteriaId": "A4A0964C-CEB2-41D7-A69C-1599B05B6171" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "0F960FA6-F904-4A4E-B483-44C70090E9A1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*", - "matchCriteriaId": "261C1B41-C9E0-414F-8368-51C0C0B8AD38" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*", - "matchCriteriaId": "5CCA261D-2B97-492F-89A0-5F209A804350" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*", - "matchCriteriaId": "1B1C0C68-9194-473F-BE5E-EC7F184899FA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*", - "matchCriteriaId": "D7A6AC9E-BEA6-44B0-B3B3-F0F94E32424A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*", - "matchCriteriaId": "16038328-9399-4B85-B777-BA4757D02C9B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*", - "matchCriteriaId": "16CA2757-FA8D-43D9-96E8-D3C0EB6E1DEF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*", - "matchCriteriaId": "E8CB5481-5EAE-401E-BD7E-D3095CCA9E94" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A0F36FAC-141D-476D-84C5-A558C199F904" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "51D64824-25F6-4761-BD6A-29038A143744" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E284C8A1-740F-454D-A774-99CD3A21B594" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "C70D72AE-0CBF-4324-9935-57E28EC6279C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "F674B06B-7E86-4E41-9126-8152D0DDABAE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*", - "matchCriteriaId": "7039B3EC-8B22-413E-B582-B4BEC6181241" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*", - "matchCriteriaId": "35CF1DD2-80B9-4476-8963-5C3EF52B33F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*", - "matchCriteriaId": "BFB0B05B-A5CE-4B9C-AE7F-83062868D35B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*", - "matchCriteriaId": "D166A66E-7454-47EC-BB56-861A9AFEAFE1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*", - "matchCriteriaId": "7DA94F50-2A62-4300-BF4D-A342AAE35629" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*", - "matchCriteriaId": "252D937B-50DC-444F-AE73-5FCF6203DF27" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*", - "matchCriteriaId": "F6D8EE51-02C1-47BC-A92C-0A8ABEFD28FF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*", - "matchCriteriaId": "7F20A5D7-3B38-4911-861A-04C8310D5916" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*", - "matchCriteriaId": "D472DE3A-71D8-4F40-9DDE-85929A2B047D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*", - "matchCriteriaId": "B2AED943-65A8-4FDB-BBD0-CCEF8682A48C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*", - "matchCriteriaId": "D4640185-F3D8-4575-A71D-4C889A93DE2C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*", - "matchCriteriaId": "144CCF7C-025E-4879-B2E7-ABB8E4390BE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*", - "matchCriteriaId": "B6FAA052-0B2B-40CE-8C98-919B8D08A5ED" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*", - "matchCriteriaId": "4B5A53DE-9C83-4A6B-96F3-23C03BF445D9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*", - "matchCriteriaId": "063EB879-CB05-4E33-AA90-9E43516839B5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*", - "matchCriteriaId": "2D25764F-4B02-4C65-954E-8C7D6632DE00" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*", - "matchCriteriaId": "F31F5BF3-CD0A-465C-857F-273841BCD28A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*", - "matchCriteriaId": "FF302C8A-079B-42B9-B455-CD9083BFA067" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*", - "matchCriteriaId": "744999C0-33D3-4363-B3DB-E0D02CDD3918" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.25:*:*:*:*:*:*:*", - "matchCriteriaId": "C2E77A76-2A60-45D8-9337-867BC22C5110" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.26:*:*:*:*:*:*:*", - "matchCriteriaId": "C9F4AAE7-C870-46B7-B559-2949737BE777" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.27:*:*:*:*:*:*:*", - "matchCriteriaId": "20FA2824-20B0-48B8-BB0A-4904C1D3E8AA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.28:*:*:*:*:*:*:*", - "matchCriteriaId": "9F9B347E-61AC-419F-9701-B862BBFA46F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.29:*:*:*:*:*:*:*", - "matchCriteriaId": "989F351C-8B7C-4C1B-AFA2-AE9431576368" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.30:*:*:*:*:*:*:*", - "matchCriteriaId": "8D22172A-9FA7-42E0-8451-165D8E47A573" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.31:*:*:*:*:*:*:*", - "matchCriteriaId": "CE31624C-94F9-45D8-9B4A-D0028F10602F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.32:*:*:*:*:*:*:*", - "matchCriteriaId": "70967A83-28F6-4568-9ADA-6EF232E5BBC2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "962B0C45-AB29-4383-AC16-C6E8245D0FF7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "A0EE126B-74B2-4F79-BFE1-3DC169F3F9B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "392075E0-A9C7-4B4A-90F9-7F1ADFF5EFA7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*", - "matchCriteriaId": "ECC66968-06F0-4874-A95A-A292C36E45C1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*", - "matchCriteriaId": "5FE986E6-1068-4E1B-8EAB-DF1EAF32B4E3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*", - "matchCriteriaId": "543E8536-1A8E-4E76-B89F-1B1F9F26FAB8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*", - "matchCriteriaId": "EC2B45E3-31E1-4B46-85FA-3A84E75B8F84" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6:*:*:*:*:*:*:*", - "matchCriteriaId": "DDB8CC75-D3EE-417C-A83D-CB6D666FE595" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "09A072F1-7BEE-4236-ACBB-55DB8FEF4A03" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E19D5A58-17D6-4502-A57A-70B2F84817A4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D58BA035-1204-4DFA-98A1-12111FB6222E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.4:*:*:*:*:*:*:*", - "matchCriteriaId": "A17F2E87-8EB8-476A-B5B5-9AE5CF53D9FE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "A8CCC101-5852-4299-9B67-EA1B149D58C0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.6:*:*:*:*:*:*:*", - "matchCriteriaId": "B8074D32-C252-4AD3-A579-1C5EDDD7014B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.7:*:*:*:*:*:*:*", - "matchCriteriaId": "962AA802-8179-4606-AAC0-9363BAEABC9F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.8:*:*:*:*:*:*:*", - "matchCriteriaId": "1286C858-D5A2-45F3-86D1-E50FE53FB23C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*", - "matchCriteriaId": "5AC4A13E-F560-4D01-98A3-E2A2B82EB25B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*", - "matchCriteriaId": "942C462A-5398-4BB9-A792-598682E1FEF2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*", - "matchCriteriaId": "B852F7E0-0282-483D-BB4D-18CB7A4F1392" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*", - "matchCriteriaId": "53ED9A31-99CC-41C8-8B72-5B2A9B49AA6C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EFD646BC-62F7-47CF-B0BE-768F701F7D9A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F43D418E-87C1-4C83-9FF1-4F45B4F452DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*", - "matchCriteriaId": "680D0E00-F29A-487C-8770-8E7EAC672B7C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.4:*:*:*:*:*:*:*", - "matchCriteriaId": "2DCA96A4-A836-4E94-A39C-3AD3EA1D9611" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.5:*:*:*:*:*:*:*", - "matchCriteriaId": "753C05E3-B603-4E36-B9BA-FAEDCBF62A7D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.6:*:*:*:*:*:*:*", - "matchCriteriaId": "E385C2E0-B9F1-4564-8E6D-56FD9E762405" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.7:*:*:*:*:*:*:*", - "matchCriteriaId": "041335D4-05E1-4004-9381-28AAD5994B47" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.8:*:*:*:*:*:*:*", - "matchCriteriaId": "370F2AE5-3DBC-46B9-AC70-F052C9229C00" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.9:*:*:*:*:*:*:*", - "matchCriteriaId": "7A971BE3-259D-4494-BBC5-12793D92DB57" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.10:*:*:*:*:*:*:*", - "matchCriteriaId": "8E4719A6-FDEA-4714-A830-E23A52AE90BC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "1A6E41FB-38CE-49F2-B796-9A5AA648E73F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*", - "matchCriteriaId": "93523FE1-5993-46CB-9299-7C8C1A04E873" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*", - "matchCriteriaId": "27ADC356-6BE9-43A3-9E0B-393DC4B1559A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*", - "matchCriteriaId": "4F543D23-1774-4D14-A7D1-AD49EDEA94DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.4:*:*:*:*:*:*:*", - "matchCriteriaId": "FC323F58-CA00-4C3C-BA4D-CC2C0A6E5F43" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.5:*:*:*:*:*:*:*", - "matchCriteriaId": "FEA0B2E3-668D-40ED-9D3D-709EB6449F8D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.6:*:*:*:*:*:*:*", - "matchCriteriaId": "3431B258-4EC8-4E7F-87BB-4D934880601E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.7:*:*:*:*:*:*:*", - "matchCriteriaId": "1B09FA1E-8B28-4F2A-BA7E-8E1C40365970" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.8:*:*:*:*:*:*:*", - "matchCriteriaId": "91917120-9D68-41C0-8B5D-85C256BC6200" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.9:*:*:*:*:*:*:*", - "matchCriteriaId": "AAD268A0-096C-4C31-BEC5-D47F5149D462" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.10:*:*:*:*:*:*:*", - "matchCriteriaId": "32BD2427-C47F-4660-A1D9-448E500EF5B9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.11:*:*:*:*:*:*:*", - "matchCriteriaId": "02048CE5-81C7-4DFB-BC40-CE4C86B7E022" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.12:*:*:*:*:*:*:*", - "matchCriteriaId": "934D2B37-0575-4A75-B00B-0028316D6DF0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.13:*:*:*:*:*:*:*", - "matchCriteriaId": "06754C21-995C-4850-A4DC-F21826C0F8C5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*", - "matchCriteriaId": "42633FF9-FB0C-4095-B4A1-8D623A98683B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*", - "matchCriteriaId": "08C04619-89A2-4B15-82A2-48BCC662C1F1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*", - "matchCriteriaId": "5B039196-7159-476C-876A-C61242CC41DA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*", - "matchCriteriaId": "3A9E0457-53C9-44DD-ACFB-31EE1D1E060E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*", - "matchCriteriaId": "BEE406E7-87BA-44BA-BF61-673E6CC44A2F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*", - "matchCriteriaId": "29FBA173-658F-45DC-8205-934CACD67166" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc7:*:*:*:*:*:*", - "matchCriteriaId": "139700F0-BA32-40CF-B9DF-C9C450384FDE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E578085C-3968-4543-BEBA-EE3C3CB4FA02" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4DCFA441-68FB-4559-A245-FF0B79DE43CA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8C2508D8-6571-4B81-A0D7-E494CCD039CE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:*:*", - "matchCriteriaId": "8B516926-5E86-4C0A-85F3-F64E1FCDA249" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:*:*", - "matchCriteriaId": "069D774D-79BE-479F-BF4E-F021AD808114" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:*:*", - "matchCriteriaId": "D15B27A9-46E0-4DDF-A00C-29F8F1F18D73" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:*:*", - "matchCriteriaId": "A381BB4A-28B4-4672-87EE-91B3DDD6C71A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:*:*", - "matchCriteriaId": "922F80CF-937D-4FA2-AFF2-6E47FFE9E1E9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.8:*:*:*:*:*:*:*", - "matchCriteriaId": "A548ADF4-9E3B-407C-A5ED-05150EB3A185" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.9:*:*:*:*:*:*:*", - "matchCriteriaId": "9C623230-4497-41B9-9BD2-7A6CFDD77983" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.10:*:*:*:*:*:*:*", - "matchCriteriaId": "C72FA8A6-60A6-4486-A245-7BEF8B2A2711" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.11:*:*:*:*:*:*:*", - "matchCriteriaId": "0A498D90-BB99-405E-9FA6-1FBFE179787E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0D32776-8ADB-4E79-846A-C0C99FED19E0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B7D01673-D13F-487F-81B6-1279C187277E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.3:*:*:*:*:*:*:*", - "matchCriteriaId": "ADB27A3E-78E4-40F7-9716-A1099B0D85FB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.4:*:*:*:*:*:*:*", - "matchCriteriaId": "16E7136A-A8A6-4BF5-AF5D-AFB5C7A10712" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.5:*:*:*:*:*:*:*", - "matchCriteriaId": "6FE127AC-E61D-427A-B998-D60DF5AABA21" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.6:*:*:*:*:*:*:*", - "matchCriteriaId": "3819FF99-AEC5-4466-8542-D395419E4308" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.7:*:*:*:*:*:*:*", - "matchCriteriaId": "E621FA1A-464B-4D2A-A0D6-EDA475A3709B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.8:*:*:*:*:*:*:*", - "matchCriteriaId": "B760B422-EA11-43AB-B6D2-CA54E7229663" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.9:*:*:*:*:*:*:*", - "matchCriteriaId": "D2CA7BBC-917C-4F31-A442-465C30444836" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.10:*:*:*:*:*:*:*", - "matchCriteriaId": "AE778000-4FD5-4032-86CE-5930EF4CB7C1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.11:*:*:*:*:*:*:*", - "matchCriteriaId": "B3344EEB-F037-48FE-81DC-67F6384F7D9A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.12:*:*:*:*:*:*:*", - "matchCriteriaId": "0244B0CA-9C67-4F06-BFBA-1F257112AC08" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.13:*:*:*:*:*:*:*", - "matchCriteriaId": "2148C13F-4BB0-4D46-A688-F7C726D12497" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.14:*:*:*:*:*:*:*", - "matchCriteriaId": "9871AF57-9158-4A41-8340-596B4463289A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.15:*:*:*:*:*:*:*", - "matchCriteriaId": "2A875207-DF01-4240-8895-49B62693D27B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.16:*:*:*:*:*:*:*", - "matchCriteriaId": "FE04A172-6F3B-4E3B-8D4D-564740FABAAF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.17:*:*:*:*:*:*:*", - "matchCriteriaId": "CFEEF8C4-7DC2-4230-B58C-337F39A4DFAF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.18:*:*:*:*:*:*:*", - "matchCriteriaId": "9F74DB5C-5096-438C-8C8A-6D337A2FD06A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11:*:*:*:*:*:*:*", - "matchCriteriaId": "639E3A57-A9E7-40E6-8929-81CCC0060EFB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.1:*:*:*:*:*:*:*", - "matchCriteriaId": "07012ADD-F521-40A8-B067-E87C2238A3D2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.2:*:*:*:*:*:*:*", - "matchCriteriaId": "3F5FF393-3F89-4274-B82B-F671358072ED" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E348698F-54D1-4F5E-B701-CFAF50881E0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.4:*:*:*:*:*:*:*", - "matchCriteriaId": "932205D9-3514-4289-9B55-C7A169276930" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.5:*:*:*:*:*:*:*", - "matchCriteriaId": "2ECB2D33-F517-480F-8A6F-99D9D6C49596" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.6:*:*:*:*:*:*:*", - "matchCriteriaId": "D16F68DD-E2D4-4AA4-AB81-3796C2947E37" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.11", + "versionEndExcluding": "3.11.8", + "matchCriteriaId": "27B041B3-6592-459F-85F6-943D103DB90E" } ] } @@ -1429,79 +96,136 @@ "references": [ { "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f856567b930dfcdbc3323261bf77240ccdde01f5", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-0100.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-0285.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.8", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2013/11/22/5", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2066-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2067-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2068-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2069-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2070-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2071-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2072-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2073-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2074-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2075-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2076-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2107-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2108-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1033530", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/torvalds/linux/commit/f856567b930dfcdbc3323261bf77240ccdde01f5", diff --git a/CVE-2013/CVE-2013-67xx/CVE-2013-6763.json b/CVE-2013/CVE-2013-67xx/CVE-2013-6763.json index d72b3803868..65138099a28 100644 --- a/CVE-2013/CVE-2013-67xx/CVE-2013-6763.json +++ b/CVE-2013/CVE-2013-67xx/CVE-2013-6763.json @@ -2,8 +2,8 @@ "id": "CVE-2013-6763", "sourceIdentifier": "cve@mitre.org", "published": "2013-11-12T14:35:12.823", - "lastModified": "2023-11-07T02:17:49.637", - "vulnStatus": "Modified", + "lastModified": "2023-12-15T15:56:08.937", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -63,1443 +63,29 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndIncluding": "3.11.7", - "matchCriteriaId": "74676759-D357-4224-9C07-7FCAB195A0CD" + "versionEndExcluding": "3.2.53", + "matchCriteriaId": "6B518162-FDD4-41A7-A1C6-5286C0074A18" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*", - "matchCriteriaId": "D30AEC07-3CBD-4F4F-9646-BEAA1D98750B" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.3", + "versionEndExcluding": "3.4.71", + "matchCriteriaId": "F8922168-6460-4EB9-B551-FE5D86361969" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*", - "matchCriteriaId": "C2AA8E68-691B-499C-AEDD-3C0BFFE70044" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.5", + "versionEndExcluding": "3.10.19", + "matchCriteriaId": "42C255A0-67F5-4C50-B054-2C005D650CA3" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*", - "matchCriteriaId": "9440475B-5960-4066-A204-F30AAFC87846" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*", - "matchCriteriaId": "53BCFBFB-6AF0-4525-8623-7633CC5E17DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*", - "matchCriteriaId": "6ED4E86A-74F0-436A-BEB4-3F4EE93A5421" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*", - "matchCriteriaId": "BF0365B0-8E16-4F30-BD92-5DD538CC8135" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*", - "matchCriteriaId": "079505E8-2942-4C33-93D1-35ADA4C39E72" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "38989541-2360-4E0A-AE5A-3D6144AA6114" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "4E51646B-7A0E-40F3-B8C9-239C1DA81DD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "42A8A507-F8E2-491C-A144-B2448A1DB26E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "901FC6F3-2C2A-4112-AE27-AB102BBE8DEE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "203AD334-DB9F-41B0-A4D1-A6C158EF8C40" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "B3611753-E440-410F-8250-600C996A4B8E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "9739BB47-EEAF-42F1-A557-2AE2EA9526A3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "5A95E3BB-0AFC-4C2E-B9BE-C975E902A266" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "482A6C9A-9B8E-4D1C-917A-F16370745E7C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*", - "matchCriteriaId": "C6D87357-63E0-41D0-9F02-1BCBF9A77E63" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*", - "matchCriteriaId": "3765A2D6-2D78-4FB1-989E-D5106BFA3F5E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*", - "matchCriteriaId": "F54257DB-7023-43C4-AC4D-9590B815CD92" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*", - "matchCriteriaId": "61FF5FCD-A4A1-4803-AC53-320A4C838AF6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*", - "matchCriteriaId": "9F096553-064F-46A2-877B-F32F163A0F49" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*", - "matchCriteriaId": "C0D762D1-E3AD-40EA-8D39-83EEB51B5E85" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*", - "matchCriteriaId": "A6187D19-7148-4B87-AD7E-244FF9EE0FA6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*", - "matchCriteriaId": "99AC64C2-E391-485C-9CD7-BA09C8FA5E63" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*", - "matchCriteriaId": "8CDA5E95-7805-441B-BEF7-4448EA45E964" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*", - "matchCriteriaId": "51561053-6C28-4F38-BC9B-3F7A7508EB72" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*", - "matchCriteriaId": "118F4A5B-C498-4FC3-BE28-50D18EBE4F22" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*", - "matchCriteriaId": "BD38EBE6-FE1A-4B55-9FB5-07952253B7A5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*", - "matchCriteriaId": "3A491E47-82AD-4055-9444-2EC0D6715326" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*", - "matchCriteriaId": "13C5FD16-23B6-467F-9438-5B554922F974" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*", - "matchCriteriaId": "9C67235F-5B51-4BF7-89EC-4810F720246F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*", - "matchCriteriaId": "08405DEF-05F4-45F0-AC95-DBF914A36D93" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*", - "matchCriteriaId": "1A7B9C4B-4A41-4175-9F07-191C1EE98C1F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*", - "matchCriteriaId": "B306E0A8-4D4A-4895-8128-A500D30A7E0C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*", - "matchCriteriaId": "295C839A-F34E-4853-A926-55EABC639412" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*", - "matchCriteriaId": "2AFD5F49-7EF9-4CFE-95BD-8FD19B500B0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*", - "matchCriteriaId": "00B3DDDD-B2F6-4753-BA38-65A24017857D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*", - "matchCriteriaId": "33FCD39E-F4BF-432D-9CF9-F195CF5844F3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*", - "matchCriteriaId": "C7308690-CB0D-4758-B80F-D2ADCD2A9D66" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*", - "matchCriteriaId": "313A470B-8A2B-478A-82B5-B27D2718331C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*", - "matchCriteriaId": "83FF021E-07E3-41CC-AAE8-D99D7FF24B9D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*", - "matchCriteriaId": "F72412E3-8DA9-4CC9-A426-B534202ADBA4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*", - "matchCriteriaId": "FCAA9D7A-3C3E-4C0B-9D38-EA80E68C2E46" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*", - "matchCriteriaId": "4A9E3AE5-3FCF-4CBB-A30B-082BCFBFB0CB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*", - "matchCriteriaId": "CF715657-4C3A-4392-B85D-1BBF4DE45D89" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*", - "matchCriteriaId": "4B63C618-AC3D-4EF7-AFDF-27B9BF482B78" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*", - "matchCriteriaId": "C33DA5A9-5E40-4365-9602-82FB4DCD15B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*", - "matchCriteriaId": "EFAFDB74-40BD-46FA-89AC-617EB2C7160B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*", - "matchCriteriaId": "CF5F17DA-30A7-40CF-BD7C-CEDF06D64617" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*", - "matchCriteriaId": "71A276F5-BD9D-4C1B-90DF-9B0C15B6F7DF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*", - "matchCriteriaId": "F8F6EBEC-3C29-444B-BB85-6EF239B59EC1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.45:*:*:*:*:*:*:*", - "matchCriteriaId": "FDB91302-FD18-44CF-A8A8-B31483328539" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.46:*:*:*:*:*:*:*", - "matchCriteriaId": "9B81DC2B-46FA-4640-AD6C-2A404D94BA0B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.47:*:*:*:*:*:*:*", - "matchCriteriaId": "BA6A1663-BC4C-4FC9-B5EB-A52EDED17B26" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.48:*:*:*:*:*:*:*", - "matchCriteriaId": "69C33D6C-6B9F-49F4-B505-E7B589CDEC50" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.49:*:*:*:*:*:*:*", - "matchCriteriaId": "C464796B-2F31-4159-A132-82A0C74137B7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.50:*:*:*:*:*:*:*", - "matchCriteriaId": "1D6C6E46-FE29-4D2D-A0EC-43DA5112BCC3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.51:*:*:*:*:*:*:*", - "matchCriteriaId": "1A370E91-73A1-4D62-8E7B-696B920203F8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.52:*:*:*:*:*:*:*", - "matchCriteriaId": "340197CD-9645-4B7E-B976-F3F5A7D4C5BE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.53:*:*:*:*:*:*:*", - "matchCriteriaId": "96030636-0C4A-4A10-B768-525D6A0E18CB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.54:*:*:*:*:*:*:*", - "matchCriteriaId": "A42D8419-914F-4AD6-B0E9-C1290D514FF1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.55:*:*:*:*:*:*:*", - "matchCriteriaId": "F4E2C88B-42EA-4F4F-B1F6-A9332EC6888B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.56:*:*:*:*:*:*:*", - "matchCriteriaId": "2449D13B-3314-4182-832F-03F6B11AA31F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.57:*:*:*:*:*:*:*", - "matchCriteriaId": "9A35B66C-F050-4462-A58E-FEE061B5582E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.58:*:*:*:*:*:*:*", - "matchCriteriaId": "1B551164-0167-49BB-A3AE-4034BDA3DCB4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.59:*:*:*:*:*:*:*", - "matchCriteriaId": "7244278E-49B6-4405-A14C-F3540C8F5AF8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.60:*:*:*:*:*:*:*", - "matchCriteriaId": "B4C3E4B8-7274-4ABB-B7CE-6A39C183CE18" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.61:*:*:*:*:*:*:*", - "matchCriteriaId": "6501EDB9-4847-47F8-90EE-B295626E4CDC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.62:*:*:*:*:*:*:*", - "matchCriteriaId": "2D676D48-7521-45E2-8563-6B966FF86A35" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.63:*:*:*:*:*:*:*", - "matchCriteriaId": "3B69FA17-0AB9-4986-A5A7-2A4C1DD24222" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.64:*:*:*:*:*:*:*", - "matchCriteriaId": "7BC35593-96C7-41F0-B738-1568F8129121" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.65:*:*:*:*:*:*:*", - "matchCriteriaId": "38D23794-0E7C-4FA5-A7A8-CF940E3FA962" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.66:*:*:*:*:*:*:*", - "matchCriteriaId": "008E1E7D-4C20-4560-9288-EF532ADB0029" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.67:*:*:*:*:*:*:*", - "matchCriteriaId": "3B3A7044-A92E-47A9-A7BD-35E5B575F5FD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.68:*:*:*:*:*:*:*", - "matchCriteriaId": "783E2980-B6AB-489E-B157-B6A2E10A32CA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3DFFE5A6-6A67-4992-84A3-C0F05FACDEAD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*", - "matchCriteriaId": "13BBD2A3-AE10-48B9-8776-4FB1CAC37D44" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*", - "matchCriteriaId": "B25680CC-8918-4F27-8D7E-A6579215450B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*", - "matchCriteriaId": "92C48B4C-410C-4BA8-A28A-B2E928320FCC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*", - "matchCriteriaId": "CB447523-855B-461E-8197-95169BE86EB0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B155BBDF-6DF6-4FF5-9C41-D8A5266DCC67" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "28476DEC-9630-4B40-9D4D-9BC151DC4CA4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "5646880A-2355-4BDD-89E7-825863A0311F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7FF99148-267A-46F8-9927-A9082269BAF6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "A783C083-5D9C-48F9-B5A6-A97A9604FB19" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "2B817A24-03AC-46CD-BEFA-505457FD2A5D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*", - "matchCriteriaId": "51CF1BCE-090E-4B70-BA16-ACB74411293B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*", - "matchCriteriaId": "187AAD67-10D7-4B57-B4C6-00443E246AF3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*", - "matchCriteriaId": "F341CE88-C5BC-4CDD-9CB5-B6BAD7152E63" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*", - "matchCriteriaId": "37ACE2A6-C229-4236-8E9F-235F008F3AA0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "D3220B70-917F-4F9F-8A3B-2BF581281E8D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:x86:*", - "matchCriteriaId": "7D47A395-821D-4BFF-996E-E849D9A40217" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*", - "matchCriteriaId": "99372D07-C06A-41FA-9843-6D57F99AB5AF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*", - "matchCriteriaId": "2B9DC110-D260-4DB4-B8B0-EF1D160ADA07" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*", - "matchCriteriaId": "6192FE84-4D53-40D4-AF61-78CE7136141A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*", - "matchCriteriaId": "42FEF3CF-1302-45EB-89CC-3786FE4BAC1F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*", - "matchCriteriaId": "AE6A6B58-2C89-4DE4-BA57-78100818095C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*", - "matchCriteriaId": "1D467F87-2F13-4D26-9A93-E0BA526FEA24" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FE348F7B-02DE-47D5-8011-F83DA9426021" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:x86:*", - "matchCriteriaId": "8A603291-33B4-4195-B52D-D2A9938089C1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E91594EA-F0A3-41B3-A9C6-F7864FC2F229" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "9E1ECCDB-0208-48F6-B44F-16CC0ECE3503" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "FBA8B5DE-372E-47E0-A0F6-BE286D509CC3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "9A1CA083-2CF8-45AE-9E15-1AA3A8352E3B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*", - "matchCriteriaId": "19D69A49-5290-4C5F-8157-719AD58D253D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*", - "matchCriteriaId": "290BD969-42E7-47B0-B21B-06DE4865432C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*", - "matchCriteriaId": "23A9E29E-DE78-4C73-9FBD-C2410F5FC8B8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*", - "matchCriteriaId": "018434C9-E75F-45CB-A169-DAB4B1D864D7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*", - "matchCriteriaId": "DC0AC68F-EC58-4C4F-8CBC-A59ECC00CCDE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*", - "matchCriteriaId": "C123C844-F6D7-471E-A62E-F756042FB1CD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*", - "matchCriteriaId": "A11C38BB-7FA2-49B0-AAC9-83DB387A06DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*", - "matchCriteriaId": "61F3733C-E5F6-4855-B471-DF3FB823613B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*", - "matchCriteriaId": "1DDCA75F-9A06-4457-9A45-38A38E7F7086" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*", - "matchCriteriaId": "7AEA837E-7864-4003-8DB7-111ED710A7E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*", - "matchCriteriaId": "B6FE471F-2D1F-4A1D-A197-7E46B75787E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA9E6AB-58DC-4EC5-A25C-11F9D0B38BF7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*", - "matchCriteriaId": "DC6B8DB3-B05B-41A2-B091-342D66AAE8F5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*", - "matchCriteriaId": "958F0FF8-33EF-4A71-A0BD-572C85211DBA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*", - "matchCriteriaId": "FBA39F48-B02F-4C48-B304-DA9CCA055244" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*", - "matchCriteriaId": "1FF841F3-48A7-41D7-9C45-A8170435A5EB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*", - "matchCriteriaId": "EF506916-A6DC-4B1E-90E5-959492AF55F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*", - "matchCriteriaId": "B3CDAD1F-2C6A-48C0-8FAB-C2659373FA25" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*", - "matchCriteriaId": "4FFE4B22-C96A-43D0-B993-F51EDD9C5E0E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*", - "matchCriteriaId": "F571CC8B-B212-4553-B463-1DB01D616E8A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*", - "matchCriteriaId": "84E3E151-D437-48ED-A529-731EEFF88567" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*", - "matchCriteriaId": "E9E3EA3C-CCA5-4433-86E0-3D02C4757A0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*", - "matchCriteriaId": "F7AC4F7D-9FA6-4CF1-B2E9-70BF7D4D177C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*", - "matchCriteriaId": "3CE3A80D-9648-43CC-8F99-D741ED6552BF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*", - "matchCriteriaId": "C8A98C03-A465-41B4-A551-A26FEC7FFD94" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AFB76697-1C2F-48C0-9B14-517EC053D4B3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*", - "matchCriteriaId": "BED88DFD-1DC5-4505-A441-44ECDEF0252D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*", - "matchCriteriaId": "DBFD2ACD-728A-4082-BB6A-A1EF6E58E47D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*", - "matchCriteriaId": "C31B0E51-F62D-4053-B04F-FC4D5BC373D2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*", - "matchCriteriaId": "A914303E-1CB6-4AAD-9F5F-DE5433C4E814" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*", - "matchCriteriaId": "203BBA69-90B2-4C5E-8023-C14180742421" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*", - "matchCriteriaId": "0DBFAB53-B889-4028-AC0E-7E165B152A18" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*", - "matchCriteriaId": "FE409AEC-F677-4DEF-8EB7-2C35809043CE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "578EC12B-402F-4AD4-B8F8-C9B2CAB06891" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "877002ED-8097-4BB4-BB88-6FC6306C38B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "76294CE3-D72C-41D5-9E0F-B693D0042699" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "916E97D4-1FAB-42F5-826B-653B1C0909A8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*", - "matchCriteriaId": "33FD2217-C5D0-48C1-AD74-3527127FEF9C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*", - "matchCriteriaId": "2E92971F-B629-4E0A-9A50-8B235F9704B8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*", - "matchCriteriaId": "EDD3A069-3829-4EE2-9D5A-29459F29D4C1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*", - "matchCriteriaId": "A4A0964C-CEB2-41D7-A69C-1599B05B6171" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "0F960FA6-F904-4A4E-B483-44C70090E9A1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:x86:*", - "matchCriteriaId": "8C3D9C66-933A-469E-9073-75015A8AD17D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*", - "matchCriteriaId": "261C1B41-C9E0-414F-8368-51C0C0B8AD38" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:x86:*", - "matchCriteriaId": "C92F29A0-DEFF-49E4-AE86-5DBDAD51C677" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*", - "matchCriteriaId": "5CCA261D-2B97-492F-89A0-5F209A804350" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:x86:*", - "matchCriteriaId": "5690A703-390D-4D8A-9258-2F47116DAB4F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*", - "matchCriteriaId": "1B1C0C68-9194-473F-BE5E-EC7F184899FA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:x86:*", - "matchCriteriaId": "AB1EDDA7-15AF-4B45-A931-DFCBB1EEB701" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*", - "matchCriteriaId": "D7A6AC9E-BEA6-44B0-B3B3-F0F94E32424A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:x86:*", - "matchCriteriaId": "952FE0DC-B2ED-4080-BF29-A2C265E83FEF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*", - "matchCriteriaId": "16038328-9399-4B85-B777-BA4757D02C9B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:x86:*", - "matchCriteriaId": "1CE7ABDB-6572-40E8-B952-CBE52C999858" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*", - "matchCriteriaId": "16CA2757-FA8D-43D9-96E8-D3C0EB6E1DEF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:x86:*", - "matchCriteriaId": "0F417186-D1ED-4A31-92B2-83DEDA1AF272" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*", - "matchCriteriaId": "E8CB5481-5EAE-401E-BD7E-D3095CCA9E94" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:x86:*", - "matchCriteriaId": "3D4FCFAE-918C-4886-9A17-08A5B94D35F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A0F36FAC-141D-476D-84C5-A558C199F904" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:x86:*", - "matchCriteriaId": "830D2914-C9FE-406F-AFCE-7A04BB9E2896" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "51D64824-25F6-4761-BD6A-29038A143744" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:x86:*", - "matchCriteriaId": "F4B791B5-2EB5-403A-90CC-B219F6277D1F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E284C8A1-740F-454D-A774-99CD3A21B594" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:x86:*", - "matchCriteriaId": "2BA5F34D-7490-4B2B-A7E6-8450F9C1FC31" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "C70D72AE-0CBF-4324-9935-57E28EC6279C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:x86:*", - "matchCriteriaId": "B803FE64-FC8D-4650-9FB9-FEEED4340416" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "F674B06B-7E86-4E41-9126-8152D0DDABAE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:x86:*", - "matchCriteriaId": "4C560A9A-2388-4980-9E88-118C5EB806B7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*", - "matchCriteriaId": "7039B3EC-8B22-413E-B582-B4BEC6181241" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*", - "matchCriteriaId": "35CF1DD2-80B9-4476-8963-5C3EF52B33F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*", - "matchCriteriaId": "BFB0B05B-A5CE-4B9C-AE7F-83062868D35B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*", - "matchCriteriaId": "D166A66E-7454-47EC-BB56-861A9AFEAFE1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*", - "matchCriteriaId": "7DA94F50-2A62-4300-BF4D-A342AAE35629" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*", - "matchCriteriaId": "252D937B-50DC-444F-AE73-5FCF6203DF27" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*", - "matchCriteriaId": "F6D8EE51-02C1-47BC-A92C-0A8ABEFD28FF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*", - "matchCriteriaId": "7F20A5D7-3B38-4911-861A-04C8310D5916" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*", - "matchCriteriaId": "D472DE3A-71D8-4F40-9DDE-85929A2B047D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*", - "matchCriteriaId": "B2AED943-65A8-4FDB-BBD0-CCEF8682A48C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*", - "matchCriteriaId": "D4640185-F3D8-4575-A71D-4C889A93DE2C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*", - "matchCriteriaId": "144CCF7C-025E-4879-B2E7-ABB8E4390BE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*", - "matchCriteriaId": "B6FAA052-0B2B-40CE-8C98-919B8D08A5ED" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*", - "matchCriteriaId": "4B5A53DE-9C83-4A6B-96F3-23C03BF445D9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*", - "matchCriteriaId": "063EB879-CB05-4E33-AA90-9E43516839B5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*", - "matchCriteriaId": "2D25764F-4B02-4C65-954E-8C7D6632DE00" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*", - "matchCriteriaId": "F31F5BF3-CD0A-465C-857F-273841BCD28A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*", - "matchCriteriaId": "FF302C8A-079B-42B9-B455-CD9083BFA067" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*", - "matchCriteriaId": "744999C0-33D3-4363-B3DB-E0D02CDD3918" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.25:*:*:*:*:*:*:*", - "matchCriteriaId": "C2E77A76-2A60-45D8-9337-867BC22C5110" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.26:*:*:*:*:*:*:*", - "matchCriteriaId": "C9F4AAE7-C870-46B7-B559-2949737BE777" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.27:*:*:*:*:*:*:*", - "matchCriteriaId": "20FA2824-20B0-48B8-BB0A-4904C1D3E8AA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.28:*:*:*:*:*:*:*", - "matchCriteriaId": "9F9B347E-61AC-419F-9701-B862BBFA46F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.29:*:*:*:*:*:*:*", - "matchCriteriaId": "989F351C-8B7C-4C1B-AFA2-AE9431576368" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.30:*:*:*:*:*:*:*", - "matchCriteriaId": "8D22172A-9FA7-42E0-8451-165D8E47A573" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.31:*:*:*:*:*:*:*", - "matchCriteriaId": "CE31624C-94F9-45D8-9B4A-D0028F10602F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.32:*:*:*:*:*:*:*", - "matchCriteriaId": "70967A83-28F6-4568-9ADA-6EF232E5BBC2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "962B0C45-AB29-4383-AC16-C6E8245D0FF7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "A0EE126B-74B2-4F79-BFE1-3DC169F3F9B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "392075E0-A9C7-4B4A-90F9-7F1ADFF5EFA7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*", - "matchCriteriaId": "ECC66968-06F0-4874-A95A-A292C36E45C1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*", - "matchCriteriaId": "5FE986E6-1068-4E1B-8EAB-DF1EAF32B4E3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*", - "matchCriteriaId": "543E8536-1A8E-4E76-B89F-1B1F9F26FAB8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*", - "matchCriteriaId": "EC2B45E3-31E1-4B46-85FA-3A84E75B8F84" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6:*:*:*:*:*:*:*", - "matchCriteriaId": "DDB8CC75-D3EE-417C-A83D-CB6D666FE595" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "09A072F1-7BEE-4236-ACBB-55DB8FEF4A03" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E19D5A58-17D6-4502-A57A-70B2F84817A4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D58BA035-1204-4DFA-98A1-12111FB6222E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.4:*:*:*:*:*:*:*", - "matchCriteriaId": "A17F2E87-8EB8-476A-B5B5-9AE5CF53D9FE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "A8CCC101-5852-4299-9B67-EA1B149D58C0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.6:*:*:*:*:*:*:*", - "matchCriteriaId": "B8074D32-C252-4AD3-A579-1C5EDDD7014B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.7:*:*:*:*:*:*:*", - "matchCriteriaId": "962AA802-8179-4606-AAC0-9363BAEABC9F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.8:*:*:*:*:*:*:*", - "matchCriteriaId": "1286C858-D5A2-45F3-86D1-E50FE53FB23C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*", - "matchCriteriaId": "5AC4A13E-F560-4D01-98A3-E2A2B82EB25B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*", - "matchCriteriaId": "942C462A-5398-4BB9-A792-598682E1FEF2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*", - "matchCriteriaId": "B852F7E0-0282-483D-BB4D-18CB7A4F1392" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*", - "matchCriteriaId": "53ED9A31-99CC-41C8-8B72-5B2A9B49AA6C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EFD646BC-62F7-47CF-B0BE-768F701F7D9A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F43D418E-87C1-4C83-9FF1-4F45B4F452DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*", - "matchCriteriaId": "680D0E00-F29A-487C-8770-8E7EAC672B7C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.4:*:*:*:*:*:*:*", - "matchCriteriaId": "2DCA96A4-A836-4E94-A39C-3AD3EA1D9611" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.5:*:*:*:*:*:*:*", - "matchCriteriaId": "753C05E3-B603-4E36-B9BA-FAEDCBF62A7D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.6:*:*:*:*:*:*:*", - "matchCriteriaId": "E385C2E0-B9F1-4564-8E6D-56FD9E762405" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.7:*:*:*:*:*:*:*", - "matchCriteriaId": "041335D4-05E1-4004-9381-28AAD5994B47" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.8:*:*:*:*:*:*:*", - "matchCriteriaId": "370F2AE5-3DBC-46B9-AC70-F052C9229C00" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.9:*:*:*:*:*:*:*", - "matchCriteriaId": "7A971BE3-259D-4494-BBC5-12793D92DB57" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.10:*:*:*:*:*:*:*", - "matchCriteriaId": "8E4719A6-FDEA-4714-A830-E23A52AE90BC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "1A6E41FB-38CE-49F2-B796-9A5AA648E73F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*", - "matchCriteriaId": "93523FE1-5993-46CB-9299-7C8C1A04E873" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*", - "matchCriteriaId": "27ADC356-6BE9-43A3-9E0B-393DC4B1559A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*", - "matchCriteriaId": "4F543D23-1774-4D14-A7D1-AD49EDEA94DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.4:*:*:*:*:*:*:*", - "matchCriteriaId": "FC323F58-CA00-4C3C-BA4D-CC2C0A6E5F43" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.5:*:*:*:*:*:*:*", - "matchCriteriaId": "FEA0B2E3-668D-40ED-9D3D-709EB6449F8D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.6:*:*:*:*:*:*:*", - "matchCriteriaId": "3431B258-4EC8-4E7F-87BB-4D934880601E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.7:*:*:*:*:*:*:*", - "matchCriteriaId": "1B09FA1E-8B28-4F2A-BA7E-8E1C40365970" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.8:*:*:*:*:*:*:*", - "matchCriteriaId": "91917120-9D68-41C0-8B5D-85C256BC6200" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.9:*:*:*:*:*:*:*", - "matchCriteriaId": "AAD268A0-096C-4C31-BEC5-D47F5149D462" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.10:*:*:*:*:*:*:*", - "matchCriteriaId": "32BD2427-C47F-4660-A1D9-448E500EF5B9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.11:*:*:*:*:*:*:*", - "matchCriteriaId": "02048CE5-81C7-4DFB-BC40-CE4C86B7E022" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.12:*:*:*:*:*:*:*", - "matchCriteriaId": "934D2B37-0575-4A75-B00B-0028316D6DF0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.13:*:*:*:*:*:*:*", - "matchCriteriaId": "06754C21-995C-4850-A4DC-F21826C0F8C5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*", - "matchCriteriaId": "42633FF9-FB0C-4095-B4A1-8D623A98683B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*", - "matchCriteriaId": "08C04619-89A2-4B15-82A2-48BCC662C1F1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*", - "matchCriteriaId": "5B039196-7159-476C-876A-C61242CC41DA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*", - "matchCriteriaId": "3A9E0457-53C9-44DD-ACFB-31EE1D1E060E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*", - "matchCriteriaId": "BEE406E7-87BA-44BA-BF61-673E6CC44A2F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*", - "matchCriteriaId": "29FBA173-658F-45DC-8205-934CACD67166" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc7:*:*:*:*:*:*", - "matchCriteriaId": "139700F0-BA32-40CF-B9DF-C9C450384FDE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E578085C-3968-4543-BEBA-EE3C3CB4FA02" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4DCFA441-68FB-4559-A245-FF0B79DE43CA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8C2508D8-6571-4B81-A0D7-E494CCD039CE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:*:*", - "matchCriteriaId": "8B516926-5E86-4C0A-85F3-F64E1FCDA249" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:*:*", - "matchCriteriaId": "069D774D-79BE-479F-BF4E-F021AD808114" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:*:*", - "matchCriteriaId": "D15B27A9-46E0-4DDF-A00C-29F8F1F18D73" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:*:*", - "matchCriteriaId": "A381BB4A-28B4-4672-87EE-91B3DDD6C71A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:*:*", - "matchCriteriaId": "922F80CF-937D-4FA2-AFF2-6E47FFE9E1E9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.8:*:*:*:*:*:*:*", - "matchCriteriaId": "A548ADF4-9E3B-407C-A5ED-05150EB3A185" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.9:*:*:*:*:*:*:*", - "matchCriteriaId": "9C623230-4497-41B9-9BD2-7A6CFDD77983" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.10:*:*:*:*:*:*:*", - "matchCriteriaId": "C72FA8A6-60A6-4486-A245-7BEF8B2A2711" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.11:*:*:*:*:*:*:*", - "matchCriteriaId": "0A498D90-BB99-405E-9FA6-1FBFE179787E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.0:*:*:*:*:*:arm64:*", - "matchCriteriaId": "C8409226-20A1-4549-9E11-6D0C3C38DCCE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0D32776-8ADB-4E79-846A-C0C99FED19E0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B7D01673-D13F-487F-81B6-1279C187277E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.3:*:*:*:*:*:*:*", - "matchCriteriaId": "ADB27A3E-78E4-40F7-9716-A1099B0D85FB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.4:*:*:*:*:*:*:*", - "matchCriteriaId": "16E7136A-A8A6-4BF5-AF5D-AFB5C7A10712" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.5:*:*:*:*:*:*:*", - "matchCriteriaId": "6FE127AC-E61D-427A-B998-D60DF5AABA21" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.6:*:*:*:*:*:*:*", - "matchCriteriaId": "3819FF99-AEC5-4466-8542-D395419E4308" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.7:*:*:*:*:*:*:*", - "matchCriteriaId": "E621FA1A-464B-4D2A-A0D6-EDA475A3709B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.8:*:*:*:*:*:*:*", - "matchCriteriaId": "B760B422-EA11-43AB-B6D2-CA54E7229663" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.9:*:*:*:*:*:*:*", - "matchCriteriaId": "D2CA7BBC-917C-4F31-A442-465C30444836" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.10:*:*:*:*:*:*:*", - "matchCriteriaId": "AE778000-4FD5-4032-86CE-5930EF4CB7C1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.11:*:*:*:*:*:*:*", - "matchCriteriaId": "B3344EEB-F037-48FE-81DC-67F6384F7D9A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.12:*:*:*:*:*:*:*", - "matchCriteriaId": "0244B0CA-9C67-4F06-BFBA-1F257112AC08" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.13:*:*:*:*:*:*:*", - "matchCriteriaId": "2148C13F-4BB0-4D46-A688-F7C726D12497" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.14:*:*:*:*:*:*:*", - "matchCriteriaId": "9871AF57-9158-4A41-8340-596B4463289A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.15:*:*:*:*:*:*:*", - "matchCriteriaId": "2A875207-DF01-4240-8895-49B62693D27B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.16:*:*:*:*:*:*:*", - "matchCriteriaId": "FE04A172-6F3B-4E3B-8D4D-564740FABAAF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.17:*:*:*:*:*:*:*", - "matchCriteriaId": "CFEEF8C4-7DC2-4230-B58C-337F39A4DFAF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.18:*:*:*:*:*:*:*", - "matchCriteriaId": "9F74DB5C-5096-438C-8C8A-6D337A2FD06A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11:*:*:*:*:*:*:*", - "matchCriteriaId": "639E3A57-A9E7-40E6-8929-81CCC0060EFB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.1:*:*:*:*:*:*:*", - "matchCriteriaId": "07012ADD-F521-40A8-B067-E87C2238A3D2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.2:*:*:*:*:*:*:*", - "matchCriteriaId": "3F5FF393-3F89-4274-B82B-F671358072ED" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E348698F-54D1-4F5E-B701-CFAF50881E0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.4:*:*:*:*:*:*:*", - "matchCriteriaId": "932205D9-3514-4289-9B55-C7A169276930" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.5:*:*:*:*:*:*:*", - "matchCriteriaId": "2ECB2D33-F517-480F-8A6F-99D9D6C49596" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.6:*:*:*:*:*:*:*", - "matchCriteriaId": "D16F68DD-E2D4-4AA4-AB81-3796C2947E37" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.11", + "versionEndExcluding": "3.11.8", + "matchCriteriaId": "27B041B3-6592-459F-85F6-943D103DB90E" } ] } @@ -1509,63 +95,122 @@ "references": [ { "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7314e613d5ff9f0934f7a0f74ed7973b903315d1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2013/11/04/22", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2064-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2065-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2066-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2067-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2068-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2069-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2070-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2071-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2072-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2073-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2074-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2075-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2076-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1", diff --git a/CVE-2014/CVE-2014-28xx/CVE-2014-2851.json b/CVE-2014/CVE-2014-28xx/CVE-2014-2851.json index 661a025cd83..0b1445b7689 100644 --- a/CVE-2014/CVE-2014-28xx/CVE-2014-2851.json +++ b/CVE-2014/CVE-2014-28xx/CVE-2014-2851.json @@ -2,7 +2,7 @@ "id": "CVE-2014-2851", "sourceIdentifier": "cve@mitre.org", "published": "2014-04-14T23:55:07.920", - "lastModified": "2020-08-26T19:43:45.683", + "lastModified": "2023-12-15T15:57:53.773", "vulnStatus": "Analyzed", "descriptions": [ { @@ -63,8 +63,42 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndIncluding": "3.14.1", - "matchCriteriaId": "BCA1B8AC-8CF2-444F-9A49-273B9BBF00BC" + "versionStartIncluding": "3.0", + "versionEndExcluding": "3.2.60", + "matchCriteriaId": "43B40873-52BD-48B6-AC1D-02722B2F628C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.3", + "versionEndExcluding": "3.4.92", + "matchCriteriaId": "AB7FAE85-A7F7-403F-B3F8-51D26A7AD5CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.5", + "versionEndExcluding": "3.10.41", + "matchCriteriaId": "F679CA52-B924-4498-BD5A-6B52D03EBBAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.11", + "versionEndExcluding": "3.12.19", + "matchCriteriaId": "AB10EE4B-C72C-4D4C-AEC7-A8685137AB75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.13", + "versionEndExcluding": "3.14.5", + "matchCriteriaId": "80087996-AEE9-4831-B60E-6E022036FF11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*", + "matchCriteriaId": "D30AEC07-3CBD-4F4F-9646-BEAA1D98750B" } ] } @@ -87,6 +121,20 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/59386", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/59599", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://www.debian.org/security/2014/dsa-2926", "source": "cve@mitre.org", diff --git a/CVE-2019/CVE-2019-148xx/CVE-2019-14835.json b/CVE-2019/CVE-2019-148xx/CVE-2019-14835.json index 96f1c21ac2f..05e1e67afa9 100644 --- a/CVE-2019/CVE-2019-148xx/CVE-2019-14835.json +++ b/CVE-2019/CVE-2019-148xx/CVE-2019-14835.json @@ -2,8 +2,8 @@ "id": "CVE-2019-14835", "sourceIdentifier": "secalert@redhat.com", "published": "2019-09-17T16:15:10.980", - "lastModified": "2023-02-12T23:35:17.573", - "vulnStatus": "Modified", + "lastModified": "2023-12-15T15:29:09.587", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -109,7 +109,6 @@ ], "configurations": [ { - "operator": "AND", "nodes": [ { "operator": "OR", @@ -167,7 +166,6 @@ ] }, { - "operator": "AND", "nodes": [ { "operator": "OR", @@ -203,7 +201,6 @@ ] }, { - "operator": "AND", "nodes": [ { "operator": "OR", @@ -229,7 +226,6 @@ ] }, { - "operator": "AND", "nodes": [ { "operator": "OR", @@ -250,7 +246,6 @@ ] }, { - "operator": "AND", "nodes": [ { "operator": "OR", @@ -541,17 +536,11 @@ ] }, { - "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:netapp:_steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D7BC7632-843E-44EF-93E8-D3485D04E393" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*", @@ -571,13 +560,17 @@ "vulnerable": true, "criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D" } ] } ] }, { - "operator": "AND", "nodes": [ { "operator": "OR", @@ -750,7 +743,6 @@ ] }, { - "operator": "AND", "nodes": [ { "operator": "OR", @@ -1038,11 +1030,17 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQFY6JYFIQ2VFQ7QCSXPWTUL5ZDNCJL5/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://seclists.org/bugtraq/2019/Nov/11", diff --git a/CVE-2020/CVE-2020-126xx/CVE-2020-12612.json b/CVE-2020/CVE-2020-126xx/CVE-2020-12612.json index 9a5932c9030..15be01cdf3a 100644 --- a/CVE-2020/CVE-2020-126xx/CVE-2020-12612.json +++ b/CVE-2020/CVE-2020-126xx/CVE-2020-12612.json @@ -2,23 +2,91 @@ "id": "CVE-2020-12612", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-12T14:15:07.327", - "lastModified": "2023-12-12T15:52:06.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-15T16:24:27.337", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue was discovered in BeyondTrust Privilege Management for Windows through 5.6. When specifying a program to elevate, it can typically be found within the Program Files (x86) folder and therefore uses the %ProgramFiles(x86)% environment variable. However, when this same policy gets pushed to a 32bit machine, this environment variable does not exist. Therefore, since the standard user can create a user level environment variable, they can repoint this variable to any folder the user has full control of. Then, the folder structure can be created in such a way that a rule matches and arbitrary code runs elevated." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en BeyondTrust Privilege Management para Windows hasta 5.6. Al especificar un programa para elevar, normalmente se puede encontrar dentro de la carpeta Archivos de programa (x86) y, por lo tanto, utiliza la variable de entorno %ProgramFiles(x86)%. Sin embargo, cuando esta misma pol\u00edtica se aplica a una m\u00e1quina de 32 bits, esta variable de entorno no existe. Por lo tanto, dado que el usuario est\u00e1ndar puede crear una variable de entorno a nivel de usuario, puede redirigir esta variable a cualquier carpeta sobre la que el usuario tenga control total. Luego, la estructura de carpetas se puede crear de tal manera que una regla coincida y el c\u00f3digo arbitrario se ejecute elevado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:beyondtrust:privilege_management_for_windows:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.6", + "matchCriteriaId": "0F67CF10-9F8A-4161-9789-AE3C4F6F4C18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:beyondtrust:privilege_management_for_windows:5.6:-:*:*:*:*:*:*", + "matchCriteriaId": "68575FC2-6FFA-4F05-AD98-D4CD1C1824F0" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.beyondtrust.com/support/changelog/privilege-management-for-windows-5-6-sr1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.beyondtrust.com/trust-center/security-advisories/bt22-09", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-126xx/CVE-2020-12615.json b/CVE-2020/CVE-2020-126xx/CVE-2020-12615.json index 45522c8ed6d..e556fe6058d 100644 --- a/CVE-2020/CVE-2020-126xx/CVE-2020-12615.json +++ b/CVE-2020/CVE-2020-126xx/CVE-2020-12615.json @@ -2,23 +2,91 @@ "id": "CVE-2020-12615", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-12T13:15:06.820", - "lastModified": "2023-12-12T13:43:48.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-15T16:04:51.323", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue was discovered in BeyondTrust Privilege Management for Windows through 5.6. When adding the Add Admin token to a process, and specifying that it runs at medium integrity with the user owning the process, this security token can be stolen and applied to arbitrary processes." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en BeyondTrust Privilege Management para Windows hasta 5.6. Al agregar el token Agregar administrador a un proceso y especificar que se ejecute con una integridad media y que el usuario sea propietario del proceso, este token de seguridad se puede robar y aplicar a procesos arbitrarios." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:beyondtrust:privilege_management_for_windows:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.6", + "matchCriteriaId": "0F67CF10-9F8A-4161-9789-AE3C4F6F4C18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:beyondtrust:privilege_management_for_windows:5.6:-:*:*:*:*:*:*", + "matchCriteriaId": "68575FC2-6FFA-4F05-AD98-D4CD1C1824F0" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.beyondtrust.com/support/changelog/privilege-management-for-windows-5-6-sr1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.beyondtrust.com/trust-center/security-advisories/bt22-07", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-271xx/CVE-2022-27140.json b/CVE-2022/CVE-2022-271xx/CVE-2022-27140.json index d3872625ed5..7b4aa8b883c 100644 --- a/CVE-2022/CVE-2022-271xx/CVE-2022-27140.json +++ b/CVE-2022/CVE-2022-271xx/CVE-2022-27140.json @@ -2,8 +2,8 @@ "id": "CVE-2022-27140", "sourceIdentifier": "cve@mitre.org", "published": "2022-04-12T17:15:09.887", - "lastModified": "2023-11-07T03:45:17.047", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-12-15T16:27:15.290", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -84,8 +84,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:express-fileupload_project:express-fileupload:1.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "8689B1F0-80B3-411B-A8F4-6AF5877B4B12" + "criteria": "cpe:2.3:a:express-fileupload_project:express-fileupload:1.3.1:*:*:*:*:node.js:*:*", + "matchCriteriaId": "C2BDDDE8-6D13-4146-93A1-0C5D16D85FF2" } ] } @@ -95,11 +95,17 @@ "references": [ { "url": "https://github.com/richardgirges/express-fileupload/issues/312#issuecomment-1134912967", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/richardgirges/express-fileupload/issues/329#issuecomment-1387288644", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.youtube.com/watch?v=4XpofFi84KI", diff --git a/CVE-2022/CVE-2022-461xx/CVE-2022-46141.json b/CVE-2022/CVE-2022-461xx/CVE-2022-46141.json index 248ff4d3364..7c9ddc3b3ae 100644 --- a/CVE-2022/CVE-2022-461xx/CVE-2022-46141.json +++ b/CVE-2022/CVE-2022-461xx/CVE-2022-46141.json @@ -2,19 +2,43 @@ "id": "CVE-2022-46141", "sourceIdentifier": "productcert@siemens.com", "published": "2023-12-12T12:15:10.003", - "lastModified": "2023-12-12T13:43:48.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-15T15:25:08.557", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SIMATIC STEP 7 (TIA Portal) (All versions < V19). An information disclosure vulnerability could allow a local attacker to gain access to the access level password of the SIMATIC S7-1200 and S7-1500 CPUs, when entered by a legitimate user in the hardware configuration of the affected application." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en SIMATIC STEP 7 (TIA Portal) (todas las versiones < V19). Una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n podr\u00eda permitir a un atacante local obtener acceso a la contrase\u00f1a de nivel de acceso de las CPU SIMATIC S7-1200 y S7-1500, cuando la ingresa un usuario leg\u00edtimo en la configuraci\u00f3n de hardware de la aplicaci\u00f3n afectada." } ], "metrics": { "cvssMetricV31": [ { - "source": "productcert@siemens.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, + { + "source": "productcert@siemens.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", @@ -36,8 +60,18 @@ }, "weaknesses": [ { - "source": "productcert@siemens.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + }, + { + "source": "productcert@siemens.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,10 +80,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:simatic_step_7:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19", + "matchCriteriaId": "F77226E4-F3B3-4D3B-B944-17CED48BD73A" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-887801.pdf", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-485xx/CVE-2022-48502.json b/CVE-2022/CVE-2022-485xx/CVE-2022-48502.json index 343a3b750ea..a3ff01ebd50 100644 --- a/CVE-2022/CVE-2022-485xx/CVE-2022-48502.json +++ b/CVE-2022/CVE-2022-485xx/CVE-2022-48502.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48502", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-31T20:15:10.303", - "lastModified": "2023-07-03T16:15:09.393", - "vulnStatus": "Modified", + "lastModified": "2023-12-15T15:47:33.157", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -60,8 +60,51 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndExcluding": "6.2", - "matchCriteriaId": "108695B6-7133-4B6C-80AF-0F66880FE858" + "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.121", + "matchCriteriaId": "D80EAC0B-0800-4E58-A184-64A1FA7F7EB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.40", + "matchCriteriaId": "69315BCC-36D2-45CD-84F8-381EDF8E38F3" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F" } ] } @@ -86,7 +129,11 @@ }, { "url": "https://security.netapp.com/advisory/ntap-20230703-0004/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://syzkaller.appspot.com/bug?extid=8778f030156c6cd16d72", diff --git a/CVE-2022/CVE-2022-485xx/CVE-2022-48564.json b/CVE-2022/CVE-2022-485xx/CVE-2022-48564.json index b78181a554a..5f0fe9e0704 100644 --- a/CVE-2022/CVE-2022-485xx/CVE-2022-48564.json +++ b/CVE-2022/CVE-2022-485xx/CVE-2022-48564.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48564", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-22T19:16:31.927", - "lastModified": "2023-10-11T23:15:10.140", - "vulnStatus": "Modified", + "lastModified": "2023-12-15T15:56:45.730", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -56,15 +56,22 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", - "versionEndExcluding": "3.7.7", - "matchCriteriaId": "4EED37C7-A681-40B6-BC79-A47AF7D9C495" + "versionEndExcluding": "3.6.13", + "matchCriteriaId": "BB8842D9-B554-4B83-9E2E-0FAF292E448A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.7.0", + "versionEndExcluding": "3.7.10", + "matchCriteriaId": "EEB52F35-D464-4C26-A253-1B96B2A4921A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.8.0", - "versionEndExcluding": "3.8.2", - "matchCriteriaId": "368003C0-1D3C-4A3D-A998-A2406DB72ACB" + "versionEndExcluding": "3.8.7", + "matchCriteriaId": "0B3EA658-770C-4707-814A-494492D8962F" }, { "vulnerable": true, @@ -72,11 +79,26 @@ "versionStartIncluding": "3.9.0", "versionEndExcluding": "3.9.1", "matchCriteriaId": "B6D7EFB7-52A8-4C10-B5F9-6F599F94CDC7" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", + "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:python:python:3.10.0:alpha1:*:*:*:*:*:*", - "matchCriteriaId": "D3A22303-914F-4EB6-9CCE-EE0D5EDB424B" + "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", + "matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE" } ] } @@ -96,11 +118,19 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20230929-0009/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48615.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48615.json index 5962721e0a4..5d72a6c81f8 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48615.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48615.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48615", "sourceIdentifier": "psirt@huawei.com", "published": "2023-12-12T08:15:06.937", - "lastModified": "2023-12-12T13:43:48.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-15T15:02:28.517", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + }, { "source": "psirt@huawei.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "psirt@huawei.com", "type": "Secondary", @@ -50,10 +80,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:ar617vw_firmware:v300r21c00spc200:*:*:*:*:*:*:*", + "matchCriteriaId": "3DE4F691-FB18-4844-89A3-D8618650CC8E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:huawei:ar617vw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5DE91A7-9567-4086-90FC-E13214E61FA6" + } + ] + } + ] + } + ], "references": [ { "url": "https://wr3nchsr.github.io/huawei-netengine-ar617vw-auth-root-rce/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48616.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48616.json index 52234a72ab6..14af41feb09 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48616.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48616.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48616", "sourceIdentifier": "psirt@huawei.com", "published": "2023-12-12T08:15:07.377", - "lastModified": "2023-12-12T13:43:48.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-15T15:27:11.247", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + }, { "source": "psirt@huawei.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + }, { "source": "psirt@huawei.com", "type": "Secondary", @@ -50,10 +80,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:ar617vw_firmware:v300r21c00spc200:*:*:*:*:*:*:*", + "matchCriteriaId": "3DE4F691-FB18-4844-89A3-D8618650CC8E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:huawei:ar617vw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5DE91A7-9567-4086-90FC-E13214E61FA6" + } + ] + } + ] + } + ], "references": [ { "url": "https://wr3nchsr.github.io/huawei-netengine-ar617vw-auth-root-rce/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20275.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20275.json index 57f8d6dace4..aa36776309a 100644 --- a/CVE-2023/CVE-2023-202xx/CVE-2023-20275.json +++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20275.json @@ -2,16 +2,40 @@ "id": "CVE-2023-20275", "sourceIdentifier": "ykramarz@cisco.com", "published": "2023-12-12T18:15:16.520", - "lastModified": "2023-12-12T18:58:44.580", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-15T16:53:57.570", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability in the AnyConnect SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to send packets with another VPN user's source IP address. This vulnerability is due to improper validation of the packet's inner source IP address after decryption. An attacker could exploit this vulnerability by sending crafted packets through the tunnel. A successful exploit could allow the attacker to send a packet impersonating another VPN user's IP address. It is not possible for the attacker to receive return packets." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la funci\u00f3n AnyConnect SSL VPN del software Cisco Adaptive Security Appliance (ASA) y el software Cisco Firepower Threat Defense (FTD) podr\u00eda permitir que un atacante remoto autenticado env\u00ede paquetes con la direcci\u00f3n IP de origen de otro usuario de VPN. Esta vulnerabilidad se debe a una validaci\u00f3n incorrecta de la direcci\u00f3n IP de origen interna del paquete despu\u00e9s del descifrado. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando paquetes manipulados a trav\u00e9s del t\u00fanel. Un exploit exitoso podr\u00eda permitir al atacante enviar un paquete suplantando la direcci\u00f3n IP de otro usuario de VPN. No es posible que el atacante reciba paquetes de devoluci\u00f3n." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -34,10 +58,1242 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "D482F818-0A8E-49D7-8E3E-0958019FA629" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.1.5:*:*:*:*:*:*:*", + "matchCriteriaId": "8E7BFB57-BC02-4930-A02F-83583E6A0FC2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.1.7:*:*:*:*:*:*:*", + "matchCriteriaId": "026F1960-C879-4611-A60A-96311B63CCA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2:*:*:*:*:*:*:*", + "matchCriteriaId": "EAF8B33E-0C95-467D-A865-0A234E69D0CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.8:*:*:*:*:*:*:*", + "matchCriteriaId": "EFF144F5-D933-4DE4-818C-001BD9E3958A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.14:*:*:*:*:*:*:*", + "matchCriteriaId": "00112ED3-FE7B-425B-9A28-1E5F2BC8BB01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.15:*:*:*:*:*:*:*", + "matchCriteriaId": "DDD491D5-FAAB-493F-91A6-D2F3B5F5970E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.17:*:*:*:*:*:*:*", + "matchCriteriaId": "1519F49D-588F-4B70-B38F-EF4F3E13FEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.20:*:*:*:*:*:*:*", + "matchCriteriaId": "15354443-5EB7-4712-B2DE-61DB33830759" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.24:*:*:*:*:*:*:*", + "matchCriteriaId": "248D6B44-E134-4DEC-A947-636824E3FDFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.26:*:*:*:*:*:*:*", + "matchCriteriaId": "0820A79C-F3EF-407F-9AC7-DCAB4CD39C89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.28:*:*:*:*:*:*:*", + "matchCriteriaId": "9D3E8805-85D2-4345-8076-039513209A31" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.33:*:*:*:*:*:*:*", + "matchCriteriaId": "14BB907B-D75A-4F5E-B20D-5457A71A70EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.35:*:*:*:*:*:*:*", + "matchCriteriaId": "F118B803-4C55-436A-A136-0C1FEA49858F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.38:*:*:*:*:*:*:*", + "matchCriteriaId": "6A272121-408E-45F6-A2A1-0BA6EBC060A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3:*:*:*:*:*:*:*", + "matchCriteriaId": "980CEA3B-5A81-4E8C-BEA3-DD31BE7DA2CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.8:*:*:*:*:*:*:*", + "matchCriteriaId": "A3910211-D4DB-4CA7-BBEA-DD8246FF10ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.11:*:*:*:*:*:*:*", + "matchCriteriaId": "C260BF30-7A33-4C70-9509-404856C93666" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.14:*:*:*:*:*:*:*", + "matchCriteriaId": "AF894850-39EC-4B57-BBFF-F1AB4F8389A7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.16:*:*:*:*:*:*:*", + "matchCriteriaId": "E1FAFCF9-0ABE-483E-9604-329762BB7870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.18:*:*:*:*:*:*:*", + "matchCriteriaId": "83DB4278-3126-4765-97C4-6C0A8C78DA78" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.21:*:*:*:*:*:*:*", + "matchCriteriaId": "174E631B-6099-47DE-8790-BBF4B7FDB8CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.26:*:*:*:*:*:*:*", + "matchCriteriaId": "9FE3538B-F612-4105-BFDE-A4B594482DCF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.29:*:*:*:*:*:*:*", + "matchCriteriaId": "3143B0FF-C855-485E-A908-E48974B1643C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4:*:*:*:*:*:*:*", + "matchCriteriaId": "26DD9992-6D98-4E03-9599-ECF38A186FBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.3:*:*:*:*:*:*:*", + "matchCriteriaId": "24DCEAE6-355B-40AE-A7C8-AF744FCA8A86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.7:*:*:*:*:*:*:*", + "matchCriteriaId": "2097E81E-B422-4B93-AF09-F300A0E8AF71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.8:*:*:*:*:*:*:*", + "matchCriteriaId": "454DEA31-A607-4054-82D3-24A4FEB7358F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.10:*:*:*:*:*:*:*", + "matchCriteriaId": "57F0B213-8187-4465-84F1-FB8D92B36020" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.12:*:*:*:*:*:*:*", + "matchCriteriaId": "E540771E-BA0B-42D1-8251-B576B0F142C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.15:*:*:*:*:*:*:*", + "matchCriteriaId": "BEC2A833-BECF-4000-A592-6113A84C2D20" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.17:*:*:*:*:*:*:*", + "matchCriteriaId": "077F1416-924A-4D25-9CEE-3BD66A96A019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.20:*:*:*:*:*:*:*", + "matchCriteriaId": "5BDC8D92-D6E0-40EE-B190-D2B32C7DEB75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.22:*:*:*:*:*:*:*", + "matchCriteriaId": "23CD5619-E534-4F40-998D-39DC19FA0451" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.25:*:*:*:*:*:*:*", + "matchCriteriaId": "C5D0EB11-14B1-44B3-8D46-B9DD872F772C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.26:*:*:*:*:*:*:*", + "matchCriteriaId": "4FA399CF-12DB-42E0-A66F-14508B52A453" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.29:*:*:*:*:*:*:*", + "matchCriteriaId": "7B5A7608-E737-420E-9B5E-836600DAC701" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.32:*:*:*:*:*:*:*", + "matchCriteriaId": "C7EB6801-336D-4F41-ADE7-1C58C63C3F6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.33:*:*:*:*:*:*:*", + "matchCriteriaId": "8413DA41-02A5-4269-8C88-9DD5076AF91B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.34:*:*:*:*:*:*:*", + "matchCriteriaId": "AA00285F-6914-4749-8A47-FC4EDAFFF3C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.35:*:*:*:*:*:*:*", + "matchCriteriaId": "4AA4D367-32B9-4F54-8352-A959F61A1FDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.39:*:*:*:*:*:*:*", + "matchCriteriaId": "2259FF9E-0C8B-440F-B1AC-51BDE3F60E68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.40:*:*:*:*:*:*:*", + "matchCriteriaId": "3C522B55-904D-4C08-B73E-1457D877C0AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.41:*:*:*:*:*:*:*", + "matchCriteriaId": "4483056A-FBF3-4E00-81EB-1E97334EF240" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.43:*:*:*:*:*:*:*", + "matchCriteriaId": "48677330-06AB-4C7F-B2AD-F7E465A9632A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.44:*:*:*:*:*:*:*", + "matchCriteriaId": "7AEA80D2-5DB8-4334-9A88-7DDE395832C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.45:*:*:*:*:*:*:*", + "matchCriteriaId": "FB1C38A5-1028-4AD3-8CC7-A00091091E76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.46:*:*:*:*:*:*:*", + "matchCriteriaId": "848147B2-C49A-43F6-9069-FC8885BDFDA3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.48:*:*:*:*:*:*:*", + "matchCriteriaId": "D6FEF0DA-741E-4361-8143-068EB47D6520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F002FD55-F881-450E-BC1B-8073E188F47E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "AA940C4F-13BB-465F-BB8D-CBD0109BF012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "8B0434F5-9A50-4B57-9C5B-E09415D098C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2:*:*:*:*:*:*:*", + "matchCriteriaId": "AE727035-06CB-4E37-A9D2-96BD54502120" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9FE52B81-2CF8-48E5-A7BA-A163A25A669B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.4:*:*:*:*:*:*:*", + "matchCriteriaId": "D8E8D7C9-5272-40E6-869B-B33959F9F0CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "FE8D5D71-5C85-4644-8A84-F073549ADB50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.9:*:*:*:*:*:*:*", + "matchCriteriaId": "0790DDC2-7BA0-42DC-A157-754C0CBBE178" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3:*:*:*:*:*:*:*", + "matchCriteriaId": "882394EA-70C8-4D86-9AEF-5D273D8E518C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "855AD3CC-F404-48C5-80D2-7F2765D16D72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3.7:*:*:*:*:*:*:*", + "matchCriteriaId": "26B6BF72-9124-4213-B3C0-BD31B46E8C91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3.9:*:*:*:*:*:*:*", + "matchCriteriaId": "DE8FBE89-8FDA-4B9B-BA1A-90FFD482A585" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3.12:*:*:*:*:*:*:*", + "matchCriteriaId": "149C3872-8DA9-48DD-ADD0-2E84C1A76A40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4:*:*:*:*:*:*:*", + "matchCriteriaId": "D2D33E8C-294A-4C43-8DB6-9DA9F61F0B3B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "7E23ACB0-DF8B-4672-A819-4DCD3104CE4A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.4:*:*:*:*:*:*:*", + "matchCriteriaId": "E4723B88-62BA-40E6-AA89-BAC02D6A036F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.7:*:*:*:*:*:*:*", + "matchCriteriaId": "7C698819-3C8E-4A16-8F52-42FF1E54C076" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.8:*:*:*:*:*:*:*", + "matchCriteriaId": "8D3CE74E-59E7-448A-8417-18F97C05C798" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.10:*:*:*:*:*:*:*", + "matchCriteriaId": "0986C171-0E75-4F6F-A9BD-276830104E5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.13:*:*:*:*:*:*:*", + "matchCriteriaId": "66A2777A-7831-4324-AEB2-5D93B5F6C04B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.18:*:*:*:*:*:*:*", + "matchCriteriaId": "37045680-9189-4B7F-A4F7-4E682FE20A09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.24:*:*:*:*:*:*:*", + "matchCriteriaId": "B6C9F37B-CF3C-4861-A969-C7CF4946274A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.26:*:*:*:*:*:*:*", + "matchCriteriaId": "6A1DAF21-3FED-4691-9D4C-8FD8CEA7FB3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.29:*:*:*:*:*:*:*", + "matchCriteriaId": "FB938E58-4963-4A31-8836-88E958592B30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.30:*:*:*:*:*:*:*", + "matchCriteriaId": "1E317897-EE97-44F3-96BB-E54228D72A7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.35:*:*:*:*:*:*:*", + "matchCriteriaId": "1EF7FAB2-158D-4C48-9246-E7AD3BF1D801" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.37:*:*:*:*:*:*:*", + "matchCriteriaId": "056D43AE-ECDB-40D2-A196-18DDCD02629E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.38:*:*:*:*:*:*:*", + "matchCriteriaId": "D3E555F3-3580-4D71-8D8D-92FE72763D62" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.39:*:*:*:*:*:*:*", + "matchCriteriaId": "93013503-8B9A-4160-AF7E-277958FA6E9D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.40:*:*:*:*:*:*:*", + "matchCriteriaId": "A3B009FD-0F2B-4511-8EDF-C3E670623F89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.41:*:*:*:*:*:*:*", + "matchCriteriaId": "52579D8D-E855-42B3-B406-32DD1C39F721" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.47:*:*:*:*:*:*:*", + "matchCriteriaId": "E7E44FC6-12A2-4F76-A095-28F3804B619F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.48:*:*:*:*:*:*:*", + "matchCriteriaId": "42917E5E-E362-4B40-B2B2-3C77BA35641C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.50:*:*:*:*:*:*:*", + "matchCriteriaId": "CF317FA3-EBF3-49BB-A9E6-0D4295FA3F60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.52:*:*:*:*:*:*:*", + "matchCriteriaId": "F98B1683-914F-43D3-AE1C-311D3A90BE8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.54:*:*:*:*:*:*:*", + "matchCriteriaId": "A8D24656-CAB1-4A98-A440-482927FEDD16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.55:*:*:*:*:*:*:*", + "matchCriteriaId": "E504557C-DA5D-4D0F-A813-4CE7D5109F15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.56:*:*:*:*:*:*:*", + "matchCriteriaId": "04D2A067-C717-4921-BBF5-3EFBE02736EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.58:*:*:*:*:*:*:*", + "matchCriteriaId": "36DDEC5B-4BEA-499C-9F34-BB3D39B7A963" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1:*:*:*:*:*:*:*", + "matchCriteriaId": "52D83C3A-ED0B-42D5-A08A-97D27E189875" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.6:*:*:*:*:*:*:*", + "matchCriteriaId": "A649E319-D408-4AA2-8293-C9E37AF14BA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "F4187EFE-4D7E-4493-A6E0-24C98256CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.15:*:*:*:*:*:*:*", + "matchCriteriaId": "6730194F-5069-40AB-AE66-871D3992560C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.19:*:*:*:*:*:*:*", + "matchCriteriaId": "9E257F98-D1A0-4D28-9504-1749CC090D49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.30:*:*:*:*:*:*:*", + "matchCriteriaId": "3FF1A5FC-73BE-4218-86D9-2E81FA64EABD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2:*:*:*:*:*:*:*", + "matchCriteriaId": "4E492943-6EC0-4E34-9DBC-DD1C2CF1CDCC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.4:*:*:*:*:*:*:*", + "matchCriteriaId": "589E46F3-8038-4B87-8C40-55C6268B82F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.8:*:*:*:*:*:*:*", + "matchCriteriaId": "3F3B73F6-139E-42DC-B895-DDD17B5A1138" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.13:*:*:*:*:*:*:*", + "matchCriteriaId": "0A2590E7-FE04-4B29-B36B-AABAA5F3B9AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.15:*:*:*:*:*:*:*", + "matchCriteriaId": "3E4FD5E3-7E82-4294-8B05-D2045D857029" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3:*:*:*:*:*:*:*", + "matchCriteriaId": "4E998A4A-5346-4CFA-A617-FD1106C6B7A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "91265549-A16E-4A00-A031-4F1EB8D6881C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.9:*:*:*:*:*:*:*", + "matchCriteriaId": "EA3C316B-5485-4CDD-A1A1-6C0A9CB4719F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.11:*:*:*:*:*:*:*", + "matchCriteriaId": "ECE6D033-7B8B-4F61-B653-0C0EF13466EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.13:*:*:*:*:*:*:*", + "matchCriteriaId": "14441650-DAD5-4959-83DF-4D6F3D6A05FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.15:*:*:*:*:*:*:*", + "matchCriteriaId": "1B21ABC9-A64B-43E4-8951-1E6C0F427DBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.18:*:*:*:*:*:*:*", + "matchCriteriaId": "A48EC041-322F-422D-B95B-0FC07BDA2B6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4:*:*:*:*:*:*:*", + "matchCriteriaId": "FE0D50C0-DADB-4747-8649-8A5257111FE6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.6:*:*:*:*:*:*:*", + "matchCriteriaId": "FEE2699F-353F-44CB-A778-981783DDC31F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.7:*:*:*:*:*:*:*", + "matchCriteriaId": "7D8E50BD-1FBD-483B-9C27-70E95C732E55" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.12:*:*:*:*:*:*:*", + "matchCriteriaId": "F46E5E4F-787C-4C05-B1E7-C39BB9125D16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.13:*:*:*:*:*:*:*", + "matchCriteriaId": "D6A29312-38E7-456B-94DD-4D7329691114" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.14:*:*:*:*:*:*:*", + "matchCriteriaId": "27F7BB31-C733-4C32-BF0F-33B5AF020156" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.15:*:*:*:*:*:*:*", + "matchCriteriaId": "DC313568-33A6-435B-98FF-8A7091D9C451" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.17:*:*:*:*:*:*:*", + "matchCriteriaId": "7F85710A-28CE-4913-8523-356461908FBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.22:*:*:*:*:*:*:*", + "matchCriteriaId": "D6069950-016B-419A-B754-D58956CB6D14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.23:*:*:*:*:*:*:*", + "matchCriteriaId": "5A2F3FEC-624F-47C5-B056-836861BB038A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1:*:*:*:*:*:*:*", + "matchCriteriaId": "EA0B9B73-A9E6-4924-9EAE-B57E534938FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "012812C4-EFF8-465F-A771-134BEB617CC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.7:*:*:*:*:*:*:*", + "matchCriteriaId": "E06141A9-8C37-445A-B58A-45739AFE7D4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "7EDC09E5-51D3-4672-B910-B34A9CBD6128" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.15:*:*:*:*:*:*:*", + "matchCriteriaId": "71ED7A71-81CB-444C-A4ED-EA4A58D5E73C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.16:*:*:*:*:*:*:*", + "matchCriteriaId": "CAD13331-0EB8-4C8D-85CC-D96CA9F829AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.17:*:*:*:*:*:*:*", + "matchCriteriaId": "7137F22B-F993-4620-9378-9412DAEA9EF6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.21:*:*:*:*:*:*:*", + "matchCriteriaId": "923A40E8-6456-4288-B9AB-DBF5F9C4246A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.1:*:*:*:*:*:*:*", + "matchCriteriaId": "13F57A86-6284-4269-823E-B30C57185D14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.1.28:*:*:*:*:*:*:*", + "matchCriteriaId": "F6560447-039C-40FA-A24D-C8994AC2743B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2:*:*:*:*:*:*:*", + "matchCriteriaId": "378ED826-F5FE-40BA-9FC0-9C185A13518B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "130B6FD9-764D-4EF8-91AA-37E52AE9B3E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "225861CE-FFF8-4AFA-A07B-CB8D5BC9C361" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.11:*:*:*:*:*:*:*", + "matchCriteriaId": "FD08C4E8-3ADB-4048-9B3C-4F0385201523" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.13:*:*:*:*:*:*:*", + "matchCriteriaId": "A4875811-F209-49ED-B310-8377B2F87FF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.14:*:*:*:*:*:*:*", + "matchCriteriaId": "99C52C7B-B626-4A3C-A2EC-28A20E7FA95F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3:*:*:*:*:*:*:*", + "matchCriteriaId": "08CCBF5E-257A-4A1F-8930-3643A9588838" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "782BC9ED-1395-472B-9F34-DED812AA5BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.14:*:*:*:*:*:*:*", + "matchCriteriaId": "153449C0-B93F-49A2-8A6A-BE84305E8D2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.15:*:*:*:*:*:*:*", + "matchCriteriaId": "853A002C-839A-4372-8485-750A86E9F6E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.19:*:*:*:*:*:*:*", + "matchCriteriaId": "C62BB5D6-CE75-4C83-82DC-4148EF8CB1F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.23:*:*:*:*:*:*:*", + "matchCriteriaId": "D32F1365-EAF8-4570-B2FF-45E47E8586F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4:*:*:*:*:*:*:*", + "matchCriteriaId": "DFD07F9B-6BB3-4423-8DBE-4E89A6478E65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.9:*:*:*:*:*:*:*", + "matchCriteriaId": "34FE4F28-B704-4325-AE8A-C790163FEE71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.14:*:*:*:*:*:*:*", + "matchCriteriaId": "E832BC0C-8439-4779-9064-C2D93F231031" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.18:*:*:*:*:*:*:*", + "matchCriteriaId": "FA99DF94-D031-4375-9A16-306606FE28F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.19:*:*:*:*:*:*:*", + "matchCriteriaId": "FC149D03-5609-46E6-A1B3-F4D91F282B49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.27:*:*:*:*:*:*:*", + "matchCriteriaId": "B5D7FC6F-1370-4272-97E5-226C2ED1D335" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1:*:*:*:*:*:*:*", + "matchCriteriaId": "27ACBA2A-87A7-4836-A474-AFD7D22F820D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.7:*:*:*:*:*:*:*", + "matchCriteriaId": "C73E0B2E-BABF-4998-A1D7-4E803F9D78AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.9:*:*:*:*:*:*:*", + "matchCriteriaId": "59306ADF-FAA6-4970-ADFB-C5D9A5AEF1AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "959107AC-E9EC-467C-901B-A3164E3762E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.11:*:*:*:*:*:*:*", + "matchCriteriaId": "6F944F8F-0255-42BE-BD44-D21EC9F0FFC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.13:*:*:*:*:*:*:*", + "matchCriteriaId": "0F39C535-5A41-47CE-A9CF-B360998D4BF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.15:*:*:*:*:*:*:*", + "matchCriteriaId": "E9CEAEFC-7B82-41F9-A09D-C86A3A60A4FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.20:*:*:*:*:*:*:*", + "matchCriteriaId": "40FAC31D-19C0-4BA0-A019-C7E7A0BA0B5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.30:*:*:*:*:*:*:*", + "matchCriteriaId": "6CAAFE0F-416F-4BCA-BA37-30EAEADA8AFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.1:*:*:*:*:*:*:*", + "matchCriteriaId": "0BA16A6D-2747-4DAC-A30A-166F1FD906FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "289F9874-FC01-4809-9BDA-1AF583FB60B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2:*:*:*:*:*:*:*", + "matchCriteriaId": "74EDFC67-E4EE-4D2C-BF9F-5881C987C662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "826869BE-4874-4BBA-9392-14851560BA10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "EF52D477-3045-45D1-9FD3-12F396266463" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2.8:*:*:*:*:*:*:*", + "matchCriteriaId": "88E310BF-F1F6-4124-A875-81967B9B531E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3:*:*:*:*:*:*:*", + "matchCriteriaId": "5B330F8F-F0DA-472C-A932-AD1D232C7DB5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3.39:*:*:*:*:*:*:*", + "matchCriteriaId": "6BF59DAA-268C-4FCF-A0AA-7967128AEBC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3.46:*:*:*:*:*:*:*", + "matchCriteriaId": "140ED95D-173C-4ADB-A2E6-97F0D595D1AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1:*:*:*:*:*:*:*", + "matchCriteriaId": "BEE52F59-AABA-4069-A909-64AD5DFD2B18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.5:*:*:*:*:*:*:*", + "matchCriteriaId": "20D7966E-B02B-48C8-BF96-723DD6C25314" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.9:*:*:*:*:*:*:*", + "matchCriteriaId": "FA618249-E76F-4104-9326-C9F2DC8DE3D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.12:*:*:*:*:*:*:*", + "matchCriteriaId": "7C925E1F-6BD9-4CD1-8AC4-4263A9094786" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "1D726F07-06F1-4B0A-B010-E607E0C2A280" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "0FAD2427-82A3-4E64-ADB5-FA4F40B568F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "08D5A647-AC21-40AC-8B3C-EE5D3EDA038A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "0BAE999A-5244-46CF-8C12-D68E789BDEE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "D6468D3D-C5A7-4FAE-B4B9-AD862CD11055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D6E4808D-592E-46A6-A83A-A46227D817B8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.6:*:*:*:*:*:*:*", + "matchCriteriaId": "1AB45136-ACCD-4230-8975-0EBB30D5B375" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.7:*:*:*:*:*:*:*", + "matchCriteriaId": "B2C39AC1-1B96-4253-9FC8-4CC26D6261F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.8:*:*:*:*:*:*:*", + "matchCriteriaId": "DE9102C8-F211-4E50-967F-FD51C7FC904F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.9:*:*:*:*:*:*:*", + "matchCriteriaId": "B4933642-89E5-4909-AD3C-862CD3B77790" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.10:*:*:*:*:*:*:*", + "matchCriteriaId": "A9A6C776-79B3-47ED-B013-100B8F08E1C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.11:*:*:*:*:*:*:*", + "matchCriteriaId": "E504F28A-44CE-4B3E-9330-6A98728E3AEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.12:*:*:*:*:*:*:*", + "matchCriteriaId": "FEA0DD43-D206-4C1C-8B17-DA47F96B3BAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.13:*:*:*:*:*:*:*", + "matchCriteriaId": "1983172D-4F52-479F-BF14-A84B92D36864" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.14:*:*:*:*:*:*:*", + "matchCriteriaId": "4122D982-A57A-4249-A8DC-CE9FC6C98803" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.15:*:*:*:*:*:*:*", + "matchCriteriaId": "96464380-F665-4266-B0AD-693E078C9F82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.16:*:*:*:*:*:*:*", + "matchCriteriaId": "4C230B8A-570D-4F58-83E1-AFA50B813EA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.17:*:*:*:*:*:*:*", + "matchCriteriaId": "FD3F39CB-C4C2-4B13-94F0-9E44322314BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.18:*:*:*:*:*:*:*", + "matchCriteriaId": "59A71873-0EB2-418F-AE33-8474A1010FA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B2DF0B07-8C2A-4341-8AFF-DE7E5E5B3A43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "6E6BD0EE-649E-4ED6-A09C-8364335DEF52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "1AE11554-FE3C-4C8B-8986-5D88E4967342" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E1C11983-22A8-4859-A240-571A7815FF54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "24CD0B0A-2B91-45DD-9522-8D1D3850CC9B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "B7026F0E-72A7-4CDF-BADC-E34FE6FADC51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "63B85369-FBAE-456C-BC99-5418B043688A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "86434346-D5F0-49BA-803E-244C3266E361" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "D2FA7B3C-002D-4755-B323-CA24B770A5B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "F1CB7EBC-F3D5-4855-A8D8-BA5AB21FD719" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.10:*:*:*:*:*:*:*", + "matchCriteriaId": "F2A5530C-DF29-421B-9712-3454C1769446" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.11:*:*:*:*:*:*:*", + "matchCriteriaId": "41170977-FEEA-4B51-BF98-8493096CD691" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.12:*:*:*:*:*:*:*", + "matchCriteriaId": "B05791F9-0B31-4C4C-A9BA-9268CAA45FB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.13:*:*:*:*:*:*:*", + "matchCriteriaId": "4D975CBA-7F01-4A4C-991B-9571410C4F07" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.14:*:*:*:*:*:*:*", + "matchCriteriaId": "B6D7AF29-4E08-4BFD-AFE0-994309E66F08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.15:*:*:*:*:*:*:*", + "matchCriteriaId": "D2EFA476-5021-4A00-859E-1643009D6156" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.16:*:*:*:*:*:*:*", + "matchCriteriaId": "E6E3A5DC-A237-46E4-A4E5-F135482F984A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DCD69468-8067-4A5D-B2B0-EC510D889AA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.6.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "20AE4051-FA3B-4F0B-BD3D-083A14269FF6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "46A42D07-FF3E-41B4-BA39-3A5BDA4E0E61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "3985EA37-2B77-45F2-ABA5-5CCC7B35CA2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "67FB5ABE-3C40-4C58-B91F-0621C2180FAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.6.5:*:*:*:*:*:*:*", + "matchCriteriaId": "53909FD6-EC74-4D2F-99DA-26E70400B53F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.6.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "55FE024D-0D43-40AD-9645-8C54ECF17824" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.6.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "EC411A8D-CD39-46F5-B8FC-6753E618FAEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.6.7:*:*:*:*:*:*:*", + "matchCriteriaId": "D46E2E00-BA86-4002-B67B-2C1A6C1AAAE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.6.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "91AD8BA2-EB8D-4D8B-B707-AF5C2A831998" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "85F22403-B4EE-4303-9C94-915D3E0AC944" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "828E3DE1-B62E-4FEC-AAD3-EB0E452C9CBC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "596EC5DD-D7F4-44C8-B4B5-E2DC142FC486" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "C356E0E6-5B87-40CF-996E-6FFEDFD82A31" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BBCA75A6-0A3E-4393-8884-9F3CE190641E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.0.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "3F3C12D3-7662-46C5-9E88-D1BE6CF605E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "046B53A0-6BC1-461A-9C28-C534CE12C4BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.0.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "3CA889E1-4E8F-4ECE-88AC-7A240D5CBF0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "5D1C767F-3E06-43B7-A0CC-D51D97A053EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.0.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "43A950B0-A7CA-4CE7-A393-A18C8C41B08E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A7E221CB-BD0F-4AEE-8646-998B75647714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "225382DE-2919-48F4-9CC0-DE685EAAFDF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "FBA2DFE7-F478-46EC-9832-4B2C738FC879" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "39FE5927-2421-4CBE-97EA-6AED892DA1C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D619BF54-1BA9-45D0-A876-92D7010088A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "469EA365-DED5-4436-AAC2-5553529DE700" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "4D94F400-5A35-41F5-B37F-E9DA6F87ED8E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "5364CB94-BEA3-4E9A-A2F9-EE96A2D7F8AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "16FD5D12-CF1A-4990-99B3-1840EFBA5611" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.2.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "FCD2D11D-FF08-44E4-BF67-D8DD1E701FCD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F788D156-1F1F-4A08-848B-257BC4CCE000" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "795ED164-7800-4D50-8E37-665BE30190D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "1B0664B8-1670-4F47-A01E-089D05A9618A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.2.4:*:*:*:*:*:*:*", + "matchCriteriaId": "F6826018-5620-4924-BE92-6A245378F610" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "EBC0C3DC-4761-488A-90A9-6EA45EE61526" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "62EE065B-F8B6-4125-8486-B2EE0566B27A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.3.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5245DEF8-64BE-47C9-AA3C-DF3F7F92A89F" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssl-vpn-Y88QOm77", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2163.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2163.json index 6cf44d78c9b..5b2675288c5 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2163.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2163.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2163", "sourceIdentifier": "cve-coordination@google.com", "published": "2023-09-20T06:15:10.233", - "lastModified": "2023-09-22T02:02:18.047", + "lastModified": "2023-12-15T15:48:16.843", "vulnStatus": "Analyzed", "descriptions": [ { @@ -90,44 +90,37 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "5.4", - "versionEndExcluding": "6.3", - "matchCriteriaId": "491F7279-0F8E-413F-9D46-FFEBDBF1DAEA" + "versionStartIncluding": "5.3", + "versionEndExcluding": "5.4.242", + "matchCriteriaId": "9C1E37DC-B08A-4CB0-B689-FE26E2B39375" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:*", - "matchCriteriaId": "B8E3B0E8-FA27-4305-87BB-AF6C25B160CB" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.179", + "matchCriteriaId": "3567B8E6-5C31-435F-95D1-6A2BB44CB9D1" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:*", - "matchCriteriaId": "A47F0FC3-CE52-4BA1-BA51-22F783938431" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.109", + "matchCriteriaId": "4C603326-394E-408E-B5E1-011979F7BD9D" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:*", - "matchCriteriaId": "3583026A-27EC-4A4C-850A-83F2AF970673" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.26", + "matchCriteriaId": "23989D73-416D-4C1B-8D9D-2A43A43DA115" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:6.3:rc4:*:*:*:*:*:*", - "matchCriteriaId": "DC271202-7570-4505-89A4-D602D47BFD00" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:6.3:rc5:*:*:*:*:*:*", - "matchCriteriaId": "D413BB6D-4F74-4C7D-9163-47786619EF53" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:6.3:rc6:*:*:*:*:*:*", - "matchCriteriaId": "F4D613FB-9976-4989-8C4A-567773373CEA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:6.3:rc7:*:*:*:*:*:*", - "matchCriteriaId": "B1240A34-749A-49F5-B8DD-C09441AD2228" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.2.13", + "matchCriteriaId": "BFF8B56C-0201-4D6A-901E-C9C643C04FF6" } ] } diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28465.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28465.json index 0f7d9952789..3391ac43d31 100644 --- a/CVE-2023/CVE-2023-284xx/CVE-2023-28465.json +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28465.json @@ -2,27 +2,93 @@ "id": "CVE-2023-28465", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-12T17:15:07.770", - "lastModified": "2023-12-12T17:22:30.567", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-15T16:35:16.623", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The package-decompression feature in HL7 (Health Level 7) FHIR Core Libraries before 5.6.106 allows attackers to copy arbitrary files to certain directories via directory traversal, if an allowed directory name is a substring of the directory name chosen by the attacker. NOTE: this issue exists because of an incomplete fix for CVE-2023-24057." + }, + { + "lang": "es", + "value": "La funci\u00f3n de descompresi\u00f3n de paquetes en HL7 (Nivel de salud 7) FHIR Core Libraries anteriores a 5.6.106 permite a los atacantes copiar archivos arbitrarios a ciertos directorios a trav\u00e9s de directory traversal, si un nombre de directorio permitido es una subcadena del nombre del directorio elegido por el atacante. NOTA: este problema existe debido a una soluci\u00f3n incompleta para CVE-2023-24057." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hapifhir:hl7_fhir_core:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.6.106", + "matchCriteriaId": "1F3E9C93-63BA-4093-87C5-5D91722A1C50" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/advisories/GHSA-9654-pr4f-gh6m", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.smilecdr.com/our-blog", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "https://www.smilecdr.com/our-blog/statement-on-cve-2023-24057-smile-digital-health", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35639.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35639.json index 62c80a7767e..a0699bcf86c 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35639.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35639.json @@ -2,12 +2,16 @@ "id": "CVE-2023-35639", "sourceIdentifier": "secure@microsoft.com", "published": "2023-12-12T18:15:19.643", - "lastModified": "2023-12-12T18:58:37.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-15T15:08:40.127", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Microsoft ODBC Driver Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador ODBC de Microsoft" } ], "metrics": { @@ -34,10 +38,121 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20345", + "matchCriteriaId": "0FA29853-AA80-4D69-B5B2-09C29B73964A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.6529", + "matchCriteriaId": "1B72F8B2-FE1A-44FC-8534-66B016C3C3DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.5206", + "matchCriteriaId": "412DCA62-8009-40C3-B76C-F3791104F0C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19041.3803", + "matchCriteriaId": "C8412B39-CCB2-4FF5-B656-43C9EBF48E39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.3803", + "matchCriteriaId": "E59E6692-980B-435A-B9F3-AA00939E8D97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.2652", + "matchCriteriaId": "BC62CCFB-C4C4-4CD1-A291-9587375FE3C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.2861", + "matchCriteriaId": "11093E57-782B-4049-AFB2-AAFCFB4A8FF6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.2861", + "matchCriteriaId": "3E712F1D-26F9-4E19-B012-D7F0A92D59ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35639", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35641.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35641.json index 2293cbb2105..ed332d2cc9d 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35641.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35641.json @@ -2,12 +2,16 @@ "id": "CVE-2023-35641", "sourceIdentifier": "secure@microsoft.com", "published": "2023-12-12T18:15:19.823", - "lastModified": "2023-12-12T18:58:37.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-15T15:08:55.997", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Internet Connection Sharing (ICS) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de conexi\u00f3n compartida a Internet (ICS)" } ], "metrics": { @@ -34,10 +38,121 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20345", + "matchCriteriaId": "0FA29853-AA80-4D69-B5B2-09C29B73964A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.6529", + "matchCriteriaId": "1B72F8B2-FE1A-44FC-8534-66B016C3C3DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.5206", + "matchCriteriaId": "412DCA62-8009-40C3-B76C-F3791104F0C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19041.3803", + "matchCriteriaId": "C8412B39-CCB2-4FF5-B656-43C9EBF48E39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.3803", + "matchCriteriaId": "E59E6692-980B-435A-B9F3-AA00939E8D97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.2652", + "matchCriteriaId": "BC62CCFB-C4C4-4CD1-A291-9587375FE3C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.2861", + "matchCriteriaId": "11093E57-782B-4049-AFB2-AAFCFB4A8FF6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.2861", + "matchCriteriaId": "3E712F1D-26F9-4E19-B012-D7F0A92D59ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35641", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35642.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35642.json index 75fd8c01be1..83b5d6c5b35 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35642.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35642.json @@ -2,12 +2,16 @@ "id": "CVE-2023-35642", "sourceIdentifier": "secure@microsoft.com", "published": "2023-12-12T18:15:19.993", - "lastModified": "2023-12-12T18:58:37.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-15T15:09:31.000", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Internet Connection Sharing (ICS) Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio de conexi\u00f3n compartida a Internet (ICS)" } ], "metrics": { @@ -34,10 +38,121 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20345", + "matchCriteriaId": "0FA29853-AA80-4D69-B5B2-09C29B73964A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.6529", + "matchCriteriaId": "1B72F8B2-FE1A-44FC-8534-66B016C3C3DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.5206", + "matchCriteriaId": "412DCA62-8009-40C3-B76C-F3791104F0C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19041.3803", + "matchCriteriaId": "C8412B39-CCB2-4FF5-B656-43C9EBF48E39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.3803", + "matchCriteriaId": "E59E6692-980B-435A-B9F3-AA00939E8D97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.2652", + "matchCriteriaId": "BC62CCFB-C4C4-4CD1-A291-9587375FE3C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.2861", + "matchCriteriaId": "11093E57-782B-4049-AFB2-AAFCFB4A8FF6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.2861", + "matchCriteriaId": "3E712F1D-26F9-4E19-B012-D7F0A92D59ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35642", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35643.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35643.json index 41c3cc7f0cd..b5d6a9af206 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35643.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35643.json @@ -2,12 +2,16 @@ "id": "CVE-2023-35643", "sourceIdentifier": "secure@microsoft.com", "published": "2023-12-12T18:15:20.263", - "lastModified": "2023-12-12T18:58:37.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-15T15:09:45.080", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "DHCP Server Service Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n del servicio del servidor DHCP" } ], "metrics": { @@ -34,10 +38,63 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35643", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35644.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35644.json index 962f6e7c868..17357c7a163 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35644.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35644.json @@ -2,12 +2,16 @@ "id": "CVE-2023-35644", "sourceIdentifier": "secure@microsoft.com", "published": "2023-12-12T18:15:20.517", - "lastModified": "2023-12-12T18:58:37.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-15T15:10:04.680", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Windows Sysmain Service Elevation of Privilege" + }, + { + "lang": "es", + "value": "Elevaci\u00f3n de privilegios del Servicio Windows Sysmain" } ], "metrics": { @@ -34,10 +38,84 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.5206", + "matchCriteriaId": "412DCA62-8009-40C3-B76C-F3791104F0C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19041.3803", + "matchCriteriaId": "C8412B39-CCB2-4FF5-B656-43C9EBF48E39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.3803", + "matchCriteriaId": "E59E6692-980B-435A-B9F3-AA00939E8D97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.2652", + "matchCriteriaId": "BC62CCFB-C4C4-4CD1-A291-9587375FE3C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.2861", + "matchCriteriaId": "11093E57-782B-4049-AFB2-AAFCFB4A8FF6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.2861", + "matchCriteriaId": "3E712F1D-26F9-4E19-B012-D7F0A92D59ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35644", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3511.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3511.json new file mode 100644 index 00000000000..2f07ece0e5d --- /dev/null +++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3511.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-3511", + "sourceIdentifier": "cve@gitlab.com", + "published": "2023-12-15T16:15:43.053", + "lastModified": "2023-12-15T16:53:06.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An issue has been discovered in GitLab EE affecting all versions starting from 8.17 before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. It was possible for auditor users to fork and submit merge requests to private projects they're not a member of." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 2.0, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.5, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/416961", + "source": "cve@gitlab.com" + }, + { + "url": "https://hackerone.com/reports/2046752", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38428.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38428.json index 3b951ce3d86..5e7dab3a0cc 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38428.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38428.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38428", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-18T00:15:09.577", - "lastModified": "2023-08-31T19:15:10.410", - "vulnStatus": "Modified", + "lastModified": "2023-12-15T15:47:05.687", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -56,8 +56,63 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.113", + "matchCriteriaId": "75B3BF61-F56C-4BD7-94AF-50E17A4AA732" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.30", + "matchCriteriaId": "E9430E62-03EA-42E6-9E5E-BD1D5124D107" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", "versionEndExcluding": "6.3.4", - "matchCriteriaId": "AB636222-53A9-4558-A34C-B51C1F056730" + "matchCriteriaId": "26C54BF0-3EED-46D4-92A7-5F07F658B49B" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D6D700C5-F67F-4FFB-BE69-D524592A3D2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:solidfire_\\&_hci_storage_node:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D452B464-1200-4B72-9A89-42DC58486191" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F" } ] } @@ -81,7 +136,11 @@ }, { "url": "https://security.netapp.com/advisory/ntap-20230831-0001/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38431.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38431.json index 280792fb203..578ec6e1d0b 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38431.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38431.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38431", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-18T00:15:09.707", - "lastModified": "2023-08-24T19:15:39.913", - "vulnStatus": "Modified", + "lastModified": "2023-12-15T15:46:35.903", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -56,8 +56,51 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15", + "versionEndExcluding": "6.1.34", + "matchCriteriaId": "4F5A5D4B-4F1F-455D-8917-7785595FACF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", "versionEndExcluding": "6.3.8", - "matchCriteriaId": "733A9846-73C9-4358-B8ED-2560AEC047D2" + "matchCriteriaId": "7F3A71BC-4CD9-4F21-A84B-E615C990B4ED" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D6D700C5-F67F-4FFB-BE69-D524592A3D2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F" } ] } @@ -81,7 +124,10 @@ }, { "url": "https://security.netapp.com/advisory/ntap-20230824-0011/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3904.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3904.json new file mode 100644 index 00000000000..92b31554b78 --- /dev/null +++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3904.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-3904", + "sourceIdentifier": "cve@gitlab.com", + "published": "2023-12-15T16:15:43.387", + "lastModified": "2023-12-15T16:53:06.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An issue has been discovered in GitLab EE affecting all versions starting before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. It was possible to overflow the time spent on an issue that altered the details shown in the issue boards." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/418226", + "source": "cve@gitlab.com" + }, + { + "url": "https://hackerone.com/reports/2053154", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44362.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44362.json index 715c90b5530..c3b70bed6ce 100644 --- a/CVE-2023/CVE-2023-443xx/CVE-2023-44362.json +++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44362.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44362", "sourceIdentifier": "psirt@adobe.com", "published": "2023-12-13T12:15:07.363", - "lastModified": "2023-12-13T13:35:16.620", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-12-15T15:02:07.317", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,48 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:prelude:*:*:*:*:*:*:*:*", + "versionEndIncluding": "22.6", + "matchCriteriaId": "4CAA3A29-841A-42A2-BE0A-C0422F0B4B28" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/prelude/apsb23-67.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46116.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46116.json index 230e75bb6ec..5837a76c366 100644 --- a/CVE-2023/CVE-2023-461xx/CVE-2023-46116.json +++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46116.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46116", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-15T14:15:14.633", - "lastModified": "2023-12-15T14:15:14.633", - "vulnStatus": "Received", + "lastModified": "2023-12-15T15:26:42.177", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46283.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46283.json index ff3f737e5dc..78b065085f1 100644 --- a/CVE-2023/CVE-2023-462xx/CVE-2023-46283.json +++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46283.json @@ -2,12 +2,16 @@ "id": "CVE-2023-46283", "sourceIdentifier": "productcert@siemens.com", "published": "2023-12-12T12:15:14.067", - "lastModified": "2023-12-12T13:43:48.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-15T15:42:12.763", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Opcenter Quality (All versions), SIMATIC PCS neo (All versions < V4.1), SINUMERIK Integrate RunMyHMI\u00a0/Automotive (All versions), Totally Integrated Automation Portal (TIA Portal) V14 (All versions), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V18 (All versions < V18 Update 3). The affected application contains an out of bounds write past the end of an allocated buffer when handling specific requests on port 4002/tcp. This could allow an attacker to crash the application. The corresponding service is auto-restarted after the crash." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en:\nOpcenter Quality (todas las versiones), \nSIMATIC PCS neo (todas las versiones < V4.1), \nSINUMERIK Integrate RunMyHMI /Automotive (todas las versiones), \nTotally Integrated Automation Portal (TIA Portal) V14 (todas las versiones), \nTotally Integrated Automation Portal (TIA Portal) V15.1 (todas las versiones), \nTotally Integrated Automation Portal (TIA Portal) V16 (todas las versiones), \nTotally Integrated Automation Portal (TIA Portal) V17 (todas las versiones), \nTotally Integrated Automation Portal (TIA Portal) ) V18 (Todas las versiones " } ], "metrics": { @@ -46,10 +50,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:opcenter_quality:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D9D89CD-FDA5-42F0-8161-3752C8AED7F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:simatic_pcs_neo:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.1", + "matchCriteriaId": "96D49ACA-BF2E-4C89-8168-E4A95D5B22AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:sinumerik_integrate_runmyhmi_\\/automotive:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D882C3C8-EFE7-4DB6-B3E7-6152D7FEB74C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:totally_integrated_automation_portal:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "15", + "matchCriteriaId": "29E53F22-9086-40A2-85E0-20B58EC1E4BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:totally_integrated_automation_portal:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15", + "versionEndExcluding": "16", + "matchCriteriaId": "3F86DBB7-A5C7-43C4-8B64-0B67C90B79A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:totally_integrated_automation_portal:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16", + "versionEndExcluding": "17", + "matchCriteriaId": "B0BCF747-13ED-4AE7-9BE7-37858573AF27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:totally_integrated_automation_portal:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17", + "versionEndExcluding": "18", + "matchCriteriaId": "C83587B9-53E2-4B2F-9FE4-5DDD232571F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:totally_integrated_automation_portal:-:*:*:*:*:*:*:*", + "matchCriteriaId": "085B0B91-40DE-4328-A28C-1C920A6440D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:totally_integrated_automation_portal:18:*:*:*:*:*:*:*", + "matchCriteriaId": "68C7D9A3-9304-4A81-A970-717E5BA1ECF1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:totally_integrated_automation_portal:18:update_1:*:*:*:*:*:*", + "matchCriteriaId": "6A09C712-871D-4A81-A630-33BC5DF49FE5" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-999588.pdf", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46284.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46284.json index 72b0e9d1485..e0d84f2c12a 100644 --- a/CVE-2023/CVE-2023-462xx/CVE-2023-46284.json +++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46284.json @@ -2,12 +2,16 @@ "id": "CVE-2023-46284", "sourceIdentifier": "productcert@siemens.com", "published": "2023-12-12T12:15:14.273", - "lastModified": "2023-12-12T13:43:48.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-15T15:47:16.727", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Opcenter Quality (All versions), SIMATIC PCS neo (All versions < V4.1), SINUMERIK Integrate RunMyHMI\u00a0/Automotive (All versions), Totally Integrated Automation Portal (TIA Portal) V14 (All versions), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V18 (All versions < V18 Update 3). The affected application contains an out of bounds write past the end of an allocated buffer when handling specific requests on port 4002/tcp and 4004/tcp. This could allow an attacker to crash the application. The corresponding service is auto-restarted after the crash." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en:\nOpcenter Quality (todas las versiones), \nSIMATIC PCS neo (todas las versiones < V4.1), \nSINUMERIK Integrate RunMyHMI /Automotive (todas las versiones), \nTotally Integrated Automation Portal (TIA Portal) V14 (todas las versiones), \nTotally Integrated Automation Portal (TIA Portal) V15.1 (todas las versiones), \nTotally Integrated Automation Portal (TIA Portal) V16 (todas las versiones), \nTotally Integrated Automation Portal (TIA Portal) V17 (todas las versiones), \nTotally Integrated Automation Portal (TIA Portal) ) V18 (Todas las versiones " } ], "metrics": { @@ -36,8 +40,18 @@ }, "weaknesses": [ { - "source": "productcert@siemens.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "productcert@siemens.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,10 +60,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:opcenter_quality:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D9D89CD-FDA5-42F0-8161-3752C8AED7F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:simatic_pcs_neo:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.1", + "matchCriteriaId": "96D49ACA-BF2E-4C89-8168-E4A95D5B22AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:sinumerik_integrate_runmyhmi_\\/automotive:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D882C3C8-EFE7-4DB6-B3E7-6152D7FEB74C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:totally_integrated_automation_portal:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "15", + "matchCriteriaId": "29E53F22-9086-40A2-85E0-20B58EC1E4BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:totally_integrated_automation_portal:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15", + "versionEndExcluding": "16", + "matchCriteriaId": "3F86DBB7-A5C7-43C4-8B64-0B67C90B79A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:totally_integrated_automation_portal:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16", + "versionEndExcluding": "17", + "matchCriteriaId": "B0BCF747-13ED-4AE7-9BE7-37858573AF27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:totally_integrated_automation_portal:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17", + "versionEndExcluding": "18", + "matchCriteriaId": "C83587B9-53E2-4B2F-9FE4-5DDD232571F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:totally_integrated_automation_portal:-:*:*:*:*:*:*:*", + "matchCriteriaId": "085B0B91-40DE-4328-A28C-1C920A6440D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:totally_integrated_automation_portal:18:*:*:*:*:*:*:*", + "matchCriteriaId": "68C7D9A3-9304-4A81-A970-717E5BA1ECF1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:totally_integrated_automation_portal:18:update_1:*:*:*:*:*:*", + "matchCriteriaId": "6A09C712-871D-4A81-A630-33BC5DF49FE5" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-999588.pdf", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46285.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46285.json index 750708d5282..b82008bb49e 100644 --- a/CVE-2023/CVE-2023-462xx/CVE-2023-46285.json +++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46285.json @@ -2,12 +2,16 @@ "id": "CVE-2023-46285", "sourceIdentifier": "productcert@siemens.com", "published": "2023-12-12T12:15:14.477", - "lastModified": "2023-12-12T13:43:48.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-15T15:55:59.337", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Opcenter Quality (All versions), SIMATIC PCS neo (All versions < V4.1), SINUMERIK Integrate RunMyHMI\u00a0/Automotive (All versions), Totally Integrated Automation Portal (TIA Portal) V14 (All versions), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V18 (All versions < V18 Update 3). The affected application contains an improper input validation vulnerability that could allow an attacker to bring the service into a Denial-of-Service state by sending a specifically crafted message to 4004/tcp. The corresponding service is auto-restarted after the crash is detected by a watchdog." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en:\nOpcenter Quality (todas las versiones), \nSIMATIC PCS neo (todas las versiones < V4.1), \nSINUMERIK Integrate RunMyHMI /Automotive (todas las versiones), \nTotally Integrated Automation Portal (TIA Portal) V14 (todas las versiones), \nTotally Integrated Automation Portal (TIA Portal) V15.1 (todas las versiones), \nTotally Integrated Automation Portal (TIA Portal) V16 (todas las versiones), \nTotally Integrated Automation Portal (TIA Portal) V17 (todas las versiones), \nTotally Integrated Automation Portal (TIA Portal) ) V18 (Todas las versiones " } ], "metrics": { @@ -36,8 +40,18 @@ }, "weaknesses": [ { - "source": "productcert@siemens.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "productcert@siemens.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,10 +60,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:opcenter_quality:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D9D89CD-FDA5-42F0-8161-3752C8AED7F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:simatic_pcs_neo:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.1", + "matchCriteriaId": "96D49ACA-BF2E-4C89-8168-E4A95D5B22AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:sinumerik_integrate_runmyhmi_\\/automotive:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D882C3C8-EFE7-4DB6-B3E7-6152D7FEB74C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:totally_integrated_automation_portal:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "15", + "matchCriteriaId": "29E53F22-9086-40A2-85E0-20B58EC1E4BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:totally_integrated_automation_portal:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15", + "versionEndExcluding": "16", + "matchCriteriaId": "3F86DBB7-A5C7-43C4-8B64-0B67C90B79A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:totally_integrated_automation_portal:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16", + "versionEndExcluding": "17", + "matchCriteriaId": "B0BCF747-13ED-4AE7-9BE7-37858573AF27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:totally_integrated_automation_portal:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17", + "versionEndExcluding": "18", + "matchCriteriaId": "C83587B9-53E2-4B2F-9FE4-5DDD232571F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:totally_integrated_automation_portal:-:*:*:*:*:*:*:*", + "matchCriteriaId": "085B0B91-40DE-4328-A28C-1C920A6440D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:totally_integrated_automation_portal:18:*:*:*:*:*:*:*", + "matchCriteriaId": "68C7D9A3-9304-4A81-A970-717E5BA1ECF1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:totally_integrated_automation_portal:18:update_1:*:*:*:*:*:*", + "matchCriteriaId": "6A09C712-871D-4A81-A630-33BC5DF49FE5" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-999588.pdf", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-470xx/CVE-2023-47061.json b/CVE-2023/CVE-2023-470xx/CVE-2023-47061.json index 4ea5e5f2ba1..5b9dc2e2463 100644 --- a/CVE-2023/CVE-2023-470xx/CVE-2023-47061.json +++ b/CVE-2023/CVE-2023-470xx/CVE-2023-47061.json @@ -2,12 +2,16 @@ "id": "CVE-2023-47061", "sourceIdentifier": "psirt@adobe.com", "published": "2023-12-13T13:15:07.897", - "lastModified": "2023-12-13T13:35:16.620", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-12-15T15:03:10.887", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Adobe Dimension versions 3.4.10 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 3.4.10 y anteriores de Adobe Dimension se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para evitar mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { @@ -46,10 +50,48 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.4.11", + "matchCriteriaId": "1B11A01E-250A-4D61-987B-FC5E53A0F36C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/dimension/apsb23-71.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-470xx/CVE-2023-47062.json b/CVE-2023/CVE-2023-470xx/CVE-2023-47062.json index 75e32696cd2..5280a9f2b63 100644 --- a/CVE-2023/CVE-2023-470xx/CVE-2023-47062.json +++ b/CVE-2023/CVE-2023-470xx/CVE-2023-47062.json @@ -2,16 +2,40 @@ "id": "CVE-2023-47062", "sourceIdentifier": "psirt@adobe.com", "published": "2023-12-13T13:15:08.147", - "lastModified": "2023-12-13T13:35:16.620", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-12-15T15:03:45.373", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Adobe Dimension versions 3.4.10 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 3.4.10 y anteriores de Adobe Dimension se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para evitar mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "psirt@adobe.com", "type": "Secondary", @@ -46,10 +70,48 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.4.11", + "matchCriteriaId": "1B11A01E-250A-4D61-987B-FC5E53A0F36C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/dimension/apsb23-71.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-470xx/CVE-2023-47078.json b/CVE-2023/CVE-2023-470xx/CVE-2023-47078.json index 1a45258a3aa..915875f67f9 100644 --- a/CVE-2023/CVE-2023-470xx/CVE-2023-47078.json +++ b/CVE-2023/CVE-2023-470xx/CVE-2023-47078.json @@ -2,12 +2,16 @@ "id": "CVE-2023-47078", "sourceIdentifier": "psirt@adobe.com", "published": "2023-12-13T13:15:08.400", - "lastModified": "2023-12-13T13:35:16.620", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-12-15T15:05:06.677", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Adobe Dimension versions 3.4.10 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 3.4.10 y anteriores de Adobe Dimension se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para evitar mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { @@ -46,10 +50,48 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.4.11", + "matchCriteriaId": "1B11A01E-250A-4D61-987B-FC5E53A0F36C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/dimension/apsb23-71.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-470xx/CVE-2023-47079.json b/CVE-2023/CVE-2023-470xx/CVE-2023-47079.json index 9c003f9d976..9fc808d172e 100644 --- a/CVE-2023/CVE-2023-470xx/CVE-2023-47079.json +++ b/CVE-2023/CVE-2023-470xx/CVE-2023-47079.json @@ -2,12 +2,16 @@ "id": "CVE-2023-47079", "sourceIdentifier": "psirt@adobe.com", "published": "2023-12-13T13:15:08.680", - "lastModified": "2023-12-13T13:35:16.620", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-12-15T15:05:29.157", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Adobe Dimension versions 3.4.10 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 3.4.10 y anteriores de Adobe Dimension se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para evitar mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { @@ -46,10 +50,48 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.4.11", + "matchCriteriaId": "1B11A01E-250A-4D61-987B-FC5E53A0F36C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/dimension/apsb23-71.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-470xx/CVE-2023-47080.json b/CVE-2023/CVE-2023-470xx/CVE-2023-47080.json index abfcdff7f2e..94644fc5ed9 100644 --- a/CVE-2023/CVE-2023-470xx/CVE-2023-47080.json +++ b/CVE-2023/CVE-2023-470xx/CVE-2023-47080.json @@ -2,12 +2,16 @@ "id": "CVE-2023-47080", "sourceIdentifier": "psirt@adobe.com", "published": "2023-12-13T14:15:43.763", - "lastModified": "2023-12-13T14:27:29.077", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-15T15:06:17.920", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Adobe Substance 3D Stager versions 2.1.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2.1.1 y anteriores de Adobe Substance 3D Stager se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para evitar mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { @@ -46,10 +50,48 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.1.1", + "matchCriteriaId": "B5BB288F-C779-4ABA-A2D6-46634A31BD7B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/substance3d_stager/apsb23-73.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-470xx/CVE-2023-47081.json b/CVE-2023/CVE-2023-470xx/CVE-2023-47081.json index 3a2a1b009da..34d87fd6b3a 100644 --- a/CVE-2023/CVE-2023-470xx/CVE-2023-47081.json +++ b/CVE-2023/CVE-2023-470xx/CVE-2023-47081.json @@ -2,12 +2,16 @@ "id": "CVE-2023-47081", "sourceIdentifier": "psirt@adobe.com", "published": "2023-12-13T14:15:43.963", - "lastModified": "2023-12-13T14:27:29.077", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-15T15:06:41.627", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Adobe Substance 3D Stager versions 2.1.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2.1.1 y anteriores de Adobe Substance 3D Stager se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para evitar mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { @@ -46,10 +50,48 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.1.1", + "matchCriteriaId": "B5BB288F-C779-4ABA-A2D6-46634A31BD7B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/substance3d_stager/apsb23-73.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47271.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47271.json index 6c2809dc48c..4df7ccb6c0e 100644 --- a/CVE-2023/CVE-2023-472xx/CVE-2023-47271.json +++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47271.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47271", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-06T00:15:09.317", - "lastModified": "2023-11-14T15:22:23.650", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-15T16:15:43.587", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -69,6 +69,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/176255/PKP-WAL-3.4.0-3-Remote-Code-Execution.html", + "source": "cve@mitre.org" + }, { "url": "https://github.com/pkp/pkp-lib/issues/9464", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48765.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48765.json index 744ec18b3de..b8d085cb1e6 100644 --- a/CVE-2023/CVE-2023-487xx/CVE-2023-48765.json +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48765.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48765", "sourceIdentifier": "audit@patchstack.com", "published": "2023-12-15T14:15:14.853", - "lastModified": "2023-12-15T14:15:14.853", - "vulnStatus": "Received", + "lastModified": "2023-12-15T15:26:42.177", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49159.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49159.json new file mode 100644 index 00000000000..b00762adac9 --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49159.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49159", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-15T16:15:43.710", + "lastModified": "2023-12-15T16:53:06.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Server-Side Request Forgery (SSRF) vulnerability in Elegant Digital Solutions CommentLuv.This issue affects CommentLuv: from n/a through 3.0.4.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/commentluv/wordpress-commentluv-plugin-3-0-4-server-side-request-forgery-ssrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49160.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49160.json index 7e58563bdfb..c3af70a2989 100644 --- a/CVE-2023/CVE-2023-491xx/CVE-2023-49160.json +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49160.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49160", "sourceIdentifier": "audit@patchstack.com", "published": "2023-12-15T14:15:15.047", - "lastModified": "2023-12-15T14:15:15.047", - "vulnStatus": "Received", + "lastModified": "2023-12-15T15:26:42.177", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49165.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49165.json index 50cd16befb2..67a99fb4cc5 100644 --- a/CVE-2023/CVE-2023-491xx/CVE-2023-49165.json +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49165.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49165", "sourceIdentifier": "audit@patchstack.com", "published": "2023-12-15T14:15:15.240", - "lastModified": "2023-12-15T14:15:15.240", - "vulnStatus": "Received", + "lastModified": "2023-12-15T15:26:42.177", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49169.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49169.json new file mode 100644 index 00000000000..aa2220c8622 --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49169.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49169", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-15T15:15:07.683", + "lastModified": "2023-12-15T15:26:42.177", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in datafeedr.Com Ads by datafeedr.Com allows Stored XSS.This issue affects Ads by datafeedr.Com: from n/a through 1.2.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/ads-by-datafeedrcom/wordpress-ads-by-datafeedr-com-plugin-1-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49170.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49170.json new file mode 100644 index 00000000000..42b0dcbc4ea --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49170.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49170", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-15T15:15:07.890", + "lastModified": "2023-12-15T15:26:42.177", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in captainform Forms by CaptainForm \u2013 Form Builder for WordPress allows Reflected XSS.This issue affects Forms by CaptainForm \u2013 Form Builder for WordPress: from n/a through 2.5.3.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/captainform/wordpress-forms-by-captainform-form-builder-for-wordpress-plugin-2-5-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49174.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49174.json new file mode 100644 index 00000000000..b46d1f9f68c --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49174.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49174", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-15T15:15:08.090", + "lastModified": "2023-12-15T15:26:42.177", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in dFactory Responsive Lightbox & Gallery allows Stored XSS.This issue affects Responsive Lightbox & Gallery: from n/a through 2.4.5.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/responsive-lightbox/wordpress-responsive-lightbox-plugin-2-4-5-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49175.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49175.json new file mode 100644 index 00000000000..487bb23535a --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49175.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49175", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-15T15:15:08.287", + "lastModified": "2023-12-15T15:26:42.177", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kreativo Pro KP Fastest Tawk.To Chat allows Stored XSS.This issue affects KP Fastest Tawk.To Chat: from n/a through 1.1.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/kp-fastest-tawk-to-chat/wordpress-kp-fastest-tawk-to-chat-plugin-1-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49176.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49176.json new file mode 100644 index 00000000000..afc6f58ec16 --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49176.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49176", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-15T15:15:08.483", + "lastModified": "2023-12-15T15:26:42.177", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodeRevolution WP Pocket URLs allows Reflected XSS.This issue affects WP Pocket URLs: from n/a through 1.0.2.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-pocket-urls/wordpress-wp-pocket-urls-plugin-1-0-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49177.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49177.json new file mode 100644 index 00000000000..fb1ecc15022 --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49177.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49177", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-15T15:15:08.667", + "lastModified": "2023-12-15T15:26:42.177", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Gilles Dumas which template file allows Reflected XSS.This issue affects which template file: from n/a through 4.9.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/which-template-file/wordpress-which-template-file-plugin-4-9-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49178.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49178.json new file mode 100644 index 00000000000..594e49c9c5a --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49178.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49178", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-15T15:15:08.857", + "lastModified": "2023-12-15T15:26:42.177", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mr. Hdwplayer HDW Player Plugin (Video Player & Video Gallery) allows Reflected XSS.This issue affects HDW Player Plugin (Video Player & Video Gallery): from n/a through 5.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/hdw-player-video-player-video-gallery/wordpress-hdw-player-plugin-video-player-video-gallery-plugin-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49179.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49179.json new file mode 100644 index 00000000000..f298f210138 --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49179.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49179", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-15T15:15:09.043", + "lastModified": "2023-12-15T15:26:42.177", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in N.O.U.S. Open Useful and Simple Event post allows Stored XSS.This issue affects Event post: from n/a through 5.8.6.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/event-post/wordpress-event-post-plugin-5-8-6-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49180.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49180.json new file mode 100644 index 00000000000..4c66d3f8999 --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49180.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49180", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-15T15:15:09.240", + "lastModified": "2023-12-15T15:26:42.177", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ternstyle LLC Automatic Youtube Video Posts Plugin allows Stored XSS.This issue affects Automatic Youtube Video Posts Plugin: from n/a through 5.2.2.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/automatic-youtube-video-posts/wordpress-automatic-youtube-video-posts-plugin-plugin-5-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49181.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49181.json new file mode 100644 index 00000000000..1bb4048fece --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49181.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49181", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-15T15:15:09.430", + "lastModified": "2023-12-15T15:26:42.177", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Event Manager WP Event Manager \u2013 Events Calendar, Registrations, Sell Tickets with WooCommerce allows Stored XSS.This issue affects WP Event Manager \u2013 Events Calendar, Registrations, Sell Tickets with WooCommerce: from n/a through 3.1.40.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-event-manager/wordpress-wp-event-manager-plugin-3-1-39-cross-site-scripting-xss-vulnerability-2?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49182.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49182.json new file mode 100644 index 00000000000..a39ea303c24 --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49182.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49182", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-15T15:15:09.620", + "lastModified": "2023-12-15T15:26:42.177", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Fabio Marzocca List all posts by Authors, nested Categories and Titles allows Reflected XSS.This issue affects List all posts by Authors, nested Categories and Titles: from n/a through 2.7.10.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/list-all-posts-by-authors-nested-categories-and-titles/wordpress-list-all-posts-by-authors-nested-categories-and-title-plugin-2-7-10-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49183.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49183.json new file mode 100644 index 00000000000..48570d1698a --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49183.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49183", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-15T15:15:09.817", + "lastModified": "2023-12-15T15:26:42.177", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NextScripts NextScripts: Social Networks Auto-Poster allows Reflected XSS.This issue affects NextScripts: Social Networks Auto-Poster: from n/a through 4.4.2.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/social-networks-auto-poster-facebook-twitter-g/wordpress-nextscripts-social-networks-auto-poster-plugin-4-4-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49184.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49184.json new file mode 100644 index 00000000000..5bea0ce2e59 --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49184.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49184", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-15T15:15:10.013", + "lastModified": "2023-12-15T15:26:42.177", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPDeveloper Parallax Slider Block allows Stored XSS.This issue affects Parallax Slider Block: from n/a through 1.2.4.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/parallax-slider-block/wordpress-parallax-slider-block-plugin-1-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49185.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49185.json new file mode 100644 index 00000000000..741dcd3135f --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49185.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49185", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-15T15:15:10.207", + "lastModified": "2023-12-15T15:26:42.177", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Doofinder Doofinder WP & WooCommerce Search allows Reflected XSS.This issue affects Doofinder WP & WooCommerce Search: from n/a through 2.1.7.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/doofinder-for-woocommerce/wordpress-doofinder-wp-woocommerce-search-plugin-2-0-33-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49187.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49187.json new file mode 100644 index 00000000000..d66b285f031 --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49187.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49187", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-15T15:15:10.403", + "lastModified": "2023-12-15T15:26:42.177", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Spoonthemes Adifier - Classified Ads WordPress Theme allows Reflected XSS.This issue affects Adifier - Classified Ads WordPress Theme: from n/a before 3.1.4.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/adifier/wordpress-adifier-classified-ads-wordpress-theme-theme-3-9-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49188.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49188.json new file mode 100644 index 00000000000..2e7b0bed83b --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49188.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49188", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-15T15:15:10.600", + "lastModified": "2023-12-15T15:26:42.177", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ZealousWeb Track Geolocation Of Users Using Contact Form 7 allows Stored XSS.This issue affects Track Geolocation Of Users Using Contact Form 7: from n/a through 1.4.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/track-geolocation-of-users-using-contact-form-7/wordpress-track-geolocation-of-users-using-contact-form-7-plugin-1-4-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49189.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49189.json new file mode 100644 index 00000000000..f819c201d23 --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49189.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49189", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-15T16:15:43.913", + "lastModified": "2023-12-15T16:53:06.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Getsocial, S.A. Social Share Buttons & Analytics Plugin \u2013 GetSocial.Io allows Stored XSS.This issue affects Social Share Buttons & Analytics Plugin \u2013 GetSocial.Io: from n/a through 4.3.12.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-share-buttons-analytics-by-getsocial/wordpress-social-share-buttons-analytics-plugin-getsocial-io-plugin-4-3-12-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49190.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49190.json new file mode 100644 index 00000000000..f9773d7c02e --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49190.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49190", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-15T16:15:44.120", + "lastModified": "2023-12-15T16:53:06.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Chandra Shekhar Sahu Site Offline Or Coming Soon Or Maintenance Mode allows Stored XSS.This issue affects Site Offline Or Coming Soon Or Maintenance Mode: from n/a through 1.5.6.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/site-offline/wordpress-site-offline-or-coming-soon-or-maintenance-mode-plugin-1-5-6-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49191.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49191.json new file mode 100644 index 00000000000..37be359aa36 --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49191.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49191", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-15T16:15:44.320", + "lastModified": "2023-12-15T16:53:06.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Supsystic GDPR Cookie Consent by Supsystic allows Stored XSS.This issue affects GDPR Cookie Consent by Supsystic: from n/a through 2.1.2.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/gdpr-compliance-by-supsystic/wordpress-gdpr-cookie-consent-by-supsystic-plugin-2-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49197.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49197.json new file mode 100644 index 00000000000..08a40a19ca2 --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49197.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49197", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-15T16:15:44.510", + "lastModified": "2023-12-15T16:53:06.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Apasionados, Apasionados del Marketing, NetConsulting DoFollow Case by Case.This issue affects DoFollow Case by Case: from n/a through 3.4.2.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/dofollow-case-by-case/wordpress-dofollow-case-by-case-plugin-3-4-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49583.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49583.json index 98353bef1a3..b65c848118d 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49583.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49583.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49583", "sourceIdentifier": "cna@sap.com", "published": "2023-12-12T02:15:07.920", - "lastModified": "2023-12-14T19:36:00.030", + "lastModified": "2023-12-15T15:28:14.160", "vulnStatus": "Analyzed", "descriptions": [ { @@ -79,9 +79,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:sap:btp_security_services_integration_library:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:sap:\\@sap\\/xssec:*:*:*:*:*:node.js:*:*", "versionEndExcluding": "3.6.0", - "matchCriteriaId": "25DBD412-2F7D-45F1-B7C4-8A4237BD602E" + "matchCriteriaId": "35C3039E-0874-46B3-9271-1BDCA439BCBB" } ] } diff --git a/CVE-2023/CVE-2023-497xx/CVE-2023-49744.json b/CVE-2023/CVE-2023-497xx/CVE-2023-49744.json new file mode 100644 index 00000000000..a4206bc6749 --- /dev/null +++ b/CVE-2023/CVE-2023-497xx/CVE-2023-49744.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49744", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-15T16:15:44.707", + "lastModified": "2023-12-15T16:53:06.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Gift Up Gift Up Gift Cards for WordPress and WooCommerce.This issue affects Gift Up Gift Cards for WordPress and WooCommerce: from n/a through 2.21.3.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/gift-up/wordpress-gift-up-gift-cards-for-wordpress-and-woocommerce-plugin-2-21-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-497xx/CVE-2023-49747.json b/CVE-2023/CVE-2023-497xx/CVE-2023-49747.json new file mode 100644 index 00000000000..f3521f93de7 --- /dev/null +++ b/CVE-2023/CVE-2023-497xx/CVE-2023-49747.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49747", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-15T16:15:44.903", + "lastModified": "2023-12-15T16:53:06.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WebFactory Ltd Guest Author allows Stored XSS.This issue affects Guest Author: from n/a through 2.3.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/guest-author/wordpress-guest-author-plugin-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-497xx/CVE-2023-49749.json b/CVE-2023/CVE-2023-497xx/CVE-2023-49749.json new file mode 100644 index 00000000000..02fe3d3c5de --- /dev/null +++ b/CVE-2023/CVE-2023-497xx/CVE-2023-49749.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49749", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-15T16:15:45.090", + "lastModified": "2023-12-15T16:53:06.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in SureTriggers SureTriggers \u2013 Connect All Your Plugins, Apps, Tools & Automate Everything!.This issue affects SureTriggers \u2013 Connect All Your Plugins, Apps, Tools & Automate Everything!: from n/a through 1.0.23.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/suretriggers/wordpress-suretriggers-plugin-1-0-23-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-497xx/CVE-2023-49767.json b/CVE-2023/CVE-2023-497xx/CVE-2023-49767.json new file mode 100644 index 00000000000..19e28beb2f4 --- /dev/null +++ b/CVE-2023/CVE-2023-497xx/CVE-2023-49767.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49767", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-15T16:15:45.280", + "lastModified": "2023-12-15T16:53:06.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Biteship Biteship: Plugin Ongkos Kirim Kurir Instant, Reguler, Kargo allows Stored XSS.This issue affects Biteship: Plugin Ongkos Kirim Kurir Instant, Reguler, Kargo: from n/a through 2.2.24.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/biteship/wordpress-biteship-plugin-2-2-22-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-497xx/CVE-2023-49786.json b/CVE-2023/CVE-2023-497xx/CVE-2023-49786.json index af9895eb7fe..50c305ab822 100644 --- a/CVE-2023/CVE-2023-497xx/CVE-2023-49786.json +++ b/CVE-2023/CVE-2023-497xx/CVE-2023-49786.json @@ -2,12 +2,16 @@ "id": "CVE-2023-49786", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-14T20:15:52.927", - "lastModified": "2023-12-14T22:44:49.057", + "lastModified": "2023-12-15T16:15:45.467", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1; as well as certified-asterisk prior to 18.9-cert6; Asterisk is susceptible to a DoS due to a race condition in the hello handshake phase of the DTLS protocol when handling DTLS-SRTP for media setup. This attack can be done continuously, thus denying new DTLS-SRTP encrypted calls during the attack. Abuse of this vulnerability may lead to a massive Denial of Service on vulnerable Asterisk servers for calls that rely on DTLS-SRTP. Commit d7d7764cb07c8a1872804321302ef93bf62cba05 contains a fix, which is part of versions 18.20.1, 20.5.1, 21.0.1, amd 18.9-cert6." + }, + { + "lang": "es", + "value": "Asterisk es un conjunto de herramientas de telefon\u00eda y centralita privada de c\u00f3digo abierto. En Asterisk anteriores a las versiones 18.20.1, 20.5.1 y 21.0.1; as\u00ed como certificado-asterisco anterior a 18.9-cert6; Asterisk es susceptible a un DoS debido a una condici\u00f3n de ejecuci\u00f3n en la fase \"hello handshake\" del protocolo DTLS cuando maneja DTLS-SRTP para la configuraci\u00f3n de medios. Este ataque se puede realizar de forma continua, negando as\u00ed nuevas llamadas cifradas DTLS-SRTP durante el ataque. El abuso de esta vulnerabilidad puede provocar una denegaci\u00f3n de servicio masiva en servidores Asterisk vulnerables para llamadas que dependen de DTLS-SRTP. El commit d7d7764cb07c8a1872804321302ef93bf62cba05 contiene una soluci\u00f3n, que forma parte de las versiones 18.20.1, 20.5.1, 21.0.1, amd 18.9-cert6." } ], "metrics": { @@ -47,6 +51,14 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/176251/Asterisk-20.1.0-Denial-Of-Service.html", + "source": "security-advisories@github.com" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/12/15/7", + "source": "security-advisories@github.com" + }, { "url": "https://github.com/EnableSecurity/advisories/tree/master/ES2023-01-asterisk-dtls-hello-race", "source": "security-advisories@github.com" diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49823.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49823.json new file mode 100644 index 00000000000..4b5ea251f9c --- /dev/null +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49823.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49823", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-15T16:15:45.547", + "lastModified": "2023-12-15T16:53:06.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BoldThemes Bold Page Builder allows Stored XSS.This issue affects Bold Page Builder: from n/a through 4.6.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/bold-page-builder/wordpress-bold-page-builder-plugin-4-6-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49829.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49829.json new file mode 100644 index 00000000000..b9772659a11 --- /dev/null +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49829.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49829", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-15T16:15:45.740", + "lastModified": "2023-12-15T16:53:06.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themeum Tutor LMS \u2013 eLearning and online course solution allows Stored XSS.This issue affects Tutor LMS \u2013 eLearning and online course solution: from n/a through 2.2.4.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/tutor/wordpress-tutor-lms-plugin-2-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4932.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4932.json index 1a46b22feb9..d9fd24fba6b 100644 --- a/CVE-2023/CVE-2023-49xx/CVE-2023-4932.json +++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4932.json @@ -2,16 +2,40 @@ "id": "CVE-2023-4932", "sourceIdentifier": "cvd@cert.pl", "published": "2023-12-12T10:15:10.483", - "lastModified": "2023-12-12T13:43:48.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-15T15:11:06.570", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "SAS application is vulnerable to Reflected Cross-Site Scripting (XSS). Improper input validation in the `_program` parameter of the the `/SASStoredProcess/do` endpoint allows arbitrary JavaScript to be executed when specially crafted URL is opened by an authenticated user. The attack is possible from a low-privileged user. Only versions\u00a09.4_M7 and\u00a09.4_M8 were tested and confirmed to be vulnerable, status of others is unknown. For above mentioned versions hot fixes were published. \n" + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n SAS es vulnerable a Cross-Site Scripting (XSS) Reflejado. La validaci\u00f3n de entrada incorrecta en el par\u00e1metro `_program` del endpoint `/SASStoredProcess/do` permite que se ejecute JavaScript arbitrario cuando un usuario autenticado abre una URL especialmente manipulada. El ataque es posible por parte de un usuario con pocos privilegios. Solo se probaron las versiones 9.4_M7 y 9.4_M8 y se confirm\u00f3 que eran vulnerables; se desconoce el estado de las dem\u00e1s. Para las versiones mencionadas anteriormente se publicaron revisiones." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cvd@cert.pl", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "cvd@cert.pl", "type": "Secondary", @@ -46,18 +80,49 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sas:integration_technologies:9.4:m7:*:*:*:*:*:*", + "matchCriteriaId": "34C561C2-B769-4F21-9D30-057F96599F5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sas:integration_technologies:9.4:m8:*:*:*:*:*:*", + "matchCriteriaId": "8A55599A-5822-4EF7-981A-9EF637B316D7" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert.pl/en/posts/2023/12/CVE-2023-4932/", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cert.pl/posts/2023/12/CVE-2023-4932/", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.sas.com/kb/70/265.html", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4958.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4958.json index 9884b98755e..d31605fc53a 100644 --- a/CVE-2023/CVE-2023-49xx/CVE-2023-4958.json +++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4958.json @@ -2,16 +2,40 @@ "id": "CVE-2023-4958", "sourceIdentifier": "secalert@redhat.com", "published": "2023-12-12T10:15:10.853", - "lastModified": "2023-12-12T13:43:48.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-15T15:24:03.380", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In Red Hat Advanced Cluster Security (RHACS), it was found that some security related HTTP headers were missing, allowing an attacker to exploit this with a clickjacking attack. An attacker could exploit this by convincing a valid RHACS user to visit an attacker-controlled web page, that deceptively points to valid RHACS endpoints, hijacking the user's account permissions to perform other actions." + }, + { + "lang": "es", + "value": "En Red Hat Advanced Cluster Security (RHACS), se descubri\u00f3 que faltaban algunos encabezados HTTP relacionados con la seguridad, lo que permit\u00eda a un atacante explotar esto con un ataque de clickjacking. Un atacante podr\u00eda aprovechar esto convenciendo a un usuario v\u00e1lido de RHACS para que visite una p\u00e1gina web controlada por el atacante, que apunta enga\u00f1osamente a endpoints de RHACS v\u00e1lidos, secuestrando los permisos de la cuenta del usuario para realizar otras acciones." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -46,18 +80,50 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F0FD736A-8730-446A-BA3A-7B608DB62B0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:kubernates:*:*", + "matchCriteriaId": "0FB56EBE-BCC0-4833-82B3-D5EFC50A7E65" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/errata/RHSA-2023:5206", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/security/cve/CVE-2023-4958", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990363", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-504xx/CVE-2023-50422.json b/CVE-2023/CVE-2023-504xx/CVE-2023-50422.json index 2b39c0d39f9..c7cc67e1c95 100644 --- a/CVE-2023/CVE-2023-504xx/CVE-2023-50422.json +++ b/CVE-2023/CVE-2023-504xx/CVE-2023-50422.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50422", "sourceIdentifier": "cna@sap.com", "published": "2023-12-12T02:15:08.587", - "lastModified": "2023-12-14T19:04:59.677", + "lastModified": "2023-12-15T16:53:13.697", "vulnStatus": "Analyzed", "descriptions": [ { @@ -79,16 +79,16 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:sap:btp_security_services_integration_library:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:sap:cloud-security-services-integration-library:*:*:*:*:*:java:*:*", "versionEndExcluding": "2.17.0", - "matchCriteriaId": "C15B0C1E-C64B-4F01-8465-24BD6DB6A0BA" + "matchCriteriaId": "EA00D38E-621A-4114-8F4F-F0AA3C41E88F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:sap:btp_security_services_integration_library:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:sap:cloud-security-services-integration-library:*:*:*:*:*:java:*:*", "versionStartIncluding": "3.0.0", "versionEndExcluding": "3.3.0", - "matchCriteriaId": "9B846878-8BDA-4364-B1FC-928B6F92C869" + "matchCriteriaId": "4C7EE7BE-CA31-4B97-B455-41F66AEE85E9" } ] } diff --git a/CVE-2023/CVE-2023-504xx/CVE-2023-50423.json b/CVE-2023/CVE-2023-504xx/CVE-2023-50423.json index 45b74a8eb09..97f2c7f83d5 100644 --- a/CVE-2023/CVE-2023-504xx/CVE-2023-50423.json +++ b/CVE-2023/CVE-2023-504xx/CVE-2023-50423.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50423", "sourceIdentifier": "cna@sap.com", "published": "2023-12-12T02:15:08.797", - "lastModified": "2023-12-14T17:48:27.037", + "lastModified": "2023-12-15T16:53:22.867", "vulnStatus": "Analyzed", "descriptions": [ { @@ -79,9 +79,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:sap:btp_security_services_integration_library:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:sap:sap-xssec:*:*:*:*:*:python:*:*", "versionEndExcluding": "4.1.0", - "matchCriteriaId": "16F8EF4D-E500-4F8D-8F74-549EB05A8BB4" + "matchCriteriaId": "3C039268-10BB-42CF-90A5-7E88DAA2193A" } ] } diff --git a/CVE-2023/CVE-2023-504xx/CVE-2023-50424.json b/CVE-2023/CVE-2023-504xx/CVE-2023-50424.json index fba58bad015..a27f8ee0b30 100644 --- a/CVE-2023/CVE-2023-504xx/CVE-2023-50424.json +++ b/CVE-2023/CVE-2023-504xx/CVE-2023-50424.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50424", "sourceIdentifier": "cna@sap.com", "published": "2023-12-12T03:15:07.100", - "lastModified": "2023-12-14T17:44:34.810", + "lastModified": "2023-12-15T16:53:04.417", "vulnStatus": "Analyzed", "descriptions": [ { @@ -79,9 +79,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:sap:btp_security_services_integration_library:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:sap:cloud-security-client-go:*:*:*:*:*:go:*:*", "versionEndExcluding": "0.17.0", - "matchCriteriaId": "9C630555-6CC1-475D-A296-8C39B59C4AF1" + "matchCriteriaId": "9E58812A-D3A2-472D-83CB-845CF37A37AF" } ] } diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50870.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50870.json index 2137544bfa2..836dcd2dd7b 100644 --- a/CVE-2023/CVE-2023-508xx/CVE-2023-50870.json +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50870.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50870", "sourceIdentifier": "cve@jetbrains.com", "published": "2023-12-15T14:15:15.453", - "lastModified": "2023-12-15T14:15:15.453", - "vulnStatus": "Received", + "lastModified": "2023-12-15T15:26:42.177", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50871.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50871.json index 7eb13b1ce15..77ac572a9fd 100644 --- a/CVE-2023/CVE-2023-508xx/CVE-2023-50871.json +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50871.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50871", "sourceIdentifier": "cve@jetbrains.com", "published": "2023-12-15T14:15:15.713", - "lastModified": "2023-12-15T14:15:15.713", - "vulnStatus": "Received", + "lastModified": "2023-12-15T15:26:42.177", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5061.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5061.json new file mode 100644 index 00000000000..39ab9d38635 --- /dev/null +++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5061.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-5061", + "sourceIdentifier": "cve@gitlab.com", + "published": "2023-12-15T16:15:45.930", + "lastModified": "2023-12-15T16:53:06.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An issue has been discovered in GitLab affecting all versions starting from 9.3 before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. In certain situations, it may have been possible for developers to override predefined CI variables via the REST API." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/425521", + "source": "cve@gitlab.com" + }, + { + "url": "https://hackerone.com/reports/2125189", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5310.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5310.json new file mode 100644 index 00000000000..a7f8d2e4aa5 --- /dev/null +++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5310.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-5310", + "sourceIdentifier": "product-security@silabs.com", + "published": "2023-12-15T16:15:46.117", + "lastModified": "2023-12-15T16:53:06.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "\nA denial of service vulnerability exists in all Silicon Labs Z-Wave controller and endpoint devices running Z-Wave SDK v7.20.3 (Gecko SDK v4.3.3) and earlier. This attack can be carried out only by devices on the network sending a stream of packets to the device.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/SiliconLabs/gecko_sdk/releases", + "source": "product-security@silabs.com" + }, + { + "url": "https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/069Vm0000005E7EIAU?%20operationContext=S1", + "source": "product-security@silabs.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5512.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5512.json new file mode 100644 index 00000000000..23453c1265d --- /dev/null +++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5512.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-5512", + "sourceIdentifier": "cve@gitlab.com", + "published": "2023-12-15T16:15:46.300", + "lastModified": "2023-12-15T16:53:06.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An issue has been discovered in GitLab CE/EE affecting all versions from 16.3 before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. File integrity may be compromised when specific HTML encoding is used for file names leading for incorrect representation in the UI." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/427827", + "source": "cve@gitlab.com" + }, + { + "url": "https://hackerone.com/reports/2194607", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6051.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6051.json new file mode 100644 index 00000000000..06277d85833 --- /dev/null +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6051.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-6051", + "sourceIdentifier": "cve@gitlab.com", + "published": "2023-12-15T16:15:46.490", + "lastModified": "2023-12-15T16:53:06.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An issue has been discovered in GitLab CE/EE affecting all versions before 16.4.4, all versions starting from 15.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. File integrity may be compromised when source code or installation packages are pulled from a specific tag." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/431345", + "source": "cve@gitlab.com" + }, + { + "url": "https://hackerone.com/reports/2237165", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6680.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6680.json new file mode 100644 index 00000000000..abc988214b9 --- /dev/null +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6680.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-6680", + "sourceIdentifier": "cve@gitlab.com", + "published": "2023-12-15T16:15:46.737", + "lastModified": "2023-12-15T16:53:06.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An improper certificate validation issue in Smartcard authentication in GitLab EE affecting all versions from 11.6 prior to 16.4.4, 16.5 prior to 16.5.4, and 16.6 prior to 16.6.2 allows an attacker to authenticate as another user given their public key if they use Smartcard authentication. Smartcard authentication is an experimental feature and has to be manually enabled by an administrator." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/421607", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index d22fb772ace..1499f7f8052 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-12-15T15:00:26.247685+00:00 +2023-12-15T17:00:24.874064+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-12-15T14:49:29.267000+00:00 +2023-12-15T16:53:57.570000+00:00 ``` ### Last Data Feed Release @@ -29,52 +29,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -233475 +233509 ``` ### CVEs added in the last Commit -Recently added CVEs: `8` +Recently added CVEs: `34` -* [CVE-2023-30867](CVE-2023/CVE-2023-308xx/CVE-2023-30867.json) (`2023-12-15T13:15:07.223`) -* [CVE-2023-49898](CVE-2023/CVE-2023-498xx/CVE-2023-49898.json) (`2023-12-15T13:15:07.330`) -* [CVE-2023-46116](CVE-2023/CVE-2023-461xx/CVE-2023-46116.json) (`2023-12-15T14:15:14.633`) -* [CVE-2023-48765](CVE-2023/CVE-2023-487xx/CVE-2023-48765.json) (`2023-12-15T14:15:14.853`) -* [CVE-2023-49160](CVE-2023/CVE-2023-491xx/CVE-2023-49160.json) (`2023-12-15T14:15:15.047`) -* [CVE-2023-49165](CVE-2023/CVE-2023-491xx/CVE-2023-49165.json) (`2023-12-15T14:15:15.240`) -* [CVE-2023-50870](CVE-2023/CVE-2023-508xx/CVE-2023-50870.json) (`2023-12-15T14:15:15.453`) -* [CVE-2023-50871](CVE-2023/CVE-2023-508xx/CVE-2023-50871.json) (`2023-12-15T14:15:15.713`) +* [CVE-2023-49181](CVE-2023/CVE-2023-491xx/CVE-2023-49181.json) (`2023-12-15T15:15:09.430`) +* [CVE-2023-49182](CVE-2023/CVE-2023-491xx/CVE-2023-49182.json) (`2023-12-15T15:15:09.620`) +* [CVE-2023-49183](CVE-2023/CVE-2023-491xx/CVE-2023-49183.json) (`2023-12-15T15:15:09.817`) +* [CVE-2023-49184](CVE-2023/CVE-2023-491xx/CVE-2023-49184.json) (`2023-12-15T15:15:10.013`) +* [CVE-2023-49185](CVE-2023/CVE-2023-491xx/CVE-2023-49185.json) (`2023-12-15T15:15:10.207`) +* [CVE-2023-49187](CVE-2023/CVE-2023-491xx/CVE-2023-49187.json) (`2023-12-15T15:15:10.403`) +* [CVE-2023-49188](CVE-2023/CVE-2023-491xx/CVE-2023-49188.json) (`2023-12-15T15:15:10.600`) +* [CVE-2023-3511](CVE-2023/CVE-2023-35xx/CVE-2023-3511.json) (`2023-12-15T16:15:43.053`) +* [CVE-2023-3904](CVE-2023/CVE-2023-39xx/CVE-2023-3904.json) (`2023-12-15T16:15:43.387`) +* [CVE-2023-49159](CVE-2023/CVE-2023-491xx/CVE-2023-49159.json) (`2023-12-15T16:15:43.710`) +* [CVE-2023-49189](CVE-2023/CVE-2023-491xx/CVE-2023-49189.json) (`2023-12-15T16:15:43.913`) +* [CVE-2023-49190](CVE-2023/CVE-2023-491xx/CVE-2023-49190.json) (`2023-12-15T16:15:44.120`) +* [CVE-2023-49191](CVE-2023/CVE-2023-491xx/CVE-2023-49191.json) (`2023-12-15T16:15:44.320`) +* [CVE-2023-49197](CVE-2023/CVE-2023-491xx/CVE-2023-49197.json) (`2023-12-15T16:15:44.510`) +* [CVE-2023-49744](CVE-2023/CVE-2023-497xx/CVE-2023-49744.json) (`2023-12-15T16:15:44.707`) +* [CVE-2023-49747](CVE-2023/CVE-2023-497xx/CVE-2023-49747.json) (`2023-12-15T16:15:44.903`) +* [CVE-2023-49749](CVE-2023/CVE-2023-497xx/CVE-2023-49749.json) (`2023-12-15T16:15:45.090`) +* [CVE-2023-49767](CVE-2023/CVE-2023-497xx/CVE-2023-49767.json) (`2023-12-15T16:15:45.280`) +* [CVE-2023-49823](CVE-2023/CVE-2023-498xx/CVE-2023-49823.json) (`2023-12-15T16:15:45.547`) +* [CVE-2023-49829](CVE-2023/CVE-2023-498xx/CVE-2023-49829.json) (`2023-12-15T16:15:45.740`) +* [CVE-2023-5061](CVE-2023/CVE-2023-50xx/CVE-2023-5061.json) (`2023-12-15T16:15:45.930`) +* [CVE-2023-5310](CVE-2023/CVE-2023-53xx/CVE-2023-5310.json) (`2023-12-15T16:15:46.117`) +* [CVE-2023-5512](CVE-2023/CVE-2023-55xx/CVE-2023-5512.json) (`2023-12-15T16:15:46.300`) +* [CVE-2023-6051](CVE-2023/CVE-2023-60xx/CVE-2023-6051.json) (`2023-12-15T16:15:46.490`) +* [CVE-2023-6680](CVE-2023/CVE-2023-66xx/CVE-2023-6680.json) (`2023-12-15T16:15:46.737`) ### CVEs modified in the last Commit -Recently modified CVEs: `245` +Recently modified CVEs: `47` -* [CVE-2023-48381](CVE-2023/CVE-2023-483xx/CVE-2023-48381.json) (`2023-12-15T13:42:13.817`) -* [CVE-2023-48382](CVE-2023/CVE-2023-483xx/CVE-2023-48382.json) (`2023-12-15T13:42:13.817`) -* [CVE-2023-48384](CVE-2023/CVE-2023-483xx/CVE-2023-48384.json) (`2023-12-15T13:42:13.817`) -* [CVE-2023-48387](CVE-2023/CVE-2023-483xx/CVE-2023-48387.json) (`2023-12-15T13:42:13.817`) -* [CVE-2023-48388](CVE-2023/CVE-2023-483xx/CVE-2023-48388.json) (`2023-12-15T13:42:13.817`) -* [CVE-2023-48389](CVE-2023/CVE-2023-483xx/CVE-2023-48389.json) (`2023-12-15T13:42:13.817`) -* [CVE-2023-48390](CVE-2023/CVE-2023-483xx/CVE-2023-48390.json) (`2023-12-15T13:42:13.817`) -* [CVE-2023-48392](CVE-2023/CVE-2023-483xx/CVE-2023-48392.json) (`2023-12-15T13:42:13.817`) -* [CVE-2023-48393](CVE-2023/CVE-2023-483xx/CVE-2023-48393.json) (`2023-12-15T13:42:13.817`) -* [CVE-2023-48394](CVE-2023/CVE-2023-483xx/CVE-2023-48394.json) (`2023-12-15T13:42:13.817`) -* [CVE-2023-48395](CVE-2023/CVE-2023-483xx/CVE-2023-48395.json) (`2023-12-15T13:42:13.817`) -* [CVE-2023-6835](CVE-2023/CVE-2023-68xx/CVE-2023-6835.json) (`2023-12-15T13:42:13.817`) -* [CVE-2023-49143](CVE-2023/CVE-2023-491xx/CVE-2023-49143.json) (`2023-12-15T13:46:23.807`) -* [CVE-2023-49713](CVE-2023/CVE-2023-497xx/CVE-2023-49713.json) (`2023-12-15T13:55:11.097`) -* [CVE-2023-48227](CVE-2023/CVE-2023-482xx/CVE-2023-48227.json) (`2023-12-15T14:07:29.693`) -* [CVE-2023-6756](CVE-2023/CVE-2023-67xx/CVE-2023-6756.json) (`2023-12-15T14:07:50.217`) -* [CVE-2023-6757](CVE-2023/CVE-2023-67xx/CVE-2023-6757.json) (`2023-12-15T14:08:46.667`) -* [CVE-2023-49695](CVE-2023/CVE-2023-496xx/CVE-2023-49695.json) (`2023-12-15T14:17:40.347`) -* [CVE-2023-49584](CVE-2023/CVE-2023-495xx/CVE-2023-49584.json) (`2023-12-15T14:26:47.663`) -* [CVE-2023-48641](CVE-2023/CVE-2023-486xx/CVE-2023-48641.json) (`2023-12-15T14:28:15.560`) -* [CVE-2023-49578](CVE-2023/CVE-2023-495xx/CVE-2023-49578.json) (`2023-12-15T14:32:38.473`) -* [CVE-2023-6593](CVE-2023/CVE-2023-65xx/CVE-2023-6593.json) (`2023-12-15T14:38:03.057`) -* [CVE-2023-6727](CVE-2023/CVE-2023-67xx/CVE-2023-6727.json) (`2023-12-15T14:43:08.920`) -* [CVE-2023-46219](CVE-2023/CVE-2023-462xx/CVE-2023-46219.json) (`2023-12-15T14:49:07.260`) -* [CVE-2023-42479](CVE-2023/CVE-2023-424xx/CVE-2023-42479.json) (`2023-12-15T14:49:29.267`) +* [CVE-2023-35642](CVE-2023/CVE-2023-356xx/CVE-2023-35642.json) (`2023-12-15T15:09:31.000`) +* [CVE-2023-35643](CVE-2023/CVE-2023-356xx/CVE-2023-35643.json) (`2023-12-15T15:09:45.080`) +* [CVE-2023-35644](CVE-2023/CVE-2023-356xx/CVE-2023-35644.json) (`2023-12-15T15:10:04.680`) +* [CVE-2023-4932](CVE-2023/CVE-2023-49xx/CVE-2023-4932.json) (`2023-12-15T15:11:06.570`) +* [CVE-2023-4958](CVE-2023/CVE-2023-49xx/CVE-2023-4958.json) (`2023-12-15T15:24:03.380`) +* [CVE-2023-46116](CVE-2023/CVE-2023-461xx/CVE-2023-46116.json) (`2023-12-15T15:26:42.177`) +* [CVE-2023-48765](CVE-2023/CVE-2023-487xx/CVE-2023-48765.json) (`2023-12-15T15:26:42.177`) +* [CVE-2023-49160](CVE-2023/CVE-2023-491xx/CVE-2023-49160.json) (`2023-12-15T15:26:42.177`) +* [CVE-2023-49165](CVE-2023/CVE-2023-491xx/CVE-2023-49165.json) (`2023-12-15T15:26:42.177`) +* [CVE-2023-50870](CVE-2023/CVE-2023-508xx/CVE-2023-50870.json) (`2023-12-15T15:26:42.177`) +* [CVE-2023-50871](CVE-2023/CVE-2023-508xx/CVE-2023-50871.json) (`2023-12-15T15:26:42.177`) +* [CVE-2023-49583](CVE-2023/CVE-2023-495xx/CVE-2023-49583.json) (`2023-12-15T15:28:14.160`) +* [CVE-2023-46283](CVE-2023/CVE-2023-462xx/CVE-2023-46283.json) (`2023-12-15T15:42:12.763`) +* [CVE-2023-38431](CVE-2023/CVE-2023-384xx/CVE-2023-38431.json) (`2023-12-15T15:46:35.903`) +* [CVE-2023-38428](CVE-2023/CVE-2023-384xx/CVE-2023-38428.json) (`2023-12-15T15:47:05.687`) +* [CVE-2023-46284](CVE-2023/CVE-2023-462xx/CVE-2023-46284.json) (`2023-12-15T15:47:16.727`) +* [CVE-2023-2163](CVE-2023/CVE-2023-21xx/CVE-2023-2163.json) (`2023-12-15T15:48:16.843`) +* [CVE-2023-46285](CVE-2023/CVE-2023-462xx/CVE-2023-46285.json) (`2023-12-15T15:55:59.337`) +* [CVE-2023-47271](CVE-2023/CVE-2023-472xx/CVE-2023-47271.json) (`2023-12-15T16:15:43.587`) +* [CVE-2023-49786](CVE-2023/CVE-2023-497xx/CVE-2023-49786.json) (`2023-12-15T16:15:45.467`) +* [CVE-2023-28465](CVE-2023/CVE-2023-284xx/CVE-2023-28465.json) (`2023-12-15T16:35:16.623`) +* [CVE-2023-50424](CVE-2023/CVE-2023-504xx/CVE-2023-50424.json) (`2023-12-15T16:53:04.417`) +* [CVE-2023-50422](CVE-2023/CVE-2023-504xx/CVE-2023-50422.json) (`2023-12-15T16:53:13.697`) +* [CVE-2023-50423](CVE-2023/CVE-2023-504xx/CVE-2023-50423.json) (`2023-12-15T16:53:22.867`) +* [CVE-2023-20275](CVE-2023/CVE-2023-202xx/CVE-2023-20275.json) (`2023-12-15T16:53:57.570`) ## Download and Usage