diff --git a/CVE-1999/CVE-1999-00xx/CVE-1999-0046.json b/CVE-1999/CVE-1999-00xx/CVE-1999-0046.json index 40b64fa9357..209ce12a9aa 100644 --- a/CVE-1999/CVE-1999-00xx/CVE-1999-0046.json +++ b/CVE-1999/CVE-1999-00xx/CVE-1999-0046.json @@ -2,8 +2,8 @@ "id": "CVE-1999-0046", "sourceIdentifier": "cve@mitre.org", "published": "1997-02-06T05:00:00.000", - "lastModified": "2022-08-17T07:15:09.560", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:19:37.180", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -44,42 +44,12 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-120" } ] } ], "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:data_general:dg_ux:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "CE3A815C-B264-4B1F-8243-894C21F8D1EA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:data_general:dg_ux:2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FDB5057F-A306-4250-B247-701948713AD8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:data_general:dg_ux:3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D7E43C99-DEC8-4519-90A9-ADBAA56B99C7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:data_general:dg_ux:4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BEC4E336-7290-4FF2-BB71-A1ABDA3283D5" - } - ] - } - ] - }, { "nodes": [ { @@ -113,68 +83,8 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:digital:ultrix:2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2CF862B0-24FF-4BAE-9687-981C3491D567" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:digital:ultrix:3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "944F5BF5-F48F-4EFE-A929-D6BDEF561C28" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:digital:ultrix:4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "18EE0235-30CD-4104-ADB8-45AA5B3CBC3A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:digital:ultrix:4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "0699893A-AE83-4605-BF2B-FC0C17BF2A69" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:digital:ultrix:4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "08B83DF0-860D-4A8C-ACA7-A1A68D81B8DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:digital:ultrix:4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "75521BE7-13C8-416B-A4E1-98BB321FAB26" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:digital:ultrix:4.3a:*:*:*:*:*:*:*", - "matchCriteriaId": "C1E9DB14-F083-4F54-AC49-62A20D206803" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:digital:ultrix:4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "E447AB53-09AE-4CB1-8582-0FC4A5523775" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:digital:ultrix:4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "48B61776-3055-40C9-B446-7E544DE7E87E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:digital:unix:3.2g:*:*:*:*:*:*:*", - "matchCriteriaId": "BD4B2280-5114-4CBD-9B06-221BD9CE4229" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:digital:unix:4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E1E08495-C0C5-40A9-A8FF-834F5F6083B3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:digital:unix:4.0a:*:*:*:*:*:*:*", - "matchCriteriaId": "781D13E2-35BB-4D58-A68F-86401D08D438" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:digital:unix:4.0b:*:*:*:*:*:*:*", - "matchCriteriaId": "07476CFD-859F-4AD7-8514-130E7A86BAE5" + "criteria": "cpe:2.3:o:digital:ultrix:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8D2066A9-7DAE-403C-8C12-5414C6770F8D" }, { "vulnerable": true, @@ -298,68 +208,33 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:next:nextstep:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4902BDC4-9FEC-4EB9-9D93-54FF81AF138C" + "criteria": "cpe:2.3:o:next:nextstep:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8772D1A6-9458-499F-B9E7-758A6DA735B8" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:next:nextstep:1.0a:*:*:*:*:*:*:*", - "matchCriteriaId": "D9583554-25FF-46B5-BFA6-5B0F3CEDA725" + "criteria": "cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91F372EA-3A78-4703-A457-751B2C98D796" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:next:nextstep:2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "286C0359-C286-4CA8-B017-046FCE58B544" + "criteria": "cpe:2.3:o:oracle:solaris:2.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A57664FD-9E75-4F9B-92C4-7D85A263D04B" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:next:nextstep:2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "F2D08ADE-122E-4836-9335-96D153E39128" + "criteria": "cpe:2.3:o:oracle:solaris:2.6:*:*:*:*:*:*:*", + "matchCriteriaId": "69C7B4A8-E8D0-425C-B979-17E85458B0C6" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:next:nextstep:3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BC203236-BBF4-4D76-B17F-EF03472DBB7D" + "criteria": "cpe:2.3:o:oracle:solaris:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0F538D2B-1AE1-4766-830E-CF7999181128" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:next:nextstep:3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "79392496-3278-4759-8269-3C22F97BEC15" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:next:nextstep:3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E30E1606-E633-45AE-AC3B-4CEC9BB009CA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:next:nextstep:3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "1D10FFF9-B15E-451A-AD55-5E949A351585" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:next:nextstep:4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "1FEE8CF7-908D-4E24-A2BA-B58BF4031C9E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*", - "matchCriteriaId": "1F881110-7B54-49DA-B23A-710273430C44" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*", - "matchCriteriaId": "200D8CB2-0D52-40A8-9CD9-6E4513605201" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*", - "matchCriteriaId": "54AF87E4-52A4-44CA-B48E-A5BB139E6410" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*", - "matchCriteriaId": "F66BAF35-A8B9-4E95-B270-444206FDD35B" + "criteria": "cpe:2.3:o:oracle:solaris:8:*:*:*:*:*:*:*", + "matchCriteriaId": "722A52CF-4C6E-44D3-90C4-D2F72A40EF58" }, { "vulnerable": true, @@ -399,7 +274,11 @@ "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0046", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-1999/CVE-1999-11xx/CVE-1999-1152.json b/CVE-1999/CVE-1999-11xx/CVE-1999-1152.json index 8476e233636..44a6eae454d 100644 --- a/CVE-1999/CVE-1999-11xx/CVE-1999-1152.json +++ b/CVE-1999/CVE-1999-11xx/CVE-1999-1152.json @@ -2,8 +2,8 @@ "id": "CVE-1999-1152", "sourceIdentifier": "cve@mitre.org", "published": "1998-06-03T04:00:00.000", - "lastModified": "2016-10-18T02:01:45.917", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:15:08.037", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,13 +66,14 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-307" } ] } ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -58,8 +81,19 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:h:compaq_microcom:microcom_6000_access_integrator:*:*:*:*:*:*:*:*", - "matchCriteriaId": "9034E278-C405-43E2-94E0-D8D6F7CE8B09" + "criteria": "cpe:2.3:o:compaq:microcom_6000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15D5A948-4AC0-458B-BE97-9645C403B476" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:compaq:microcom_6000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4591EAE6-42A5-409D-A480-7B80CE152043" } ] } @@ -69,7 +103,10 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=90296493106214&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-1999/CVE-1999-13xx/CVE-1999-1324.json b/CVE-1999/CVE-1999-13xx/CVE-1999-1324.json index e35146a641c..20b51c887a0 100644 --- a/CVE-1999/CVE-1999-13xx/CVE-1999-1324.json +++ b/CVE-1999/CVE-1999-13xx/CVE-1999-1324.json @@ -2,8 +2,8 @@ "id": "CVE-1999-1324", "sourceIdentifier": "cve@mitre.org", "published": "1999-12-31T05:00:00.000", - "lastModified": "2017-10-10T01:29:05.653", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:15:13.613", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-307" } ] } @@ -58,13 +80,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dec:dec_openvms_vax:5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B7A9C111-7745-41F2-A020-7F53C69DF2D7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dec:dec_openvms_vax:5.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E2E763B2-BB89-4E5C-98BA-7252FF90C37B" + "criteria": "cpe:2.3:o:hp:openvms_vax:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.3", + "versionEndIncluding": "5.5.2", + "matchCriteriaId": "8EC148C6-C2CE-4347-AB6A-6B58C84CDF77" } ] } @@ -76,13 +95,20 @@ "url": "http://ciac.llnl.gov/ciac/bulletins/d-06.shtml", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", + "Third Party Advisory", + "US Government Resource", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7225", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2000/CVE-2000-09xx/CVE-2000-0944.json b/CVE-2000/CVE-2000-09xx/CVE-2000-0944.json index 312e851a715..ea2f71eeba3 100644 --- a/CVE-2000/CVE-2000-09xx/CVE-2000-0944.json +++ b/CVE-2000/CVE-2000-09xx/CVE-2000-0944.json @@ -2,8 +2,8 @@ "id": "CVE-2000-0944", "sourceIdentifier": "cve@mitre.org", "published": "2000-12-19T05:00:00.000", - "lastModified": "2017-10-10T01:29:23.967", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:15:18.653", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-522" } ] } @@ -58,8 +80,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:cgi_script_center:news_update:1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "CE82C697-800F-4BCE-8105-C267B72C20FA" + "criteria": "cpe:2.3:a:cgi:script_center_news_update:1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "27376C80-C1F3-41D3-844F-0BE1C05E4E7D" } ] } @@ -71,6 +93,7 @@ "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0402.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -78,13 +101,20 @@ "url": "http://www.securityfocus.com/bid/1881", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5433", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2000/CVE-2000-10xx/CVE-2000-1094.json b/CVE-2000/CVE-2000-10xx/CVE-2000-1094.json index c0d78b3e2c6..0ee23c6d152 100644 --- a/CVE-2000/CVE-2000-10xx/CVE-2000-1094.json +++ b/CVE-2000/CVE-2000-10xx/CVE-2000-1094.json @@ -2,8 +2,8 @@ "id": "CVE-2000-1094", "sourceIdentifier": "cve@mitre.org", "published": "2001-01-09T05:00:00.000", - "lastModified": "2016-10-18T02:08:37.423", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:20:04.147", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -44,7 +44,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-120" } ] } @@ -58,63 +58,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:aol:instant_messenger:2.0_n:*:*:*:*:*:*:*", - "matchCriteriaId": "ED10DFD8-2532-466D-8EBB-F05081F2935D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:aol:instant_messenger:2.5.1366:*:*:*:*:*:*:*", - "matchCriteriaId": "0D371BDC-9E31-4EB1-88E9-82C2976086E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:aol:instant_messenger:2.5.1598:*:*:*:*:*:*:*", - "matchCriteriaId": "64B46D19-9103-40C5-A6A4-D5BE8DF8276E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:aol:instant_messenger:3.0.1470:*:*:*:*:*:*:*", - "matchCriteriaId": "D47319C5-1E96-4AEB-ABA9-638DFF22BD56" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:aol:instant_messenger:3.0_n:*:*:*:*:*:*:*", - "matchCriteriaId": "483C0045-4C10-4120-AB89-C36467993E25" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:aol:instant_messenger:3.5.1635:*:*:*:*:*:*:*", - "matchCriteriaId": "7577D890-E06A-477C-80BE-48075FB16437" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:aol:instant_messenger:3.5.1670:*:*:*:*:*:*:*", - "matchCriteriaId": "34B6D42F-9FD9-4E0D-BB59-8E65E817889C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:aol:instant_messenger:3.5.1808:*:*:*:*:*:*:*", - "matchCriteriaId": "9C2B7D7B-DB48-458B-9CA5-813782BA600D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:aol:instant_messenger:3.5.1856:*:*:*:*:*:*:*", - "matchCriteriaId": "FF19BBC6-C4F2-4636-8650-E178FFD6BF4C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:aol:instant_messenger:4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E00F0805-8C73-43B1-87AC-744434046E59" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:aol:instant_messenger:4.1.2010:*:*:*:*:*:*:*", - "matchCriteriaId": "8B2707D6-D5EC-4A22-B5E1-2A34913CB3FB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:aol:instant_messenger:4.2.1193:*:*:*:*:*:*:*", - "matchCriteriaId": "172E406F-108C-4D9A-80AB-78CDF134C4A8" + "criteria": "cpe:2.3:a:aol:aim:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.3.2229", + "matchCriteriaId": "90BDB096-13CB-4E99-B7C6-953B82D6A954" } ] } @@ -124,20 +70,34 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=97668265628917&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://marc.info/?l=bugtraq&m=97683774417132&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.atstake.com/research/advisories/2000/a121200-1.txt", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.osvdb.org/1692", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2001/CVE-2001-03xx/CVE-2001-0395.json b/CVE-2001/CVE-2001-03xx/CVE-2001-0395.json index 5ec913070ea..f6dd89c37fb 100644 --- a/CVE-2001/CVE-2001-03xx/CVE-2001-0395.json +++ b/CVE-2001/CVE-2001-03xx/CVE-2001-0395.json @@ -2,7 +2,7 @@ "id": "CVE-2001-0395", "sourceIdentifier": "cve@mitre.org", "published": "2001-07-02T04:00:00.000", - "lastModified": "2008-09-05T20:24:00.023", + "lastModified": "2024-02-09T03:14:07.077", "vulnStatus": "Analyzed", "descriptions": [ { @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,13 +66,14 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-307" } ] } ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -58,8 +81,19 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:h:lightwave:consoleserver:3200:*:*:*:*:*:*:*", - "matchCriteriaId": "FC62A9CE-B599-4DD0-B805-9B37E4F3D42F" + "criteria": "cpe:2.3:o:lightwavemo:consoleserver_3200_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "154E7000-4A6E-422F-BD39-39CCD1528126" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lightwavemo:consoleserver_3200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D570E489-5590-4407-ADFF-58AA53C565AD" } ] } @@ -71,6 +105,7 @@ "url": "http://archives.neohapsis.com/archives/bugtraq/2001-04/0170.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Vendor Advisory" ] @@ -79,7 +114,10 @@ "url": "http://www.securityfocus.com/bid/2578", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] } diff --git a/CVE-2001/CVE-2001-12xx/CVE-2001-1291.json b/CVE-2001/CVE-2001-12xx/CVE-2001-1291.json index 0a5700b4cf7..d0c0e96da10 100644 --- a/CVE-2001/CVE-2001-12xx/CVE-2001-1291.json +++ b/CVE-2001/CVE-2001-12xx/CVE-2001-1291.json @@ -2,8 +2,8 @@ "id": "CVE-2001-1291", "sourceIdentifier": "cve@mitre.org", "published": "2001-07-12T04:00:00.000", - "lastModified": "2017-10-10T01:30:02.077", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:14:12.003", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,13 +66,14 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-307" } ] } ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -58,8 +81,19 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:h:3com:superstack_ii_ps_hub:40:*:*:*:*:*:*:*", - "matchCriteriaId": "B0F8B31D-AA7C-40C1-96F0-639C91C8B726" + "criteria": "cpe:2.3:o:3com:superstack_ii_ps_hub_40_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F49F33A2-9F45-483D-ACB2-1D3458F7E1A6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:3com:superstack_ii_ps_hub_40:-:*:*:*:*:*:*:*", + "matchCriteriaId": "682AE800-EC04-4A5B-BE9A-46D788654775" } ] } @@ -71,6 +105,9 @@ "url": "http://www.securityfocus.com/archive/1/196957", "source": "cve@mitre.org", "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, @@ -78,13 +115,20 @@ "url": "http://www.securityfocus.com/bid/3034", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6855", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2001/CVE-2001-13xx/CVE-2001-1339.json b/CVE-2001/CVE-2001-13xx/CVE-2001-1339.json index 8d455dc5b22..39d4963381d 100644 --- a/CVE-2001/CVE-2001-13xx/CVE-2001-1339.json +++ b/CVE-2001/CVE-2001-13xx/CVE-2001-1339.json @@ -2,7 +2,7 @@ "id": "CVE-2001-1339", "sourceIdentifier": "cve@mitre.org", "published": "2001-05-24T04:00:00.000", - "lastModified": "2008-09-05T20:26:17.810", + "lastModified": "2024-02-09T03:15:26.757", "vulnStatus": "Analyzed", "descriptions": [ { @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,13 +66,14 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-307" } ] } ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -58,8 +81,19 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:beck_ipc_gmbh:ipc_at_chip_embedded-webserver:*:*:*:*:*:*:*:*", - "matchCriteriaId": "F2F9DC4E-550A-4CC2-BCE9-B16B68DF1AE5" + "criteria": "cpe:2.3:o:anybus:ipc\\@chip_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2C352B1-002E-4AC1-A5A0-2B5689EAE01A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:anybus:ipc\\@chip:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28349ED6-BC75-4682-80DC-1FFA0B70DBF3" } ] } @@ -69,12 +103,16 @@ "references": [ { "url": "http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.iss.net/security_center/static/6605.php", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -82,19 +120,28 @@ "url": "http://www.kb.cert.org/vuls/id/198979", "source": "cve@mitre.org", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.securityfocus.com/archive/1/186418", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/2771", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Patch", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] } diff --git a/CVE-2002/CVE-2002-06xx/CVE-2002-0628.json b/CVE-2002/CVE-2002-06xx/CVE-2002-0628.json index 51ce9cb02bc..425160e7421 100644 --- a/CVE-2002/CVE-2002-06xx/CVE-2002-0628.json +++ b/CVE-2002/CVE-2002-06xx/CVE-2002-0628.json @@ -2,8 +2,8 @@ "id": "CVE-2002-0628", "sourceIdentifier": "cve@mitre.org", "published": "2003-01-07T05:00:00.000", - "lastModified": "2023-11-07T01:55:51.953", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:14:16.373", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-307" } ] } @@ -143,12 +165,16 @@ "references": [ { "url": "http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21089", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.ciac.org/ciac/bulletins/m-123.shtml", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] @@ -157,23 +183,34 @@ "url": "http://www.iss.net/security_center/static/9349.php", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://www.polycom.com/common/pw_item_show_doc/0%2C%2C1444%2C00.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "http://www.securityfocus.com/bid/5635", "source": "cve@mitre.org", "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44241", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2002/CVE-2002-08xx/CVE-2002-0862.json b/CVE-2002/CVE-2002-08xx/CVE-2002-0862.json index 8dc9c25e0c0..f5cba795bbc 100644 --- a/CVE-2002/CVE-2002-08xx/CVE-2002-0862.json +++ b/CVE-2002/CVE-2002-08xx/CVE-2002-0862.json @@ -2,8 +2,8 @@ "id": "CVE-2002-0862", "sourceIdentifier": "cve@mitre.org", "published": "2002-10-04T04:00:00.000", - "lastModified": "2021-07-23T12:55:03.667", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:26:26.820", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -21,17 +21,17 @@ "type": "Primary", "cvssData": { "version": "2.0", - "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", - "accessComplexity": "LOW", + "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "baseScore": 6.8 }, - "baseSeverity": "HIGH", - "exploitabilityScore": 10.0, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.6, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-295" } ] } @@ -62,144 +62,45 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:adam_megacz:tinyssl:1.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7F56C6A1-E4A4-4F47-8043-A2695D12A4D5" + "criteria": "cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "685F1981-EA61-4A00-89F8-A748A88962F8" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:kde:konqueror:2.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "D435E39F-4F70-481B-9225-B072B79BEB69" + "criteria": "cpe:2.3:o:microsoft:windows_98:-:*:*:*:*:*:*:*", + "matchCriteriaId": "40FC681A-7B85-4495-8DCC-C459FE7E2F13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:kde:konqueror:3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "8AD68BAB-8945-4A22-938E-12C01D0111D0" + "criteria": "cpe:2.3:o:microsoft:windows_98se:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2354216-8103-49F9-A95C-7DE4F738BBEE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:kde:konqueror:3.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "7B3220BF-B0AF-4C90-89BD-B425EE58021D" + "criteria": "cpe:2.3:o:microsoft:windows_me:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5E44D629-D3EB-4F67-BF67-B25910453562" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:kde:konqueror:3.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "FA53FB7A-AF7F-45B2-AF23-11B1FC4EC289" + "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:-:*:*:-:*:*:*", + "matchCriteriaId": "4C5FEF8F-FB20-4518-A9ED-412B8E924AA2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:ie_for_macintosh:5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "24AF4E57-D3DF-4D5A-958D-A593454A39A7" + "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:-:*:*:terminal_server:*:*:*", + "matchCriteriaId": "E30F6C9C-3371-44FF-AD0B-3CAA0AB6F1B8" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:ie_for_macintosh:5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "54861851-0AD7-43C7-AF38-ECE9BD69CAE1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:ie_for_macintosh:5.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "BFCB6BED-ACFD-431B-B272-C0954ED203FA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E6B8985B-B927-4928-B1DB-18E29F796992" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:internet_explorer:5.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3A04FEA6-37B0-44B0-844F-55652ABA1F85" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp1:*:*:*:*:*:*", - "matchCriteriaId": "4D56FB8E-2553-47C1-82A2-9E59023780CE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp2:*:*:*:*:*:*", - "matchCriteriaId": "8541EEED-94F4-42F8-9719-57F3EC85D52B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*", - "matchCriteriaId": "40F8042F-C621-45AE-9F8C-70469579643A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:internet_explorer:5.5:sp1:*:*:*:*:*:*", - "matchCriteriaId": "2CD04E07-3664-4D4F-BF3E-6B33AF0F2D12" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:*", - "matchCriteriaId": "D05ED9D0-CF78-4FAD-9371-6FB3D5825148" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A19F6133-25D1-44A5-B6B9-354703436783" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "413C07EA-139F-4B7D-A58B-835BD2591FA0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office:98:*:mac:*:*:*:*:*", - "matchCriteriaId": "36227AF5-8A53-41E3-88E3-5978C22BBAB2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office:2001:*:macintosh:*:*:*:*:*", - "matchCriteriaId": "1B397137-45EC-4856-9F91-0C682BF6990E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office:2001:sr1:mac_os:*:*:*:*:*", - "matchCriteriaId": "68257FB3-3280-4299-A96B-613F60D797C3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office:v.x:*:*:*:*:*:*:*", - "matchCriteriaId": "310DF9B3-3494-4BD4-8A9D-82211EA6C518" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:outlook_express:4.5:*:macos:*:*:*:*:*", - "matchCriteriaId": "846A98FC-362A-4C0D-95D9-E4809BA5057E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:outlook_express:5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "1F71D6D7-6CB2-4BE9-839A-A5714144029C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:outlook_express:5.0:*:macos:*:*:*:*:*", - "matchCriteriaId": "0C607D22-B01D-4404-9657-0D322CE59B0D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:outlook_express:5.0.1:*:macos:*:*:*:*:*", - "matchCriteriaId": "A47283EA-513A-4EDC-BADA-659AFA28EA38" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:outlook_express:5.0.2:*:macos:*:*:*:*:*", - "matchCriteriaId": "EBA048BD-04A9-4BB9-9F3C-60FB1BE1D2BD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:outlook_express:5.0.3:*:macos:*:*:*:*:*", - "matchCriteriaId": "FB6349F9-6C93-48A1-92F6-18BF1D286DF9" + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B47EBFCC-1828-45AB-BC6D-FB980929A81A" } ] } ] }, { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -207,228 +108,29 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:baltimore_technologies:mailsecure:*:*:*:*:*:*:*:*", - "matchCriteriaId": "263600BD-C8FA-4A8D-A51B-0DE5BA769FAC" + "criteria": "cpe:2.3:a:microsoft:internet_explorer:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C37BA825-679F-4257-9F2B-CE2318B75396" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:kde:kde:2.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EEAE9343-7A7F-4CB0-8CEF-52D61BD689C3" + "criteria": "cpe:2.3:a:microsoft:office:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C6AE930-8EFD-4EE5-AD18-A1205B80DE60" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:kde:kde:2.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "3F531972-E0A7-4E7C-A899-3766CEAAE2EF" - }, + "criteria": "cpe:2.3:a:microsoft:outlook_express:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC52CAA4-467E-402C-BC60-AB322FC5786F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:kde:kde:3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4CEED379-3111-4451-B782-8C66CE568A1C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:kde:kde:3.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B146FCD3-F6E7-4412-94FD-F9E66089C227" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:kde:kde:3.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "99CB51E4-0BFC-4C7C-B9EE-3DBCB0188D73" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", - "matchCriteriaId": "4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*", - "matchCriteriaId": "294EBA01-147B-4DA0-937E-ACBB655EDE53" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "4E8B7346-F2AA-434C-A048-7463EC1BB117" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*", - "matchCriteriaId": "BE1A6107-DE00-4A1C-87FC-9E4015165B5B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2000_terminal_services:*:*:*:*:*:*:*:*", - "matchCriteriaId": "9D34EFE5-22B7-4E8D-B5B2-2423C37CFFA7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp1:*:*:*:*:*:*", - "matchCriteriaId": "8208AFC9-0EFC-4A90-AD5A-FD94F5542885" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "4D4168AE-D19E-482E-8F2B-3E798B2D84E7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp3:*:*:*:*:*:*", - "matchCriteriaId": "B5E149E7-B748-44F6-BB55-68D5BF87AF41" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*", - "matchCriteriaId": "2D3B703C-79B2-4FA2-9E12-713AB977A880" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*", - "matchCriteriaId": "AA733AD2-D948-46A0-A063-D29081A56F1F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*", - "matchCriteriaId": "799DA395-C7F8-477C-8BC7-5B4B88FB7503" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E53CDA8E-50A8-4509-B070-CCA5604FFB21" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:alpha:*:*:*:*:*", - "matchCriteriaId": "1A4FF113-BDCB-472C-A300-3DE5A12A7031" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*", - "matchCriteriaId": "6E7E6AD3-5418-4FEA-84B5-833059CA880D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "5BDCBCB8-DAA3-465F-ADDE-9143B8251989" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:alpha:*:*:*:*:*", - "matchCriteriaId": "F8E32528-4DA7-4FF8-BBA1-929C5C44FAD4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:*", - "matchCriteriaId": "EA262C44-C0E6-493A-B8E5-4D26E4013226" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*", - "matchCriteriaId": "B86E0671-ED68-4549-B3AC-FD8BD79B0860" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:alpha:*:*:*:*:*", - "matchCriteriaId": "3F9C691E-CD79-4D8B-BD35-04BDE4422A4E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:*", - "matchCriteriaId": "EB519FE0-9E7D-4E71-8873-356C9D7CEAB5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:*", - "matchCriteriaId": "BB76E7EC-C396-4537-9065-4E815DA7097C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:alpha:*:*:*:*:*", - "matchCriteriaId": "0EF2010D-5D16-40A7-B7DE-8168C76E5BDB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:*", - "matchCriteriaId": "224F8968-9F4C-4727-AAA3-61F5578EF54C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:*", - "matchCriteriaId": "4CD026E2-B073-40A6-AD4A-8C76B9169B01" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:alpha:*:*:*:*:*", - "matchCriteriaId": "DD500955-71F7-41AD-96EE-E8CC6A7FA7A3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:*", - "matchCriteriaId": "407DA6E8-0832-49FE-AE14-35C104C237EC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:*:*:*:*:*:*", - "matchCriteriaId": "DBFB3E49-3FB5-4947-856D-727CBFFBA543" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:alpha:*:*:*:*:*", - "matchCriteriaId": "CC031C07-FA91-426B-9772-64910AE12635" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:*", - "matchCriteriaId": "AFE612D2-DF38-404F-AED1-B8C9C24012DE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:*:*:*:*:*:*", - "matchCriteriaId": "B9236480-6450-42E1-B1FF-F336488A683A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:alpha:*:*:*:*:*", - "matchCriteriaId": "D97FA0F5-6A53-4E3A-BFCF-1AFF4B83CB37" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:*", - "matchCriteriaId": "BCC5E316-FB61-408B-BAA2-7FE03D581250" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:*:*:*:*", - "matchCriteriaId": "14F55877-A759-4C8A-84D5-70508E449799" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:alpha:*:*:*:*:*", - "matchCriteriaId": "C79E6858-BB9C-4229-9DBE-8DA8627D10A4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:terminal_server:*:*:*:*:*", - "matchCriteriaId": "2FECD4B0-23A0-4C0B-9888-D28A5941D848" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*", - "matchCriteriaId": "91D6D065-A28D-49DA-B7F4-38421FF86498" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*", - "matchCriteriaId": "BC176BB0-1655-4BEA-A841-C4158167CC9B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:*", - "matchCriteriaId": "580B0C9B-DD85-40FA-9D37-BAC0C96D57FC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*", - "matchCriteriaId": "4BF263CB-4239-4DB0-867C-9069ED02CAD7" + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" } ] } @@ -438,35 +140,61 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=102866120821995&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://marc.info/?l=bugtraq&m=102918200405308&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://marc.info/?l=bugtraq&m=102976967730450&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-050", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9776", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1056", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1332", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2671", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2002/CVE-2002-13xx/CVE-2002-1337.json b/CVE-2002/CVE-2002-13xx/CVE-2002-1337.json index 78797360d7d..1814cbf7b66 100644 --- a/CVE-2002/CVE-2002-13xx/CVE-2002-1337.json +++ b/CVE-2002/CVE-2002-13xx/CVE-2002-1337.json @@ -2,8 +2,8 @@ "id": "CVE-2002-1337", "sourceIdentifier": "cve@mitre.org", "published": "2003-03-07T05:00:00.000", - "lastModified": "2018-10-30T16:26:22.763", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:19:11.660", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-120" } ] } @@ -62,263 +62,23 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:advanced_message_server:1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "FABD33DF-FEC4-4519-B2ED-4E498A7329FB" + "criteria": "cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "C6D3A2C0-B076-4351-8085-DA3A37117453" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:advanced_message_server:1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "2455BE6E-7540-4545-B40A-0366BDA6AE7E" + "criteria": "cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.10.0", + "versionEndExcluding": "8.11.6", + "matchCriteriaId": "5AE239ED-94EE-40C7-9133-D1F4779A2E0C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:2.6:*:nt:*:*:*:*:*", - "matchCriteriaId": "3300A5FC-69D9-4F19-AB0E-0273F5ECF45C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:2.6.1:*:nt:*:*:*:*:*", - "matchCriteriaId": "EC340D43-0E4D-4365-A604-9DDF3BD62039" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:3.0:*:nt:*:*:*:*:*", - "matchCriteriaId": "E43CBCA0-47B1-4992-A636-A0BF4441B91A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:3.0.1:*:nt:*:*:*:*:*", - "matchCriteriaId": "2FA4711B-319B-4410-A1B5-C6D8C4B1EC68" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:3.0.2:*:nt:*:*:*:*:*", - "matchCriteriaId": "F4981D22-AA6B-4901-95BA-F1BB893828B0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:5.59:*:*:*:*:*:*:*", - "matchCriteriaId": "5DFC5B8B-9102-46A9-9BD3-5CC0B671383F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:5.61:*:*:*:*:*:*:*", - "matchCriteriaId": "51BC02ED-17B1-44B3-97DB-F626A2BD2524" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:5.65:*:*:*:*:*:*:*", - "matchCriteriaId": "EF58EBCB-5735-4569-957D-C37CC38F0823" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:*", - "matchCriteriaId": "D30A1136-074A-460D-9794-DDD530626800" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "76A9602B-8E5A-4BF4-81F5-D1152D09FCAD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EFD0B100-D822-4EBF-8EC9-ADAB8141116B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:*", - "matchCriteriaId": "196D77DF-E6D4-46D0-BC2C-8804A587CA25" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B743E5A3-6B15-4877-9424-A1F1A4214B73" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.10:*:*:*:*:*:*:*", - "matchCriteriaId": "76A60742-7815-4658-A6F7-147AA48C24B6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*", - "matchCriteriaId": "9A1A24F2-9C6B-4DF0-AB04-55D051812DD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*", - "matchCriteriaId": "120271B8-08A9-4C21-A108-0DA61095A006" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*", - "matchCriteriaId": "84E6ECDA-DF65-47FF-A42F-FD5C1D864FA3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*", - "matchCriteriaId": "7AA859AF-4E4E-4077-8E98-523E617A1DDC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*", - "matchCriteriaId": "A9791650-C367-43B6-A0F4-5BB56CE10778" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*", - "matchCriteriaId": "8340DDA8-77DD-4AEB-B267-F86F64A851B3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*", - "matchCriteriaId": "07DCBBEE-1DF0-40FE-B755-1FC35CF16788" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*", - "matchCriteriaId": "581626E7-47B5-4819-B34F-B6DFD07A12F9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:*", - "matchCriteriaId": "8BBE9A4A-8AB9-4A97-A106-970FEB08952C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:*", - "matchCriteriaId": "BD99394C-5408-4A01-8D4E-417FFFFDE9C7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:*", - "matchCriteriaId": "AAB59A24-87DE-4CAD-A2BA-AFCC0B2A55B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:*", - "matchCriteriaId": "97D641EF-0B69-45A1-B85E-3C9C93AB9D42" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:*", - "matchCriteriaId": "8972211B-6A5B-4095-9CBB-CEF4C23C9C65" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*", - "matchCriteriaId": "8F81A2AD-90A0-4B97-86A3-92690A0FCA71" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "598F74BA-2B71-435E-92B8-9DEADB3311A5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*", - "matchCriteriaId": "79A46DF2-8EEB-40C8-B1CA-01BC064BD25E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*", - "matchCriteriaId": "581E5904-1A2B-49FF-BE3F-D42019AD816B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B6CC4C83-4FB9-4344-AFCB-C260659F81DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*", - "matchCriteriaId": "CAF763B4-58E3-4868-8C92-47DE3E4E5F40" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*", - "matchCriteriaId": "8A4FCB77-7FAC-4A4B-851C-2F352B44D3CB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*", - "matchCriteriaId": "6FEB3923-8F4B-4523-84F9-17D1CFA37F8C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:*", - "matchCriteriaId": "58CD19B4-4BFD-4DE8-B21F-6B6CDE6793C5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "5492A89B-8140-4CF7-BE81-09C25A64373A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B2A6D5AF-2134-4EC5-B53A-CE95B5505325" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1B5FE819-E570-4AEE-BF0C-B9B1960A1AB8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "913AF73A-F6DE-4FAF-8A09-02CD33784B27" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "661A9B85-09EE-4D38-9160-8EEA6BE07BD7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "DD930C49-512B-4114-8A97-80B1816CFCFA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "7E8553E3-578B-4BE3-BBAD-5589338586E6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E7EE5C8E-8E2E-4C98-B8C5-B590E44B1EAC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "2A3930ED-DE49-4F01-A904-5D66E34832F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "A3A51855-94DD-4F2E-BFF8-4ABE4613F962" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail_switch:3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "74C77927-A67A-4C1B-BB80-18148E1F0FE0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail_switch:3.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "9C9D22E3-18F8-42F9-993E-81E832B0B125" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail_switch:3.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7BABB5CA-26F4-4DB6-9D43-1C82751DCCA1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sgi:freeware:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E7970668-A80C-461D-A779-A8A6880D319B" + "criteria": "cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.12.0", + "versionEndExcluding": "8.12.8", + "matchCriteriaId": "64788C22-64F9-41DB-A4C2-BFCD6DBD8EE6" } ] } @@ -330,6 +90,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:h:hp:alphaserver_sc:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5556D665-3792-4832-9EEE-D1122C9BF98E" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*", @@ -397,28 +162,23 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*", - "matchCriteriaId": "34EBF074-78C8-41AF-88F1-DA6726E56F8B" + "criteria": "cpe:2.3:o:oracle:solaris:2.6:*:*:*:*:*:*:*", + "matchCriteriaId": "69C7B4A8-E8D0-425C-B979-17E85458B0C6" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*", - "matchCriteriaId": "8F1F312C-413F-4DB4-ABF4-48E33F6FECF2" + "criteria": "cpe:2.3:o:oracle:solaris:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0F538D2B-1AE1-4766-830E-CF7999181128" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*", - "matchCriteriaId": "1894C542-AA81-40A9-BF47-AE24C93C1ACB" + "criteria": "cpe:2.3:o:oracle:solaris:8:*:*:*:*:*:*:*", + "matchCriteriaId": "722A52CF-4C6E-44D3-90C4-D2F72A40EF58" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*", - "matchCriteriaId": "A711CDC2-412C-499D-9FA6-7F25B06267C6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*", - "matchCriteriaId": "0B837BB7-5F62-4CD5-9C64-8553C28EA8A7" + "criteria": "cpe:2.3:o:oracle:solaris:9:*:*:*:*:*:*:*", + "matchCriteriaId": "4F864AD7-53A2-4225-870F-062876CE45DD" }, { "vulnerable": true, @@ -458,84 +218,112 @@ ] } ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:h:hp:alphaserver_sc:*:*:*:*:*:*:*:*", - "matchCriteriaId": "5556D665-3792-4832-9EEE-D1122C9BF98E" - } - ] - } - ] } ], "references": [ { "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-002.txt.asc", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "ftp://ftp.sco.com/pub/updates/OpenServer/CSSA-2003-SCO.6", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.5", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "ftp://patches.sgi.com/support/free/security/advisories/20030301-01-P", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000571", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2003:028", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://marc.info/?l=bugtraq&m=104673778105192&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://marc.info/?l=bugtraq&m=104678739608479&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://marc.info/?l=bugtraq&m=104678862109841&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://marc.info/?l=bugtraq&m=104678862409849&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://marc.info/?l=bugtraq&m=104679411316818&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www-1.ibm.com/support/search.wss?rs=0&q=IY40500&apar=only", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www-1.ibm.com/support/search.wss?rs=0&q=IY40501&apar=only", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www-1.ibm.com/support/search.wss?rs=0&q=IY40502&apar=only", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.cert.org/advisories/CA-2003-07.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Third Party Advisory", "US Government Resource" @@ -543,45 +331,65 @@ }, { "url": "http://www.debian.org/security/2003/dsa-257", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] }, { "url": "http://www.iss.net/security_center/static/10748.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.kb.cert.org/vuls/id/398025", "source": "cve@mitre.org", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2003-073.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2003-074.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2003-227.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/6991", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Patch", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, @@ -589,13 +397,17 @@ "url": "http://www.sendmail.org/8.12.8.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2222", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2002/CVE-2002-16xx/CVE-2002-1657.json b/CVE-2002/CVE-2002-16xx/CVE-2002-1657.json index 8cc0fec8f9d..28e9a99bb15 100644 --- a/CVE-2002/CVE-2002-16xx/CVE-2002-1657.json +++ b/CVE-2002/CVE-2002-16xx/CVE-2002-1657.json @@ -2,8 +2,8 @@ "id": "CVE-2002-1657", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2017-07-11T01:29:18.977", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:06:02.117", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-916" } ] } @@ -69,19 +91,32 @@ "references": [ { "url": "http://archives.postgresql.org/pgsql-admin/2002-08/msg00253.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://marc.info/?l=bugtraq&m=111402558115859&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://marc.info/?l=bugtraq&m=111403050902165&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20215", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2002/CVE-2002-20xx/CVE-2002-2058.json b/CVE-2002/CVE-2002-20xx/CVE-2002-2058.json index dd307deaf92..c5dcba35636 100644 --- a/CVE-2002/CVE-2002-20xx/CVE-2002-2058.json +++ b/CVE-2002/CVE-2002-20xx/CVE-2002-2058.json @@ -2,7 +2,7 @@ "id": "CVE-2002-2058", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2008-09-05T20:32:13.277", + "lastModified": "2024-02-09T03:13:12.903", "vulnStatus": "Analyzed", "descriptions": [ { @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-327" } ] } @@ -58,8 +80,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:teekai:teekai_tracking_online:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6CF716C7-4724-4285-B70B-D80DC93AECC2" + "criteria": "cpe:2.3:a:teekai:tracking_online:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "523720B9-4867-4CE1-B26B-DCC3B67ADB19" } ] } @@ -67,15 +89,30 @@ } ], "references": [ + { + "url": "http://online.securityfocus.com/archive/82/275246", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, { "url": "http://www.iss.net/security_center/static/9286.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/4926", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Broken Link", + "Exploit", + "Third Party Advisory", + "VDB Entry" ] } ] diff --git a/CVE-2002/CVE-2002-22xx/CVE-2002-2227.json b/CVE-2002/CVE-2002-22xx/CVE-2002-2227.json index e00de810e79..31297c50745 100644 --- a/CVE-2002/CVE-2002-22xx/CVE-2002-2227.json +++ b/CVE-2002/CVE-2002-22xx/CVE-2002-2227.json @@ -2,8 +2,8 @@ "id": "CVE-2002-2227", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2017-07-29T01:29:00.903", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:26:37.673", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -44,7 +44,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-787" } ] } @@ -72,21 +72,36 @@ "url": "http://www.rtfm.com/ssldump/", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/archive/1/291329", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/5693", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10087", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2003/CVE-2003-05xx/CVE-2003-0595.json b/CVE-2003/CVE-2003-05xx/CVE-2003-0595.json index 25416efd9e0..c310f33300a 100644 --- a/CVE-2003/CVE-2003-05xx/CVE-2003-0595.json +++ b/CVE-2003/CVE-2003-05xx/CVE-2003-0595.json @@ -2,7 +2,7 @@ "id": "CVE-2003-0595", "sourceIdentifier": "cve@mitre.org", "published": "2003-08-27T04:00:00.000", - "lastModified": "2008-09-10T19:19:45.913", + "lastModified": "2024-02-09T03:18:52.730", "vulnStatus": "Analyzed", "descriptions": [ { @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-120" } ] } @@ -62,13 +62,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:witango:tango_server:2000:*:*:*:*:*:*:*", - "matchCriteriaId": "181CC9FA-F528-498D-B213-1507D556DFCC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:witango:witango_server:5.0.1.061:*:*:*:*:*:*:*", - "matchCriteriaId": "661B431E-D000-4B4F-82FE-0671D89293E4" + "criteria": "cpe:2.3:a:terascript:wintango_application_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.0.1.062", + "matchCriteriaId": "21260B88-939C-48A9-BB79-828035DD41E5" } ] } @@ -80,6 +76,7 @@ "url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0038.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Vendor Advisory" ] diff --git a/CVE-2003/CVE-2003-07xx/CVE-2003-0721.json b/CVE-2003/CVE-2003-07xx/CVE-2003-0721.json index 46bfa57fe53..f2b138d04bf 100644 --- a/CVE-2003/CVE-2003-07xx/CVE-2003-0721.json +++ b/CVE-2003/CVE-2003-07xx/CVE-2003-0721.json @@ -2,8 +2,8 @@ "id": "CVE-2003-0721", "sourceIdentifier": "cve@mitre.org", "published": "2003-09-17T04:00:00.000", - "lastModified": "2018-05-03T01:29:22.693", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:14:35.583", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-129" } ] } @@ -62,68 +62,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:university_of_washington:pine:3.98:*:*:*:*:*:*:*", - "matchCriteriaId": "49E9FC97-FE8B-46E9-BFB5-AC24524CCB97" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:university_of_washington:pine:4.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "A5BFF7E7-E49E-466A-A0D3-FDF13596BAF7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:university_of_washington:pine:4.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "D405F684-38E2-4AC4-8451-F4842E67C509" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:university_of_washington:pine:4.10:*:*:*:*:*:*:*", - "matchCriteriaId": "358A71B0-79F2-4728-AC1E-5872BC64B2C3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:university_of_washington:pine:4.20:*:*:*:*:*:*:*", - "matchCriteriaId": "16766308-A2F2-4155-A4F7-702808CC9450" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:university_of_washington:pine:4.21:*:*:*:*:*:*:*", - "matchCriteriaId": "AA9E599F-D922-42B7-9FB5-FB025B095895" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:university_of_washington:pine:4.30:*:*:*:*:*:*:*", - "matchCriteriaId": "9F7C068F-1664-4022-B88D-E486EEDD501C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:university_of_washington:pine:4.33:*:*:*:*:*:*:*", - "matchCriteriaId": "A3F37B4B-C812-46AD-A23B-3FE60D31587D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:university_of_washington:pine:4.44:*:*:*:*:*:*:*", - "matchCriteriaId": "8E10453B-C2A8-4203-B8D1-C77D00DE4315" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:university_of_washington:pine:4.50:*:*:*:*:*:*:*", - "matchCriteriaId": "9C8E2F32-BEBE-49DA-9A8D-1C9A17CDDDC0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:university_of_washington:pine:4.52:*:*:*:*:*:*:*", - "matchCriteriaId": "D9269B2E-4375-41C0-B937-D72EE5EAE4E6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:university_of_washington:pine:4.53:*:*:*:*:*:*:*", - "matchCriteriaId": "C8E05D27-10F6-43CF-B7E9-73A82DE02953" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:university_of_washington:pine:4.56:*:*:*:*:*:*:*", - "matchCriteriaId": "DED052D4-BF8D-4F63-83C4-6F58ADEFE9E0" + "criteria": "cpe:2.3:a:washington:pine:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.58", + "matchCriteriaId": "6B025441-B8A0-441D-9FB5-E6D9679625D9" } ] } @@ -133,20 +74,30 @@ "references": [ { "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009850.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://marc.info/?l=bugtraq&m=106329356702508&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://marc.info/?l=bugtraq&m=106367213400313&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.idefense.com/advisory/09.10.03.txt", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Patch", "Vendor Advisory" @@ -156,17 +107,24 @@ "url": "http://www.redhat.com/support/errata/RHSA-2003-273.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2003-274.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A503", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2003/CVE-2003-12xx/CVE-2003-1229.json b/CVE-2003/CVE-2003-12xx/CVE-2003-1229.json index 6ea0270f73c..6aceff0704e 100644 --- a/CVE-2003/CVE-2003-12xx/CVE-2003-1229.json +++ b/CVE-2003/CVE-2003-12xx/CVE-2003-1229.json @@ -2,7 +2,7 @@ "id": "CVE-2003-1229", "sourceIdentifier": "cve@mitre.org", "published": "2003-12-31T05:00:00.000", - "lastModified": "2022-09-13T18:45:57.620", + "lastModified": "2024-02-09T03:26:42.917", "vulnStatus": "Analyzed", "descriptions": [ { @@ -58,293 +58,17 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_web_start:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "2C1E8E17-C426-424C-82D7-0D54D2B83687" + "criteria": "cpe:2.3:a:oracle:jre:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.3.0", + "versionEndIncluding": "1.4.1", + "matchCriteriaId": "FF497F0F-1E5C-4A09-AFC6-E288A12AC0B5" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_web_start:1.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2C248C52-F922-458D-9566-0AEA9FEC037A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_web_start:1.0.1_01:*:*:*:*:*:*:*", - "matchCriteriaId": "D5B745C9-7B4B-4ECD-AE4C-11C332DB08FA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_web_start:1.0.1_02:*:*:*:*:*:*:*", - "matchCriteriaId": "2D1EEB86-E5BB-4034-B9FD-C869F6D069EF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_web_start:1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B53966B2-0CC5-4590-A7C7-82252F837A26" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jdk:1.3:*:solaris:*:*:*:*:*", - "matchCriteriaId": "D66D2BCE-FAF5-4F88-A09F-28226C4A98D2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jdk:1.3.0_02:*:linux:*:*:*:*:*", - "matchCriteriaId": "74D5059B-CF4F-4EEE-99B4-B3052831F2A2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jdk:1.3.0_02:*:windows:*:*:*:*:*", - "matchCriteriaId": "1F601DB9-596C-4922-AAA1-601B7DF82AF7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jdk:1.3.0_05:*:linux:*:*:*:*:*", - "matchCriteriaId": "6D7E0A15-F9F8-4FE0-99DC-C7F1C4C607DF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jdk:1.3.0_05:*:windows:*:*:*:*:*", - "matchCriteriaId": "2E525A70-8256-4BE9-B9F2-CB4F0005C285" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jdk:1.3.1_01:*:linux:*:*:*:*:*", - "matchCriteriaId": "7914F3C3-70D2-4528-8781-74F8EE2A672F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jdk:1.3.1_01:*:solaris:*:*:*:*:*", - "matchCriteriaId": "C25FD66C-2B23-4A08-95A9-C026B6C7B334" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jdk:1.3.1_01a:*:windows:*:*:*:*:*", - "matchCriteriaId": "4EE03D61-ED9C-4E5A-8B8A-B9DE6D953A59" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jdk:1.3.1_03:*:linux:*:*:*:*:*", - "matchCriteriaId": "91C7D131-506C-4AEC-A736-0E4D4C6DFED7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jdk:1.3.1_03:*:solaris:*:*:*:*:*", - "matchCriteriaId": "38B09D0A-D9E1-440C-9111-5E04D983F687" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jdk:1.3.1_03:*:windows:*:*:*:*:*", - "matchCriteriaId": "7C3BD547-71C6-4A69-9F98-AD082595B6C9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jdk:1.3.1_05:*:linux:*:*:*:*:*", - "matchCriteriaId": "4229767D-F6B2-47A2-A1EA-CA86A10ECF17" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jdk:1.3.1_05:*:solaris:*:*:*:*:*", - "matchCriteriaId": "AA641432-0B20-4F91-A9C1-804BBE1E05D7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jdk:1.3.1_05:*:windows:*:*:*:*:*", - "matchCriteriaId": "2A23F13E-57BD-4D8D-A767-5D8BA4F24A88" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jdk:1.3_02:*:solaris:*:*:*:*:*", - "matchCriteriaId": "96DAF51F-68D8-4462-9DC3-2ECDC026C32F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jdk:1.3_05:*:solaris:*:*:*:*:*", - "matchCriteriaId": "6CB0EEBB-725C-4CBB-8F27-0D497B4DB734" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jdk:1.4:*:linux:*:*:*:*:*", - "matchCriteriaId": "32CA2101-45D2-41D8-A11A-506683EDC0DC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jdk:1.4:*:solaris:*:*:*:*:*", - "matchCriteriaId": "2E449C78-3BFD-4F52-9EE2-3BC5FC27FBCC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jdk:1.4:*:windows:*:*:*:*:*", - "matchCriteriaId": "3C4BAD5A-329C-4C6F-B517-E7C95EEAEB99" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jdk:1.4.0_02:*:linux:*:*:*:*:*", - "matchCriteriaId": "AD97824E-C229-4530-A4E6-C4281E2580C6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jdk:1.4.0_02:*:solaris:*:*:*:*:*", - "matchCriteriaId": "B90BBCB8-7DF5-4801-8B43-197C2FB88823" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jdk:1.4.0_02:*:windows:*:*:*:*:*", - "matchCriteriaId": "666FE53E-C775-4D7D-98E0-C8638B2F2FAA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jdk:1.4.1:*:linux:*:*:*:*:*", - "matchCriteriaId": "C92F64D1-9916-44AC-8025-F116B70CD76A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jdk:1.4.1:*:solaris:*:*:*:*:*", - "matchCriteriaId": "DF21C410-30BF-423D-979F-7B5682573E04" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jdk:1.4.1:*:windows:*:*:*:*:*", - "matchCriteriaId": "BA9FCF82-886A-4C70-8107-FB5BE705DD45" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jre:1.3.0:*:solaris:*:*:*:*:*", - "matchCriteriaId": "36C3E5A4-7B4E-4DA3-A3B2-33ED7FDB7B0F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jre:1.3.0:*:windows:*:*:*:*:*", - "matchCriteriaId": "58EC15B8-4653-490D-8F3A-5AA5CDBA1DB3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jre:1.3.0:update1:linux:*:*:*:*:*", - "matchCriteriaId": "51BB57BF-7996-45FE-A406-309ADEC4A052" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jre:1.3.0:update2:linux:*:*:*:*:*", - "matchCriteriaId": "6B3248A9-A42D-47D7-9EF6-A68BB3F55096" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jre:1.3.0:update2:solaris:*:*:*:*:*", - "matchCriteriaId": "5F54BFB9-ACE4-4C70-9D5E-C964A37B49D9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jre:1.3.0:update2:windows:*:*:*:*:*", - "matchCriteriaId": "F2255FF1-CD7F-416E-82CE-727A0D9B9B00" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jre:1.3.0:update5:linux:*:*:*:*:*", - "matchCriteriaId": "6ED3AE5C-F50B-4ABE-AD92-D6F91E6F1D6B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jre:1.3.0:update5:solaris:*:*:*:*:*", - "matchCriteriaId": "DD448EDD-02A6-4902-8003-2C24490CDDEF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jre:1.3.0:update5:windows:*:*:*:*:*", - "matchCriteriaId": "6668C814-CF6F-4684-B84E-F0E24C318677" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jre:1.3.1:*:linux:*:*:*:*:*", - "matchCriteriaId": "AB5A6F28-5B2E-4020-AC22-5FF1AB5DC0F8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jre:1.3.1:update1:linux:*:*:*:*:*", - "matchCriteriaId": "2458734D-2871-4104-B791-F12218A65CA0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jre:1.3.1:update1:solaris:*:*:*:*:*", - "matchCriteriaId": "CEB5308E-DFBE-4038-A618-F5448E7B590D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jre:1.3.1:update1a:windows:*:*:*:*:*", - "matchCriteriaId": "CD25BB5F-16E0-48D8-BD6B-9AAA95EF84F9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jre:1.3.1_03:*:linux:*:*:*:*:*", - "matchCriteriaId": "C1C8FAED-AD0F-4B28-A5EF-DBD6514D60CF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jre:1.3.1_03:*:solaris:*:*:*:*:*", - "matchCriteriaId": "16C38B5F-673D-47F2-87C6-59B2CBF917BC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jre:1.3.1_03:*:windows:*:*:*:*:*", - "matchCriteriaId": "78916851-B219-4E06-A35F-EAF3680A8F75" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jre:1.3.1_05:*:linux:*:*:*:*:*", - "matchCriteriaId": "76CB2CF8-242B-4C09-9B1A-12C39E35AB18" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jre:1.3.1_05:*:solaris:*:*:*:*:*", - "matchCriteriaId": "7B1A497B-BF46-4B5B-B4C4-1382319F2ACB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jre:1.3.1_05:*:windows:*:*:*:*:*", - "matchCriteriaId": "2E95B9F6-ADF2-47A5-A0AC-2A129A7A40CB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jre:1.4:*:linux:*:*:*:*:*", - "matchCriteriaId": "16EB847E-C18B-4B07-940D-C0E312D11365" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jre:1.4:*:solaris:*:*:*:*:*", - "matchCriteriaId": "68727223-1523-467A-8AAA-ED3E4C6C4B61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jre:1.4:*:windows:*:*:*:*:*", - "matchCriteriaId": "682E551B-7B86-4161-84D5-6E1D9664A2A6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jre:1.4.0_02:*:linux:*:*:*:*:*", - "matchCriteriaId": "9E919686-B384-4C33-8264-18B5140BB526" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jre:1.4.0_02:*:solaris:*:*:*:*:*", - "matchCriteriaId": "A6980636-7B47-4AAF-B261-13E0704FABF6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jre:1.4.0_02:*:windows:*:*:*:*:*", - "matchCriteriaId": "E14CBB9A-E9A4-4BAF-ADA9-DDCEEC93A0DC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jre:1.4.1:*:linux:*:*:*:*:*", - "matchCriteriaId": "B2F5A718-AB93-4C7F-80A8-9A90ECE2AC77" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jre:1.4.1:*:solaris:*:*:*:*:*", - "matchCriteriaId": "C78AAFC5-05A6-47A2-A3B2-1B032C9169F9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:jre:1.4.1:*:windows:*:*:*:*:*", - "matchCriteriaId": "8373EE84-FCAE-4CF7-BE9D-9588D05CA827" + "criteria": "cpe:2.3:a:sun:java_web_start:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0", + "versionEndIncluding": "1.2", + "matchCriteriaId": "0F06D4B3-926F-4D30-ACF7-A9B334E29B11" }, { "vulnerable": true, @@ -368,6 +92,16 @@ "url": "http://java.sun.com/products/jsse/CHANGES.txt", "source": "cve@mitre.org", "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/7943", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Patch", "Vendor Advisory" ] }, @@ -375,6 +109,7 @@ "url": "http://securitytracker.com/id?1006007", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -383,6 +118,7 @@ "url": "http://securitytracker.com/id?1007483", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -391,6 +127,7 @@ "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-50081-1", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] @@ -399,6 +136,7 @@ "url": "http://www.securityfocus.com/bid/6682", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Third Party Advisory", "VDB Entry" @@ -408,6 +146,7 @@ "url": "http://www.securitytracker.com/id?1006001", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] diff --git a/CVE-2004/CVE-2004-03xx/CVE-2004-0366.json b/CVE-2004/CVE-2004-03xx/CVE-2004-0366.json index 2e800ddd1c8..0736faaf05f 100644 --- a/CVE-2004/CVE-2004-03xx/CVE-2004-0366.json +++ b/CVE-2004/CVE-2004-03xx/CVE-2004-0366.json @@ -2,8 +2,8 @@ "id": "CVE-2004-0366", "sourceIdentifier": "cve@mitre.org", "published": "2004-05-04T04:00:00.000", - "lastModified": "2017-07-11T01:30:06.337", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:14:39.287", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-89" } ] } @@ -62,9 +62,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:leon_j_breedt:pam-pgsql:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.5.2", - "matchCriteriaId": "BDFBBA0B-216A-46B8-9B49-16A9E9F957A2" + "criteria": "cpe:2.3:a:pam-pgsql:pam-pgsql:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.5.2", + "matchCriteriaId": "A5C6ACAE-C08D-48B3-8701-AAE917ABD719" } ] } @@ -72,21 +72,38 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/11237", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://www.debian.org/security/2004/dsa-469", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/10266", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15651", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2005/CVE-2005-03xx/CVE-2005-0369.json b/CVE-2005/CVE-2005-03xx/CVE-2005-0369.json index f271fa27c5f..510d5ab7e3a 100644 --- a/CVE-2005/CVE-2005-03xx/CVE-2005-0369.json +++ b/CVE-2005/CVE-2005-03xx/CVE-2005-0369.json @@ -2,8 +2,8 @@ "id": "CVE-2005-0369", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", - "lastModified": "2016-10-18T03:11:06.860", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:13:32.143", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -44,7 +44,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-129" } ] } @@ -58,15 +58,15 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:armagetron:armagetron:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:armagetronad:armagetron:*:*:*:*:*:*:*:*", "versionEndIncluding": "0.2.6.0", - "matchCriteriaId": "5C52FDC9-AC81-4F1F-9112-0C2C2512C308" + "matchCriteriaId": "E02DEC87-A8AA-4B60-A528-03A54EFD3899" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:armagetron:armagetron_advanced:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:armagetronad:armagetron_advanced:*:*:*:*:*:*:*:*", "versionEndIncluding": "0.2.7.0", - "matchCriteriaId": "8EBF70D5-B05E-4EDC-B74B-DD6C45163BBC" + "matchCriteriaId": "60E336F6-94E6-4977-9ED0-CDE0E4D8F4D7" } ] } @@ -76,7 +76,10 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=110811699206052&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2005/CVE-2005-04xx/CVE-2005-0408.json b/CVE-2005/CVE-2005-04xx/CVE-2005-0408.json index 2b0bf0e4d1f..0161b81a3e6 100644 --- a/CVE-2005/CVE-2005-04xx/CVE-2005-0408.json +++ b/CVE-2005/CVE-2005-04xx/CVE-2005-0408.json @@ -2,7 +2,7 @@ "id": "CVE-2005-0408", "sourceIdentifier": "cve@mitre.org", "published": "2005-02-14T05:00:00.000", - "lastModified": "2008-09-10T19:35:31.147", + "lastModified": "2024-02-09T03:13:25.890", "vulnStatus": "Analyzed", "descriptions": [ { @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-916" } ] } @@ -70,7 +92,10 @@ "references": [ { "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031707.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redteam-pentesting.de/advisories/rt-sa-2005-002.txt", diff --git a/CVE-2005/CVE-2005-29xx/CVE-2005-2946.json b/CVE-2005/CVE-2005-29xx/CVE-2005-2946.json index 772efbe6c0a..3bd40976fb8 100644 --- a/CVE-2005/CVE-2005-29xx/CVE-2005-2946.json +++ b/CVE-2005/CVE-2005-29xx/CVE-2005-2946.json @@ -2,7 +2,7 @@ "id": "CVE-2005-2946", "sourceIdentifier": "cve@mitre.org", "published": "2005-09-16T22:03:00.000", - "lastModified": "2009-01-07T05:00:00.000", + "lastModified": "2024-02-09T03:13:55.780", "vulnStatus": "Analyzed", "descriptions": [ { @@ -18,6 +18,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -51,7 +73,7 @@ "description": [ { "lang": "en", - "value": "CWE-310" + "value": "CWE-327" } ] } @@ -65,228 +87,29 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*", - "matchCriteriaId": "14D983EC-61B0-4FD9-89B5-9878E4CE4405" + "criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.9.8", + "matchCriteriaId": "725D1BFE-7122-43F8-A9EC-E1737C7AD73C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*", + "matchCriteriaId": "778A6957-455B-420A-BAAF-E7F88FF4FB1E" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*", - "matchCriteriaId": "B5D7BE3C-8CA2-4FB2-B4AE-B201D88C2A9D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*", - "matchCriteriaId": "BC4C5F05-BC0B-478D-9A6F-7C804777BA41" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*", - "matchCriteriaId": "27F417A1-5D97-4BC4-8B97-5AC40236DA21" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*", - "matchCriteriaId": "8847BD34-BDE6-4AE9-96D9-75B9CF93A6A8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*", - "matchCriteriaId": "4EDB5A09-BE86-4352-9799-A875649EDB7D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*", - "matchCriteriaId": "B6231CAA-00A8-41CE-8436-B84518014CF1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*", - "matchCriteriaId": "A70AD93B-E876-4EAB-9970-752D42E15E99" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*", - "matchCriteriaId": "F03FA9C0-24C7-46AC-92EC-7834BC34C79B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*", - "matchCriteriaId": "716ADA01-38B8-4C15-A3BB-D9688DA30599" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*", - "matchCriteriaId": "B73326F7-7DCE-4EDE-95D7-AE7AED263A14" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*", - "matchCriteriaId": "B5E4742C-A983-4F00-B24F-AB280C0E876D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*", - "matchCriteriaId": "EA2D251C-9C45-4EFE-8262-E88AB7CE713A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*", - "matchCriteriaId": "6D81E175-E698-40EF-9601-425893FFB1FC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*", - "matchCriteriaId": "FA0F25B7-A172-4300-8718-112E817A6165" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*", - "matchCriteriaId": "8A0628DF-3A4C-4078-B615-22260671EABF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*", - "matchCriteriaId": "52B1BE89-BAE0-4656-943B-B9B81D9B54B3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*", - "matchCriteriaId": "D097222B-ED20-459C-9167-55751FA2C87A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*", - "matchCriteriaId": "86DDC8F2-7920-4A73-927E-562C89806972" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*", - "matchCriteriaId": "962FCB86-15AD-4399-8B7D-EC1DEA919C59" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*", - "matchCriteriaId": "0FCA45CE-4127-47AD-BBA8-8A6DD83AE1C7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*", - "matchCriteriaId": "7CA1CA40-7DB5-4DCA-97A8-9A8CF4FECECC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*", - "matchCriteriaId": "180D07AE-C571-4DD6-837C-43E2A946007A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*", - "matchCriteriaId": "BA3E4D2A-6488-4F8B-A3CA-4161A10FA4DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*", - "matchCriteriaId": "90789533-C741-4B1C-A24B-2C77B9E4DE5F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*", - "matchCriteriaId": "1520065B-46D7-48A4-B9D0-5B49F690C5B4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*", - "matchCriteriaId": "5B76FE2D-FBE0-4A3B-A0EA-179332D74F0E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*", - "matchCriteriaId": "2AA526B9-726A-49D5-B3CA-EBE2DA303CA0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*", - "matchCriteriaId": "494E48E7-EF86-4860-9A53-94F6C313746E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*", - "matchCriteriaId": "2636B92E-47D5-42EA-9585-A2B84FBE71CB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*", - "matchCriteriaId": "72FE2F46-2D0C-4C90-AFBE-D2E7B496D6E4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*", - "matchCriteriaId": "45A518E8-21BE-4C5C-B425-410AB1208E9C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*", - "matchCriteriaId": "9E3AB748-E463-445C-ABAB-4FEDDFD1878B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*", - "matchCriteriaId": "660E4B8D-AABA-4520-BC4D-CF8E76E07C05" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*", - "matchCriteriaId": "85BFEED5-4941-41BB-93D1-CD5C2A41290E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta4:*:*:*:*:*:*", - "matchCriteriaId": "9644CC68-1E91-45E7-8C53-1E3FC9976A4E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta5:*:*:*:*:*:*", - "matchCriteriaId": "9B1B98C4-1FFD-4A7C-AA86-A34BC6F7AB31" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta6:*:*:*:*:*:*", - "matchCriteriaId": "73934717-2DA3-4614-A076-D6EDA5EB0626" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*", - "matchCriteriaId": "78E79A05-64F3-4397-952C-A5BB950C967D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*", - "matchCriteriaId": "7F7C9E77-1EB2-4720-A8FD-23DC1C877D5A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*", - "matchCriteriaId": "549BB01D-F322-4FE3-BDA2-4FEA8ED8568A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*", - "matchCriteriaId": "4DE6CBD6-D6DD-4BC5-93F6-FDEA70163336" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*", - "matchCriteriaId": "98693865-2E79-4BD6-9F89-1994BC9A3E73" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*", - "matchCriteriaId": "D6476506-EC37-4726-82DC-D0E8254A8CDD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*", - "matchCriteriaId": "5D6ECEF7-CB16-4604-894B-6EB19F1CEF55" + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*", + "matchCriteriaId": "42E47538-08EE-4DC1-AC17-883C44CF77BB" } ] } @@ -294,6 +117,13 @@ } ], "references": [ + { + "url": "http://www.cits.rub.de/MD5Collisions/", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://www.ubuntu.com/usn/usn-179-1", "source": "cve@mitre.org", @@ -305,6 +135,8 @@ "url": "https://bugzilla.ubuntu.com/show_bug.cgi?id=13593", "source": "cve@mitre.org", "tags": [ + "Broken Link", + "Issue Tracking", "Vendor Advisory" ] } diff --git a/CVE-2005/CVE-2005-34xx/CVE-2005-3435.json b/CVE-2005/CVE-2005-34xx/CVE-2005-3435.json index 5d7ace7e214..8aaae99d368 100644 --- a/CVE-2005/CVE-2005-34xx/CVE-2005-3435.json +++ b/CVE-2005/CVE-2005-34xx/CVE-2005-3435.json @@ -2,8 +2,8 @@ "id": "CVE-2005-3435", "sourceIdentifier": "cve@mitre.org", "published": "2005-11-02T11:02:00.000", - "lastModified": "2017-07-11T01:33:12.017", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:13:36.147", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-522" } ] } @@ -70,11 +92,26 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=113018731120709&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://secunia.com/advisories/17310/", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22860", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2006/CVE-2006-10xx/CVE-2006-1058.json b/CVE-2006/CVE-2006-10xx/CVE-2006-1058.json index 83598a502c6..b3e866ab355 100644 --- a/CVE-2006/CVE-2006-10xx/CVE-2006-1058.json +++ b/CVE-2006/CVE-2006-10xx/CVE-2006-1058.json @@ -2,8 +2,8 @@ "id": "CVE-2006-1058", "sourceIdentifier": "secalert@redhat.com", "published": "2006-04-04T10:04:00.000", - "lastModified": "2017-10-11T01:30:40.860", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:05:29.307", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -22,6 +22,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -55,7 +77,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-916" } ] } @@ -75,32 +97,113 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:avaya:aura_application_enablement_services:4.01:*:*:*:*:*:*:*", + "matchCriteriaId": "BA477675-E93D-41F6-A10C-4B6CFBA97C93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:avaya:aura_application_enablement_services:4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "0DBE1432-359B-4250-8381-E24511D24B14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:avaya:aura_sip_enablement_services:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.0", + "matchCriteriaId": "7CCDF311-E2C3-4AAC-83D1-44938370FBFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:avaya:message_networking:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3D8F6982-2F4D-4D78-92C1-97689D59F3A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:avaya:messaging_storage_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0", + "versionEndExcluding": "4.0", + "matchCriteriaId": "9AEA45A8-8768-4CB4-8996-91D7F7AEC9F5" + } + ] + } + ] } ], "references": [ { "url": "http://bugs.busybox.net/view.php?id=604", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/19477", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/25098", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/25848", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-250.htm", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2007-0244.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/17330", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25569", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9483", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2006/CVE-2006-32xx/CVE-2006-3211.json b/CVE-2006/CVE-2006-32xx/CVE-2006-3211.json index 6efcb177671..9494fa3e404 100644 --- a/CVE-2006/CVE-2006-32xx/CVE-2006-3211.json +++ b/CVE-2006/CVE-2006-32xx/CVE-2006-3211.json @@ -2,8 +2,8 @@ "id": "CVE-2006-3211", "sourceIdentifier": "cve@mitre.org", "published": "2006-06-24T01:06:00.000", - "lastModified": "2018-10-18T16:46:18.173", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:21:27.257", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -37,7 +37,7 @@ "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, - "userInteractionRequired": false + "userInteractionRequired": true } ] }, @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-79" } ] } @@ -62,14 +62,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:cjguestbook:cjguestbook:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:cjguestbook_project:cjguestbook:*:*:*:*:*:*:*:*", "versionEndIncluding": "1.3", - "matchCriteriaId": "C711815A-A4DD-4E5D-A3DB-FC7DB1F7A3F9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cjguestbook:cjguestbook:1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7B40858C-7B2D-4853-9919-C02B9FD39E57" + "matchCriteriaId": "01B47CAF-4E2B-49B1-8448-0142BBC1D1DF" } ] } @@ -77,25 +72,53 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/20751", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/1141", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.securityfocus.com/archive/1/438008/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/18556", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.vupen.com/english/advisories/2006/2488", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27322", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2006/CVE-2006-32xx/CVE-2006-3295.json b/CVE-2006/CVE-2006-32xx/CVE-2006-3295.json index 61949e5113a..0563cffec7c 100644 --- a/CVE-2006/CVE-2006-32xx/CVE-2006-3295.json +++ b/CVE-2006/CVE-2006-32xx/CVE-2006-3295.json @@ -2,8 +2,8 @@ "id": "CVE-2006-3295", "sourceIdentifier": "cve@mitre.org", "published": "2006-06-29T01:05:00.000", - "lastModified": "2018-10-18T16:46:38.187", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:26:31.087", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -37,7 +37,7 @@ "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, - "userInteractionRequired": false + "userInteractionRequired": true } ] }, @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-79" } ] } @@ -62,8 +62,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:george_currums:open_guestbook:0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "520FD3FC-4A25-4AD5-A5C0-C388C36D0A63" + "criteria": "cpe:2.3:a:georgecurrums:open_guestbook:0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "412F81FE-221A-4B73-9DAB-6D38371190C0" } ] } @@ -71,28 +71,53 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/20796", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://securityreason.com/securityalert/1166", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.securityfocus.com/archive/1/438381/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/18666", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Broken Link", + "Exploit", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.vupen.com/english/advisories/2006/2545", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27397", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2006/CVE-2006-35xx/CVE-2006-3568.json b/CVE-2006/CVE-2006-35xx/CVE-2006-3568.json index 378550ded8c..29b203038f1 100644 --- a/CVE-2006/CVE-2006-35xx/CVE-2006-3568.json +++ b/CVE-2006/CVE-2006-35xx/CVE-2006-3568.json @@ -2,8 +2,8 @@ "id": "CVE-2006-3568", "sourceIdentifier": "cve@mitre.org", "published": "2006-07-13T01:05:00.000", - "lastModified": "2018-10-18T16:48:01.347", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:20:20.603", + "vulnStatus": "Analyzed", "evaluatorSolution": "This vulnerability may also affect versions of this product previous to Fantastic, Guestbook, 2.0.1.", "descriptions": [ { @@ -38,7 +38,7 @@ "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, - "userInteractionRequired": false + "userInteractionRequired": true } ] }, @@ -49,7 +49,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-79" } ] } @@ -63,8 +63,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:fantastic_scripts:fantastic_guestbook:2.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "8F77B8BD-1221-4AC2-B5D2-0894D7A3855A" + "criteria": "cpe:2.3:a:fantastic_guestbook_project:fantastic_guestbook:2.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "05926CD3-3E0A-410B-9A06-20C7521458D7" } ] } @@ -76,28 +76,60 @@ "url": "http://it.security.netsons.org/exploit/FGB.txt", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Vendor Advisory" ] }, + { + "url": "http://secunia.com/advisories/21024", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/27107", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://www.securityfocus.com/archive/1/440152/100/100/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/18942", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Broken Link", + "Exploit", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.vupen.com/english/advisories/2006/2762", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27697", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2006/CVE-2006-41xx/CVE-2006-4175.json b/CVE-2006/CVE-2006-41xx/CVE-2006-4175.json index ab8f44cfabd..6545e80793a 100644 --- a/CVE-2006/CVE-2006-41xx/CVE-2006-4175.json +++ b/CVE-2006/CVE-2006-41xx/CVE-2006-4175.json @@ -2,8 +2,8 @@ "id": "CVE-2006-4175", "sourceIdentifier": "cve@mitre.org", "published": "2007-03-26T23:19:00.000", - "lastModified": "2017-07-20T01:32:53.460", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:23:12.537", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-824" } ] } @@ -85,28 +85,64 @@ "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=491", "source": "cve@mitre.org", "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/24634", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102853-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.osvdb.org/33524", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/23117", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id?1017814", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.vupen.com/english/advisories/2007/1090", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33189", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2006/CVE-2006-61xx/CVE-2006-6143.json b/CVE-2006/CVE-2006-61xx/CVE-2006-6143.json index c4f5b0b34bb..9490e202672 100644 --- a/CVE-2006/CVE-2006-61xx/CVE-2006-6143.json +++ b/CVE-2006/CVE-2006-61xx/CVE-2006-6143.json @@ -2,8 +2,8 @@ "id": "CVE-2006-6143", "sourceIdentifier": "cve@mitre.org", "published": "2006-12-31T05:00:00.000", - "lastModified": "2020-01-21T15:45:35.710", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:26:18.233", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -55,7 +55,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-824" } ] } @@ -105,36 +105,142 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", + "matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*", + "matchCriteriaId": "23E304C9-F780-4358-A58D-1E4C93977704" + } + ] + } + ] } ], "references": [ { "url": "http://docs.info.apple.com/article.html?artnum=305391", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://fedoranews.org/cms/node/2375", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://fedoranews.org/cms/node/2376", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://osvdb.org/31281", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/23667", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/23696", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/23701", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/23706", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/23707", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/23772", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/23903", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/24966", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://security.gentoo.org/glsa/glsa-200701-21.xml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://securitytracker.com/id?1017493", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-002-rpc.txt", @@ -155,28 +261,48 @@ }, { "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:008", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/archive/1/456406/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/21970", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/usn-408-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.us-cert.gov/cas/techalerts/TA07-009B.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Third Party Advisory", "US Government Resource" @@ -186,24 +312,39 @@ "url": "http://www.us-cert.gov/cas/techalerts/TA07-109A.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.vupen.com/english/advisories/2007/0111", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2007/1470", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31422", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://issues.rpath.com/browse/RPL-925", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-06xx/CVE-2007-0681.json b/CVE-2007/CVE-2007-06xx/CVE-2007-0681.json index 555995130b6..7542c0cbf4c 100644 --- a/CVE-2007/CVE-2007-06xx/CVE-2007-0681.json +++ b/CVE-2007/CVE-2007-06xx/CVE-2007-0681.json @@ -2,8 +2,8 @@ "id": "CVE-2007-0681", "sourceIdentifier": "cve@mitre.org", "published": "2007-02-03T01:28:00.000", - "lastModified": "2017-10-19T01:30:03.300", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:13:40.213", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-522" } ] } @@ -62,9 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:extcalendar:extcalendar:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:extcalendar_project:extcalendar:*:*:*:*:*:*:*:*", "versionEndIncluding": "2", - "matchCriteriaId": "AA0297AD-BF2A-437E-A9EE-28B52666B48E" + "matchCriteriaId": "CB2BC2E7-1A6D-4FF5-ADA7-0E2AAD5C6A3E" } ] } @@ -72,13 +94,29 @@ } ], "references": [ + { + "url": "http://osvdb.org/38130", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32035", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.exploit-db.com/exploits/3239", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-12xx/CVE-2007-1213.json b/CVE-2007/CVE-2007-12xx/CVE-2007-1213.json index fc5bc5345b4..625088b2d40 100644 --- a/CVE-2007/CVE-2007-12xx/CVE-2007-1213.json +++ b/CVE-2007/CVE-2007-12xx/CVE-2007-1213.json @@ -2,8 +2,8 @@ "id": "CVE-2007-1213", "sourceIdentifier": "secure@microsoft.com", "published": "2007-04-04T16:19:00.000", - "lastModified": "2018-10-16T16:37:09.673", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:23:20.957", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-824" } ] } @@ -73,27 +73,52 @@ "references": [ { "url": "http://www.securityfocus.com/archive/1/466186/100/200/threaded", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/23276", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id?1017845", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.vupen.com/english/advisories/2007/1215", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-017", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1797", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-24xx/CVE-2007-2442.json b/CVE-2007/CVE-2007-24xx/CVE-2007-2442.json index 7120b629308..55683a0ed29 100644 --- a/CVE-2007/CVE-2007-24xx/CVE-2007-2442.json +++ b/CVE-2007/CVE-2007-24xx/CVE-2007-2442.json @@ -2,7 +2,7 @@ "id": "CVE-2007-2442", "sourceIdentifier": "cve@mitre.org", "published": "2007-06-26T22:30:00.000", - "lastModified": "2021-02-02T18:29:01.460", + "lastModified": "2024-02-09T03:23:38.943", "vulnStatus": "Analyzed", "descriptions": [ { @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-noinfo" + "value": "CWE-824" } ] } @@ -153,6 +153,141 @@ "Third Party Advisory" ] }, + { + "url": "http://osvdb.org/36596", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/25800", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/25801", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/25814", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/25821", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/25841", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/25870", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/25888", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/25890", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/25894", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/25911", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/26033", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/26228", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/26235", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/26909", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/27706", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/40346", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, { "url": "http://security.gentoo.org/glsa/glsa-200707-11.xml", "source": "cve@mitre.org", @@ -217,6 +352,7 @@ "url": "http://www.redhat.com/support/errata/RHSA-2007-0384.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -224,6 +360,7 @@ "url": "http://www.redhat.com/support/errata/RHSA-2007-0562.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -231,6 +368,7 @@ "url": "http://www.securityfocus.com/archive/1/472288/100/0/threaded", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -239,6 +377,7 @@ "url": "http://www.securityfocus.com/archive/1/472432/100/0/threaded", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -247,6 +386,7 @@ "url": "http://www.securityfocus.com/archive/1/472507/30/5970/threaded", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -255,6 +395,7 @@ "url": "http://www.securityfocus.com/bid/24655", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -263,6 +404,7 @@ "url": "http://www.securityfocus.com/bid/25159", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -271,6 +413,7 @@ "url": "http://www.securitytracker.com/id?1018293", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -293,6 +436,7 @@ "url": "http://www.us-cert.gov/cas/techalerts/TA07-177A.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Third Party Advisory", "US Government Resource" @@ -302,6 +446,7 @@ "url": "http://www.vupen.com/english/advisories/2007/2337", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -309,6 +454,7 @@ "url": "http://www.vupen.com/english/advisories/2007/2354", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -316,6 +462,7 @@ "url": "http://www.vupen.com/english/advisories/2007/2491", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -323,6 +470,7 @@ "url": "http://www.vupen.com/english/advisories/2007/2732", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -330,6 +478,7 @@ "url": "http://www.vupen.com/english/advisories/2007/3229", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -337,6 +486,7 @@ "url": "http://www.vupen.com/english/advisories/2010/1574", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory" ] }, diff --git a/CVE-2007/CVE-2007-40xx/CVE-2007-4000.json b/CVE-2007/CVE-2007-40xx/CVE-2007-4000.json index bfae6abade1..daa4a95d03e 100644 --- a/CVE-2007/CVE-2007-40xx/CVE-2007-4000.json +++ b/CVE-2007/CVE-2007-40xx/CVE-2007-4000.json @@ -2,8 +2,8 @@ "id": "CVE-2007-4000", "sourceIdentifier": "cve@mitre.org", "published": "2007-09-05T10:17:00.000", - "lastModified": "2020-01-21T15:45:47.303", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:24:08.707", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "CWE-264" + "value": "CWE-824" } ] } @@ -62,38 +62,25 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "4DD315AE-868B-4061-BF01-CDBF59B02499" - }, + "criteria": "cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.5", + "versionEndIncluding": "1.6.2", + "matchCriteriaId": "FA78988C-2288-47F6-9E90-9804CC38E3DB" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B639DD5F-71C7-4D9B-BA5C-51CAF64140B6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2B904DCE-D59F-45C7-A814-DE42CF02792D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "9957FE9E-1E89-4C27-852C-44F866A1834E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "2C382DAA-68D2-4DD9-BE29-8EEB0BAF1A7A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "73BB258E-51CF-4D12-836B-BCEA587A3F5F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F81DE01C-BA3B-40B4-BD85-17692F0AF8A8" + "criteria": "cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*", + "matchCriteriaId": "E3EFD171-01F7-450B-B6F3-0F7E443A2337" } ] } @@ -101,72 +88,166 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/26676", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/26680", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/26700", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/26728", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/26783", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/26987", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://securityreason.com/securityalert/3092", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2007-006.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.gentoo.org/security/en/glsa/glsa-200709-01.xml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.kb.cert.org/vuls/id/377544", "source": "cve@mitre.org", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:174", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.novell.com/linux/security/advisories/2007_19_sr.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2007-0858.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.securityfocus.com/archive/1/478794/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/25533", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id?1018647", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.vupen.com/english/advisories/2007/3051", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250976", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36438", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "VDB Entry" + ] }, { "url": "https://issues.rpath.com/browse/RPL-1696", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9278", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00087.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-41xx/CVE-2007-4150.json b/CVE-2007/CVE-2007-41xx/CVE-2007-4150.json index c855643f1dc..89f6915d98a 100644 --- a/CVE-2007/CVE-2007-41xx/CVE-2007-4150.json +++ b/CVE-2007/CVE-2007-41xx/CVE-2007-4150.json @@ -2,8 +2,8 @@ "id": "CVE-2007-4150", "sourceIdentifier": "cve@mitre.org", "published": "2007-08-03T20:17:00.000", - "lastModified": "2008-11-15T06:55:47.280", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:19:27.583", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,26 +15,48 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", - "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", - "confidentialityImpact": "COMPLETE", - "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.0 }, - "baseSeverity": "HIGH", + "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, - "impactScore": 10.0, + "impactScore": 2.9, "acInsufInfo": false, - "obtainAllPrivilege": true, + "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-327" } ] } @@ -71,16 +93,29 @@ } ], "references": [ + { + "url": "http://osvdb.org/46979", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://www.portcullis.co.uk/uplds/advisories/vapassword%20-%2006-042.txt", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/25153", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-45xx/CVE-2007-4580.json b/CVE-2007/CVE-2007-45xx/CVE-2007-4580.json index 68dfbee758f..89827b26c09 100644 --- a/CVE-2007/CVE-2007-45xx/CVE-2007-4580.json +++ b/CVE-2007/CVE-2007-45xx/CVE-2007-4580.json @@ -2,8 +2,8 @@ "id": "CVE-2007-4580", "sourceIdentifier": "cve@mitre.org", "published": "2007-08-28T18:17:00.000", - "lastModified": "2018-10-15T21:36:32.437", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:23:50.357", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-787" } ] } @@ -62,27 +62,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:trustware:bufferzone:*:*:*:*:*:*:*:*", - "versionEndIncluding": "2.1", - "matchCriteriaId": "1CA9B868-465B-4010-9B3C-BD0E0A306728" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trustware:bufferzone:*:*:enterprise:*:*:*:*:*", + "criteria": "cpe:2.3:a:bufferzonesecurity:bufferzone:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.1", "versionEndIncluding": "2.5", - "matchCriteriaId": "E0FD93D8-42E4-450F-BBC7-F8B14C86DC96" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trustware:bufferzone:*:*:free:*:*:*:*:*", - "versionEndIncluding": "2.5", - "matchCriteriaId": "2214235C-B284-4261-B03A-DEBADEACBA65" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trustware:bufferzone:*:*:pro:*:*:*:*:*", - "versionEndIncluding": "2.5", - "matchCriteriaId": "ECB29D57-6F8E-435A-978A-8724AEB5E803" + "matchCriteriaId": "751BA5D4-AE36-4AEC-A09F-A91003583DA1" } ] } @@ -90,17 +73,44 @@ } ], "references": [ + { + "url": "http://osvdb.org/39154", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/26608", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/3071", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.securityfocus.com/archive/1/477726/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36278", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-46xx/CVE-2007-4639.json b/CVE-2007/CVE-2007-46xx/CVE-2007-4639.json index 0350bbfbedc..0937666ab43 100644 --- a/CVE-2007/CVE-2007-46xx/CVE-2007-4639.json +++ b/CVE-2007/CVE-2007-46xx/CVE-2007-4639.json @@ -2,8 +2,8 @@ "id": "CVE-2007-4639", "sourceIdentifier": "cve@mitre.org", "published": "2007-08-31T23:17:00.000", - "lastModified": "2018-10-15T21:36:45.733", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:23:57.630", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "CWE-94" + "value": "CWE-824" } ] } @@ -62,8 +62,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:enterprisedb:enterprisedb_advanced_server:8.2:*:*:*:*:*:*:*", - "matchCriteriaId": "303CB449-2C68-4C66-986A-3A9A3BE3A32E" + "criteria": "cpe:2.3:a:enterprisedb:postgres_advanced_server:8.2:*:*:*:*:*:*:*", + "matchCriteriaId": "BC7D7162-696B-4867-80B0-C06A34DA4146" } ] } @@ -71,24 +71,47 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/26640", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://www.securityfocus.com/archive/1/478057/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/25481", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Broken Link", + "Exploit", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.vupen.com/english/advisories/2007/3040", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36328", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-46xx/CVE-2007-4682.json b/CVE-2007/CVE-2007-46xx/CVE-2007-4682.json index 81b675a871b..e76929339cc 100644 --- a/CVE-2007/CVE-2007-46xx/CVE-2007-4682.json +++ b/CVE-2007/CVE-2007-46xx/CVE-2007-4682.json @@ -2,8 +2,8 @@ "id": "CVE-2007-4682", "sourceIdentifier": "cve@mitre.org", "published": "2007-11-15T01:46:00.000", - "lastModified": "2017-07-29T01:33:06.363", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:24:53.567", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-824" } ] } @@ -62,63 +62,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*", - "matchCriteriaId": "0760FDDB-38D3-4263-9B4D-1AF5E613A4F9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6B8B16DB-4D1F-41B7-A7A2-2A443596E1AE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "AFD4DE58-46C7-4E69-BF36-C5FD768B8248" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "CF824694-52DE-44E3-ACAD-60B2A84CD3CE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B73A0891-A37A-4E0D-AA73-B18BFD6B1447" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "26AC38AB-D689-4B2B-9DAE-F03F4DFD15BE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "0C580935-0091-4163-B747-750FB7686973" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*", - "matchCriteriaId": "BB0F2132-8431-4CEF-9A3D-A69425E3834E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*", - "matchCriteriaId": "8719F3C4-F1DE-49B5-9301-22414A2B6F9C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*", - "matchCriteriaId": "09ED46A8-1739-411C-8807-2A416BDB6DFE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*", - "matchCriteriaId": "786BB737-EA99-4EC6-B742-0C35BF2453F9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*", - "matchCriteriaId": "8D089858-3AF9-4B82-912D-AA33F25E3715" + "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.4", + "versionEndIncluding": "10.4.10", + "matchCriteriaId": "2CE430AB-7B7B-44B9-9960-291A08CFC849" } ] } @@ -128,44 +75,75 @@ "references": [ { "url": "http://docs.info.apple.com/article.html?artnum=307041", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html", "source": "cve@mitre.org", "tags": [ + "Mailing List", "Patch" ] }, + { + "url": "http://secunia.com/advisories/27643", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, { "url": "http://securitytracker.com/id?1018950", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.kb.cert.org/vuls/id/498105", "source": "cve@mitre.org", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.securityfocus.com/bid/26444", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.us-cert.gov/cas/techalerts/TA07-319A.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.vupen.com/english/advisories/2007/3868", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38465", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-54xx/CVE-2007-5460.json b/CVE-2007/CVE-2007-54xx/CVE-2007-5460.json index 8b552ce1008..e811bf57eb2 100644 --- a/CVE-2007/CVE-2007-54xx/CVE-2007-5460.json +++ b/CVE-2007/CVE-2007-54xx/CVE-2007-5460.json @@ -2,8 +2,8 @@ "id": "CVE-2007-5460", "sourceIdentifier": "cve@mitre.org", "published": "2007-10-15T22:17:00.000", - "lastModified": "2018-10-15T21:44:57.297", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:07:07.377", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-310" + "value": "CWE-327" } ] } @@ -63,8 +85,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_mobile:5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "188596B9-7646-4841-B684-B224B48B3F15" + "criteria": "cpe:2.3:a:microsoft:activesync:4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A17BFED1-CAE1-4A94-AC66-1D41365E050B" } ] }, @@ -74,8 +96,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:activesync:4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A17BFED1-CAE1-4A94-AC66-1D41365E050B" + "criteria": "cpe:2.3:o:microsoft:windows_mobile:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "188596B9-7646-4841-B684-B224B48B3F15" } ] } @@ -83,24 +105,46 @@ } ], "references": [ + { + "url": "http://osvdb.org/38499", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://securityreason.com/securityalert/3232", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/archive/1/482299/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/25976", "source": "cve@mitre.org", "tags": [ - "Patch" + "Broken Link", + "Patch", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37223", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-57xx/CVE-2007-5756.json b/CVE-2007/CVE-2007-57xx/CVE-2007-5756.json index a29afe8ffd4..f1f17a8c272 100644 --- a/CVE-2007/CVE-2007-57xx/CVE-2007-5756.json +++ b/CVE-2007/CVE-2007-57xx/CVE-2007-5756.json @@ -2,8 +2,8 @@ "id": "CVE-2007-5756", "sourceIdentifier": "cve@mitre.org", "published": "2007-11-14T01:46:00.000", - "lastModified": "2017-07-29T01:33:50.850", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:13:48.570", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-129" } ] } @@ -62,8 +62,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:winpcap:winpcap:4.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "9DAF026E-5D07-4188-B081-A575A8F4CFE9" + "criteria": "cpe:2.3:a:winpcap:winpcap:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.0.2", + "matchCriteriaId": "4A6E528E-DE46-46F1-B8EA-0D885DA7D9E3" } ] } @@ -73,27 +74,59 @@ "references": [ { "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=625", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/27676", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Patch", + "Vendor Advisory" + ] }, { "url": "http://www.securityfocus.com/bid/26409", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id?1018935", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.vupen.com/english/advisories/2007/3835", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.winpcap.org/misc/changelog.htm", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38433", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-60xx/CVE-2007-6013.json b/CVE-2007/CVE-2007-60xx/CVE-2007-6013.json index 73fec215213..d8b003315c0 100644 --- a/CVE-2007/CVE-2007-60xx/CVE-2007-6013.json +++ b/CVE-2007/CVE-2007-60xx/CVE-2007-6013.json @@ -2,8 +2,8 @@ "id": "CVE-2007-6013", "sourceIdentifier": "cve@mitre.org", "published": "2007-11-19T21:46:00.000", - "lastModified": "2018-10-15T21:48:56.710", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:15:00.740", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-287" + "value": "CWE-327" } ] } @@ -62,138 +84,30 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "503E4894-3F39-471F-9A56-052718813BF9" + "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.5", + "versionEndIncluding": "2.3.1", + "matchCriteriaId": "B79A4099-2B16-42DF-977B-550F7E5C7C60" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*", + "matchCriteriaId": "E3EFD171-01F7-450B-B6F3-0F7E443A2337" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:1.5-strayhorn:*:*:*:*:*:*:*", - "matchCriteriaId": "B86BC4AC-62D0-47AA-8E81-50ED0B3CB88E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "38085E5A-7B41-4E43-8A22-5FD44970F3EA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "CF628FB8-1AC4-4F15-9967-E60785A32D1A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7F0BF1F6-A54A-48E8-A872-015FE10E5D03" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "4F0B6EAC-E43D-4D1B-856F-7C23250A2355" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "51FAD0FC-CE84-4332-B061-75C0C8A0B6AC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BDCFE9AA-39E9-4366-AAB7-F7A891BC797E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "BAF4671A-8449-438E-922B-94E5542137BC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "EECE66B3-3696-4E98-AF63-DF2FB256A6FB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "E75BB382-6B47-4C6A-BF94-80443BEB1A23" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "EFA75368-506F-4772-B0F2-8AAECDF288F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "FDDD9E5C-766F-4945-B87D-781E780AB03E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "A48C0BB5-2D87-49ED-A8EB-843E5F0EAE8E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "E6AAA17D-FBB8-4F54-82E2-870D6FA5C299" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*", - "matchCriteriaId": "B2A0CAEE-5C14-44C6-85FB-6AFDAAA1C3F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*", - "matchCriteriaId": "66BE667A-A937-4C38-B4D5-29B33F23F7B9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "8A3624D4-E666-4A1B-B465-714ACBA0034C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "7A7CBC45-320E-48CF-9A63-07DDE2FB61BE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "266E32CD-66FB-4E19-8091-EC748B177D8A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D3DD9120-2224-4612-A6EE-539F47BD50E0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "5A9FBA02-8A6A-471F-92CD-D8E77B5061C2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "1B5BC7E8-4C8A-4183-AB8C-1DAE12935387" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "A0F9137B-D13F-488B-8196-85E06FAB682E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "82F257F4-CB62-4C6F-8866-AA253EC8C0C3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "79AB6F6F-2FE3-4FC3-9009-D40EA852711F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A82F4D88-779D-4D5D-96CD-2B31B61BA29E" + "criteria": "cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*", + "matchCriteriaId": "72E4DB7F-07C3-46BB-AAA2-05CD0312C57F" } ] } @@ -203,46 +117,103 @@ "references": [ { "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/058576.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://osvdb.org/40801", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/27714", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/28310", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] }, { "url": "http://securityreason.com/securityalert/3375", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://trac.wordpress.org/ticket/5367", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "http://www.cl.cam.ac.uk/~sjm217/advisories/wordpress-cookie-auth.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.securityfocus.com/archive/1/483927/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id?1018980", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.vupen.com/english/advisories/2007/3941", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38578", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00079.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00098.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-01xx/CVE-2008-0141.json b/CVE-2008/CVE-2008-01xx/CVE-2008-0141.json index 7ce45b69e0f..42cc82b90dc 100644 --- a/CVE-2008/CVE-2008-01xx/CVE-2008-0141.json +++ b/CVE-2008/CVE-2008-01xx/CVE-2008-0141.json @@ -2,8 +2,8 @@ "id": "CVE-2008-0141", "sourceIdentifier": "cve@mitre.org", "published": "2008-01-08T19:46:00.000", - "lastModified": "2017-09-29T01:30:09.097", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:04:22.147", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-255" + "value": "CWE-330" } ] } @@ -62,8 +84,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:webportal:webportal_cms:0.6_beta:*:*:*:*:*:*:*", - "matchCriteriaId": "56776AA3-3EAD-479E-9E45-3AEF312868BB" + "criteria": "cpe:2.3:a:webportal_cms_project:webportal_cms:0.6.0:beta:*:*:*:*:*:*", + "matchCriteriaId": "12F7AE7C-07C0-4817-93FA-73F4B169E4F7" } ] } @@ -75,16 +97,27 @@ "url": "http://www.securityfocus.com/bid/27145", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Broken Link", + "Exploit", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39486", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "VDB Entry" + ] }, { "url": "https://www.exploit-db.com/exploits/4835", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-31xx/CVE-2008-3188.json b/CVE-2008/CVE-2008-31xx/CVE-2008-3188.json index 4641d1ab7d9..ce338026fe3 100644 --- a/CVE-2008/CVE-2008-31xx/CVE-2008-3188.json +++ b/CVE-2008/CVE-2008-31xx/CVE-2008-3188.json @@ -2,7 +2,7 @@ "id": "CVE-2008-3188", "sourceIdentifier": "cve@mitre.org", "published": "2008-07-22T16:41:00.000", - "lastModified": "2021-03-30T14:07:47.277", + "lastModified": "2024-02-09T03:19:49.357", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-326" + "value": "CWE-327" } ] } @@ -87,10 +109,27 @@ "Vendor Advisory" ] }, + { + "url": "http://secunia.com/advisories/31096", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/31339", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, { "url": "http://www.securityfocus.com/bid/30301", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] diff --git a/CVE-2008/CVE-2008-37xx/CVE-2008-3775.json b/CVE-2008/CVE-2008-37xx/CVE-2008-3775.json index c2efdb9acd5..94a1c3809be 100644 --- a/CVE-2008/CVE-2008-37xx/CVE-2008-3775.json +++ b/CVE-2008/CVE-2008-37xx/CVE-2008-3775.json @@ -2,8 +2,8 @@ "id": "CVE-2008-3775", "sourceIdentifier": "cve@mitre.org", "published": "2008-08-22T16:41:00.000", - "lastModified": "2018-10-11T20:49:45.260", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:10:19.803", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-310" + "value": "CWE-327" } ] } @@ -62,55 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:folder_lock:folder_lock:*:*:*:*:*:*:*:*", - "versionEndIncluding": "5.9.2", - "matchCriteriaId": "F19203E4-95F9-4942-872F-B8A3AE6E8618" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:folder_lock:folder_lock:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:newsoftwares:folder_lock:*:*:*:*:*:*:*:*", "versionEndIncluding": "5.9.5", - "matchCriteriaId": "4A40DFC4-80A1-4082-9B9D-FC2B661CBFAD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:folder_lock:folder_lock:5.5.7:*:*:*:*:*:*:*", - "matchCriteriaId": "1CB6533F-61D5-453A-8A12-B08B6308B526" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:folder_lock:folder_lock:5.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "923A1C0A-0FC1-4A26-BF22-7BE4BBDD9785" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:folder_lock:folder_lock:5.7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "05CBF4B7-914C-48E6-9182-C52B5426F8C0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:folder_lock:folder_lock:5.7.2:*:*:*:*:*:*:*", - "matchCriteriaId": "5D4A19A7-76D6-44C0-9DAA-57354F883E5C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:folder_lock:folder_lock:5.7.3:*:*:*:*:*:*:*", - "matchCriteriaId": "010C0434-A40D-4ABA-B105-58820231C275" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:folder_lock:folder_lock:5.7.5:*:*:*:*:*:*:*", - "matchCriteriaId": "2277377E-4086-421E-9E36-E930F7BC8654" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:folder_lock:folder_lock:5.8.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F3CAB0D5-0454-443B-A059-3894ABB20217" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:folder_lock:folder_lock:5.9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5D1FDC1C-9936-4485-95B4-9398C036FB3F" + "matchCriteriaId": "0EDC1BF9-973E-498F-8D00-016A851C3A1B" } ] } @@ -118,21 +94,46 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/31559", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/4183", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/archive/1/495612/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/30771", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44575", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-49xx/CVE-2008-4905.json b/CVE-2008/CVE-2008-49xx/CVE-2008-4905.json index 9c7ff751555..b96c6380831 100644 --- a/CVE-2008/CVE-2008-49xx/CVE-2008-4905.json +++ b/CVE-2008/CVE-2008-49xx/CVE-2008-4905.json @@ -2,8 +2,8 @@ "id": "CVE-2008-4905", "sourceIdentifier": "cve@mitre.org", "published": "2008-11-04T00:58:40.227", - "lastModified": "2009-01-29T06:57:42.530", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:05:09.550", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-310" + "value": "CWE-330" } ] } @@ -65,156 +87,6 @@ "criteria": "cpe:2.3:a:typosphere:typo:*:*:*:*:*:*:*:*", "versionEndIncluding": "5.1.3", "matchCriteriaId": "1E3019EC-DA80-4761-B832-964F6EF93A65" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "8AB16906-D886-490E-B677-96E498869033" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:1.6.8:*:*:*:*:*:*:*", - "matchCriteriaId": "AA278206-6FE9-47B0-A2C5-29DB5FBA209D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:2.0.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B47D305A-E52B-487C-A224-A877B88153F7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:2.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4CF012B6-1435-4030-AD9A-62DB01DE0662" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:2.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "11CBA97F-C726-4C89-8669-3B54A20910B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:2.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "CF0A64C3-BE11-4876-9080-9F48BE9FB1D6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:2.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "36A454B2-25F5-4D11-BB6F-8E3B59FFB0FF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:2.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DAD9ECE7-068C-45A7-9E84-5F39C16EC163" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:2.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "FCF5981C-6983-46E3-92E5-8AD5732CAF5A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:2.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "829B4A24-B296-4998-9660-DFCCC84B5737" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:2.5.4:*:*:*:*:*:*:*", - "matchCriteriaId": "55B3F7BE-6A7F-4DF6-A8A5-255C80AC5394" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:2.5.5:*:*:*:*:*:*:*", - "matchCriteriaId": "2CACF067-89CB-4E95-9765-F440065DDDE4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:2.5.6:*:*:*:*:*:*:*", - "matchCriteriaId": "57BB7A8C-1F33-488A-AF97-422105AB1CF7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:2.5.7:*:*:*:*:*:*:*", - "matchCriteriaId": "C43C4381-76D1-4E4D-929D-57CF7985268E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:2.5.8:*:*:*:*:*:*:*", - "matchCriteriaId": "B2169F77-8CDF-494F-8A5B-FBFA423F508A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:2.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "F311CEC8-F619-4F79-A434-6BCB8505F1F3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:3.99.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A9C58BA0-8E59-43BF-9558-E050C29AF181" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:3.99.1:*:*:*:*:*:*:*", - "matchCriteriaId": "10174180-CBD7-4481-A067-EB3CEA93A362" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:3.99.2:*:*:*:*:*:*:*", - "matchCriteriaId": "96B6FF23-B700-4B0D-8FA5-1CDED4E9A54F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:3.99.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E2A09B06-DF95-4112-9FC8-847BDBCAEBFD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:3.99.4:*:*:*:*:*:*:*", - "matchCriteriaId": "DF324FFC-353B-47C2-809E-1AF1003DBD6B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:4.0.0:*:*:*:*:*:*:*", - "matchCriteriaId": "634E850B-5C36-497C-9175-FBA1F5FF4C1A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:4.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "7A845374-834E-4696-A9C2-A32C83044CBF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:5.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "37FBAA0E-8E1D-4E8B-A08D-AA477FEDA85D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:5.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "9D419017-2B6C-4DF9-8B98-F74840721BED" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:5.0.3.98:*:*:*:*:*:*:*", - "matchCriteriaId": "028B2D4F-8BB6-4DB9-A1A3-3BB88407639E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:5.0.3.98.1:*:*:*:*:*:*:*", - "matchCriteriaId": "7FD1F53D-1911-445A-8230-748F2DD20621" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "CF128B29-BFF1-4E99-A1B4-999C14FDB3AE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:5.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4225B42A-48BF-4AD3-ACB7-4806EA785B1E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typosphere:typo:5.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "447033D5-7C0E-4184-AF79-E1CB31BD6AE2" } ] } @@ -222,13 +94,29 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/32272", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/4550", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/archive/1/497970", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-49xx/CVE-2008-4989.json b/CVE-2008/CVE-2008-49xx/CVE-2008-4989.json index 4e51e86e87e..aca248bb664 100644 --- a/CVE-2008/CVE-2008-49xx/CVE-2008-4989.json +++ b/CVE-2008/CVE-2008-49xx/CVE-2008-4989.json @@ -2,8 +2,8 @@ "id": "CVE-2008-4989", "sourceIdentifier": "cve@mitre.org", "published": "2008-11-13T01:00:01.177", - "lastModified": "2018-10-11T20:53:12.343", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:19:21.940", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-255" + "value": "CWE-295" } ] } @@ -63,563 +85,110 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*", - "versionEndIncluding": "2.6.0", - "matchCriteriaId": "97B544BC-DED8-4D05-8B9E-E692EF53AE9C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.0.16:*:*:*:*:*:*:*", - "matchCriteriaId": "4FBB8F2C-498D-4D31-A7D7-9991BABEA7A6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.0.17:*:*:*:*:*:*:*", - "matchCriteriaId": "8856E1B1-8007-42E5-82EF-4700D4DEEDDA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.0.18:*:*:*:*:*:*:*", - "matchCriteriaId": "A9CF40D3-CE03-4C2A-8EEF-EB5989291806" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.0.19:*:*:*:*:*:*:*", - "matchCriteriaId": "EC60D4CC-922C-4941-A400-0CBEAC7F31D1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.0.20:*:*:*:*:*:*:*", - "matchCriteriaId": "754A0D19-A17A-4007-8355-497D14CFCBF9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.0.21:*:*:*:*:*:*:*", - "matchCriteriaId": "8140DBE1-8116-4051-9A57-07535586E0AF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.0.22:*:*:*:*:*:*:*", - "matchCriteriaId": "56D2DF7F-DCDD-486D-B906-F9DDE3A1DB70" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.0.23:*:*:*:*:*:*:*", - "matchCriteriaId": "F1CC840D-AD01-4EE2-8652-06742A6286BA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.0.24:*:*:*:*:*:*:*", - "matchCriteriaId": "84224A82-6D58-4000-A449-20C1632DAE85" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.0.25:*:*:*:*:*:*:*", - "matchCriteriaId": "A466931C-769A-4A28-B072-10930CE655E6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.1.13:*:*:*:*:*:*:*", - "matchCriteriaId": "2FEE50AC-8730-4F04-B57C-6BDF8B957F6D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.1.14:*:*:*:*:*:*:*", - "matchCriteriaId": "10F621DC-7967-4D97-A562-02E7033C89C2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.1.15:*:*:*:*:*:*:*", - "matchCriteriaId": "776E5481-399F-45BC-AD20-A18508B03916" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.1.16:*:*:*:*:*:*:*", - "matchCriteriaId": "63D7F972-9128-4A4D-8508-B38CE2F155E9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.1.17:*:*:*:*:*:*:*", - "matchCriteriaId": "C5D56873-E8C5-4E4B-BB85-6DCF6526B453" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.1.18:*:*:*:*:*:*:*", - "matchCriteriaId": "54FE4766-32D0-491E-8C71-5B998C468142" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.1.19:*:*:*:*:*:*:*", - "matchCriteriaId": "7F980857-2364-466A-8366-BD017D242222" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.1.20:*:*:*:*:*:*:*", - "matchCriteriaId": "4CDCF1F0-5A78-48FF-B4B0-303AE2420F6A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.1.21:*:*:*:*:*:*:*", - "matchCriteriaId": "0A2E649D-5C45-4412-927B-E3EDCE07587C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.1.22:*:*:*:*:*:*:*", - "matchCriteriaId": "066175C2-6E96-4BAE-B1A6-B23D25547FAC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.1.23:*:*:*:*:*:*:*", - "matchCriteriaId": "869D3010-67AE-44D0-BB8F-D9C410AEA1D8" - }, + "versionEndExcluding": "2.6.1", + "matchCriteriaId": "5CA85285-1376-4569-8EC1-66E1625E258D" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "052B40C1-C29B-4189-9A45-DAE873AB716D" + "criteria": "cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*", + "matchCriteriaId": "72E4DB7F-07C3-46BB-AAA2-05CD0312C57F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "02F71E61-7455-4E10-B9D8-2B7FDDFB10F6" - }, + "criteria": "cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*", + "matchCriteriaId": "743CBBB1-C140-4FEF-B40E-FAE4511B1140" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "5E05A9A1-6B7A-43FB-A9B8-41B68CA5FDCD" + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", + "matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "1FB08FD9-9AB8-4015-A8BE-FD9F7EBAC6DA" + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", + "matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "B588AAE0-8C3F-47C7-812F-8C97BD8795E5" + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", + "matchCriteriaId": "7EBFE35C-E243-43D1-883D-4398D71763CC" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "EBB9154B-4254-4F33-8DB2-5B96E2DA4931" - }, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", + "matchCriteriaId": "4747CC68-FAF4-482F-929A-9DA6C24CB663" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.2.6:*:*:*:*:*:*:*", - "matchCriteriaId": "64D9C191-6A57-40BB-BDD1-6B1A6BBAB51E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.2.7:*:*:*:*:*:*:*", - "matchCriteriaId": "A2EA79D1-2EA8-4040-A5B5-C93EE937945A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.2.8:*:*:*:*:*:*:*", - "matchCriteriaId": "61D05BC3-1315-4AC7-884D-41459272C94B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.2.8.1a1:*:*:*:*:*:*:*", - "matchCriteriaId": "2901E522-6F54-4FA5-BF22-463A9D6B53D8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.2.9:*:*:*:*:*:*:*", - "matchCriteriaId": "738F29DA-9741-4BA5-B370-417443A3AC2E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.2.10:*:*:*:*:*:*:*", - "matchCriteriaId": "52173492-1031-4AA4-A600-6210581059D3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.2.11:*:*:*:*:*:*:*", - "matchCriteriaId": "BB636C36-2884-4F66-B68A-4494AEAF90C3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "777A16E4-A1F5-48DC-9BF0-CD9F0DCF8B55" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EC4231BD-201D-4B10-9E35-B9EEFC714F6A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "4C9200C3-0F46-4238-918B-38D95BF11547" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "024A9511-7CB4-4681-8429-0FE7FC34DF1A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "34CEF5ED-87A5-44B2-8A4A-9896957C057B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.3.5:*:*:*:*:*:*:*", - "matchCriteriaId": "1B84A4F5-CED7-4633-913F-BE8235F68616" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97564ABD-F9CE-4B3C-978A-1622DE3E4924" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3DB6EC88-DCE0-439B-89CD-18229965849B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1E2C89DD-CDBD-4772-A031-089F32006D80" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "8C2FD618-91F4-48E7-B945-90CC0A367DE6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "65DC9555-E76F-4F8D-AE39-5160B34A87FF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "8B61D180-9EEA-4258-9A59-7F004F2C83F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "00DE1208-BDDC-405B-A34A-B58D00A279DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B8EF689E-59AA-4619-ADB2-E195CFD4094A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B62AB660-5DA4-4F13-AF9E-DC53D0A18EED" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "22314ED6-D0CD-442E-A645-A9CCFE114AE1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.5.4:*:*:*:*:*:*:*", - "matchCriteriaId": "A9E1C5B2-27BF-4328-9336-98B8828EE4BE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.5.5:*:*:*:*:*:*:*", - "matchCriteriaId": "B5C952BF-A135-4B15-8A51-94D66B618469" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6ADED309-0A25-478D-B542-96217A0DD63E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DC0403DE-76B1-4E24-8014-64F73DCB53DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "69EA91B0-249F-41B2-8AD0-0C2AD29BE3D6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "7F714D22-873A-4D64-8151-86BB55EFD084" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4E9181F9-50FF-4995-9554-022CF93376C2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "AED0B40F-3413-40D6-B1EF-E6354D2A91F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.2:*:*:*:*:*:*:*", - "matchCriteriaId": "4E99A7D8-2303-4268-8EF8-6F01A042BEDE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.3:*:*:*:*:*:*:*", - "matchCriteriaId": "86C70F69-FB80-4F32-A798-71A5153E6C29" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.4:*:*:*:*:*:*:*", - "matchCriteriaId": "B2A1E604-500E-4181-BF66-BB69C7C3F425" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.5:*:*:*:*:*:*:*", - "matchCriteriaId": "0C8120E3-B60F-44E4-B837-4707A9BAEDBE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.6:*:*:*:*:*:*:*", - "matchCriteriaId": "84D3F16F-2C23-48E9-9F2D-1F1DF74719E5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.7:*:*:*:*:*:*:*", - "matchCriteriaId": "F7073EAD-06C9-4309-B479-135021E82B99" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.8:*:*:*:*:*:*:*", - "matchCriteriaId": "546C56AC-AFCC-47B7-A5A8-D3E3199BEA41" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.9:*:*:*:*:*:*:*", - "matchCriteriaId": "1895868E-E501-42C2-8450-EEED4447BAB3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.10:*:*:*:*:*:*:*", - "matchCriteriaId": "2ED1FCE0-260B-4FB2-9DBD-F4D0D35639AC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.11:*:*:*:*:*:*:*", - "matchCriteriaId": "199AA36A-3B23-438C-9109-CC9000372986" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.12:*:*:*:*:*:*:*", - "matchCriteriaId": "DD6FFF05-37B2-4D69-86AF-921591382D21" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.13:*:*:*:*:*:*:*", - "matchCriteriaId": "82BF8600-4E5D-4FF4-953C-F2DC726CA6CA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.14:*:*:*:*:*:*:*", - "matchCriteriaId": "04C40F0E-B102-4FE8-9E93-0ACFBF35226D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.15:*:*:*:*:*:*:*", - "matchCriteriaId": "22802660-D33F-4683-B82F-C94AC6170A73" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.16:*:*:*:*:*:*:*", - "matchCriteriaId": "3623E9BE-F513-4301-BF0C-6A7F87E78E7A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.17:*:*:*:*:*:*:*", - "matchCriteriaId": "B5DBAF08-1441-4F14-A740-E90044B77042" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.18:*:*:*:*:*:*:*", - "matchCriteriaId": "4CE9BB7E-DDD8-4CBF-AEC2-40D59A560BD2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.19:*:*:*:*:*:*:*", - "matchCriteriaId": "5D3B6684-3890-4B60-BE67-D06045A86B3B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.0.0:*:*:*:*:*:*:*", - "matchCriteriaId": "81C6C982-21D5-4FE3-A342-FC45BD78D2F1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A69E3A01-D8C6-4C36-8C4E-52B96541D5B8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F9D61596-01EB-4936-923B-63537625F926" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "599EB59C-7717-47A8-84C6-78B6D79AEB02" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "4A6CBB77-818D-4DFF-9DD9-07EBF9933B06" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "26E9005E-5034-43F2-B96E-7829E19FE3A8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "6FA854EA-29FE-4B91-AEA3-ED649D7FD25A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "4DC3A5EE-2892-4548-A0CB-D3289CD64D63" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "83F22BF4-A738-438B-8D0B-6993640F0D31" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "9D3193B7-8FB9-45E4-BFF6-891A3F14F021" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "5AF269AE-121B-4982-A765-5C7E806FA9FD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "A1C9F604-7FBE-4759-B039-8F5894574203" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.1.7:*:*:*:*:*:*:*", - "matchCriteriaId": "191821CD-E4CB-4269-B04C-284A9F9783B0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.1.8:*:*:*:*:*:*:*", - "matchCriteriaId": "B2A71474-958D-4689-A652-3E2A731F47FF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "38169043-17DF-4CF9-963A-8770B8882357" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "0D7E5D9C-0976-4C9A-9FEB-AB923845BAD6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "C4537676-A72E-4433-B44F-3664EDD6F240" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D7CCCB66-C7CC-4E5C-8253-C29D57BE9B43" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "8D090B10-68F2-424D-8234-2A280AA96B59" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "23168B77-645D-4A2A-A6E3-7001104064A4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4D085B16-3116-423F-BDE0-2D93E12650A8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "C59247E9-CDAE-4269-A8E4-F49F617CDD23" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "A6019C0C-E9DD-4831-8E6A-785AE1A930FD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "16F9CF15-8789-49B6-BB6D-B784C8FF20ED" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "A6DAE798-14C9-4CB6-A39F-69CDF9D8FBB0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.3.5:*:*:*:*:*:*:*", - "matchCriteriaId": "C51E0C88-B19C-408D-AC17-10CE7462D48A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.3.6:*:*:*:*:*:*:*", - "matchCriteriaId": "7A7FBFAA-263C-4B7B-A135-9824DFD8CCDA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.3.7:*:*:*:*:*:*:*", - "matchCriteriaId": "2AC41482-B3BC-4C93-A850-73A179BAB763" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.3.8:*:*:*:*:*:*:*", - "matchCriteriaId": "ADC80BE1-28A6-4348-A061-8FD9C805E945" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.3.9:*:*:*:*:*:*:*", - "matchCriteriaId": "9D8EF703-AE06-4DD7-9235-2D8CCDB24F96" - }, + "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.3.10:*:*:*:*:*:*:*", - "matchCriteriaId": "9A8AC314-065B-4BC3-A5EE-CA6D3006F9F5" + "criteria": "cpe:2.3:o:opensuse:opensuse:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.3", + "versionEndIncluding": "11.1", + "matchCriteriaId": "FF141FBE-4CA5-4695-94A0-8BE1309D28CC" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.3.11:*:*:*:*:*:*:*", - "matchCriteriaId": "D8201FF6-53A8-4850-A2B2-47AA65B2CB75" + "criteria": "cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*", + "matchCriteriaId": "AED08A6F-CD23-4405-B1CF-C96BB8AE7D6B" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "AFB33002-E5C6-4573-BC94-647DDE4E6F89" + "criteria": "cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "1608E282-2E96-4447-848D-DBE915DB0EF9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "8D7D245A-D983-40AD-89A7-0EA00D38D570" + "criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:-:*:*:*:*:*:*", + "matchCriteriaId": "38C3AEB0-59E2-400A-8943-60C0A223B680" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "A7223691-225D-4649-B410-F41D2C489BA5" + "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*", + "matchCriteriaId": "F13F07CC-739B-465C-9184-0E9D708BD4C7" } ] } @@ -631,99 +200,221 @@ "url": "http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3215", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch" ] }, { "url": "http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3217", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://secunia.com/advisories/32619", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/32681", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/32687", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/32879", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/33501", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/33694", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/35423", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://security.gentoo.org/glsa/glsa-200901-10.xml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-260528-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0322", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.debian.org/security/2009/dsa-1719", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.gnu.org/software/gnutls/security.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:227", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2008-0982.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/archive/1/498431/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/32232", "source": "cve@mitre.org", "tags": [ - "Patch" + "Broken Link", + "Patch", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.securitytracker.com/id?1021167", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/usn-678-2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.vupen.com/english/advisories/2008/3086", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2009/1567", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46482", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://issues.rpath.com/browse/RPL-2886", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11650", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://usn.ubuntu.com/678-1/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00222.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00293.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-00xx/CVE-2009-0040.json b/CVE-2009/CVE-2009-00xx/CVE-2009-0040.json index 881f63b9ce3..6165e1ec181 100644 --- a/CVE-2009/CVE-2009-00xx/CVE-2009-0040.json +++ b/CVE-2009/CVE-2009-00xx/CVE-2009-0040.json @@ -2,8 +2,8 @@ "id": "CVE-2009-0040", "sourceIdentifier": "secalert@redhat.com", "published": "2009-02-22T22:30:00.203", - "lastModified": "2018-10-11T20:59:20.370", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:25:43.877", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "CWE-94" + "value": "CWE-824" } ] } @@ -63,1668 +63,122 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*", - "versionEndIncluding": "1.0.42", - "matchCriteriaId": "DE5B4969-D887-4F0B-B80B-53A4E242E947" + "versionEndExcluding": "1.0.43", + "matchCriteriaId": "AC1A6D90-D8E8-4F56-BA83-47E9E5B46549" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:0.89c:*:*:*:*:*:*:*", - "matchCriteriaId": "9427E9C7-0B51-4066-9428-BE48D8BAD65E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:0.95:*:*:*:*:*:*:*", - "matchCriteriaId": "DE45B563-07B8-4F4E-80B4-C73216DF7295" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6D6B3DAF-DF99-48B2-8E7C-BE8E043D4C24" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "29050958-EFD8-4A79-9022-EF72AAD4EDB3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B3CB33B1-71B2-4235-A2C1-FCAEA9844A6A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "436F8C71-1780-4DC6-937B-8F1F51C7453D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "0BF2C6F3-BFE7-4234-9975-DE7FCDA26A46" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "5B79DC5F-5062-4031-BA11-746EE3C8E1CE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.6:a:*:*:*:*:*:*", - "matchCriteriaId": "4CF9C3AB-DE2A-485E-A7C6-442B239447B5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.6:d:*:*:*:*:*:*", - "matchCriteriaId": "A8F3EAC4-FB4B-429B-8C9E-EA19C970B712" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.6:e:*:*:*:*:*:*", - "matchCriteriaId": "01B1755E-1F7A-4E8D-9726-63DC4FC4029A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.6:f:*:*:*:*:*:*", - "matchCriteriaId": "E4648C1A-13C1-4082-AFC1-EE9B7EBC401C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.6:g:*:*:*:*:*:*", - "matchCriteriaId": "EF340285-5195-445C-ADB2-F1EF2FF901CC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.6:h:*:*:*:*:*:*", - "matchCriteriaId": "B64DD9BF-26E3-4BEE-BFE0-FFD523600CC1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.6:i:*:*:*:*:*:*", - "matchCriteriaId": "7F0C5F5B-96E1-41F5-A233-487A929B2590" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.6:j:*:*:*:*:*:*", - "matchCriteriaId": "5A0CCEEC-A625-4BF8-8696-BF6260AD8445" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "CAD6DE25-8B2F-4DB9-9969-8AAC23BC0AE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.7:beta11:*:*:*:*:*:*", - "matchCriteriaId": "B2DF0E03-3EC6-400A-9AF6-B653053C17D5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.7:beta12:*:*:*:*:*:*", - "matchCriteriaId": "5216F808-88C7-4E1A-9FCE-C8DE5680AAB1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.7:beta13:*:*:*:*:*:*", - "matchCriteriaId": "52C6D2E3-1617-4530-845D-40188526D238" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.7:beta14:*:*:*:*:*:*", - "matchCriteriaId": "6E17E296-E69C-48C7-9B7F-FC85BCB7FF9B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.7:beta15:*:*:*:*:*:*", - "matchCriteriaId": "36F3EFF1-08E9-42C0-ACC9-55A22BDEE978" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.7:beta16:*:*:*:*:*:*", - "matchCriteriaId": "E9D10792-38F4-488F-9E08-15FF15A9A3BD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.7:beta17:*:*:*:*:*:*", - "matchCriteriaId": "AA9ED9B2-D9D4-4200-B387-21A893453E76" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.7:beta18:*:*:*:*:*:*", - "matchCriteriaId": "3983C9FC-7546-41BE-8E22-B3471DF9F3AD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.7:rc1:*:*:*:*:*:*", - "matchCriteriaId": "BFAB3DFB-58B7-4713-B88B-26424D639B02" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.7:rc2:*:*:*:*:*:*", - "matchCriteriaId": "2131F2BB-80E3-46A0-A0D8-4450C625A525" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "35F2B503-1516-465D-A558-9932BDB3457D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.8:beta1:*:*:*:*:*:*", - "matchCriteriaId": "C686308E-1A71-40E5-BCDE-5144217D41A9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.8:beta2:*:*:*:*:*:*", - "matchCriteriaId": "D1F37F93-8BE1-4716-B35D-1CB2629867A3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.8:beta3:*:*:*:*:*:*", - "matchCriteriaId": "AF4127BB-2A91-4243-B3ED-10D945B6995A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.8:beta4:*:*:*:*:*:*", - "matchCriteriaId": "E09AAB1F-14FB-42E9-8983-30D2164EA0E8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.8:rc1:*:*:*:*:*:*", - "matchCriteriaId": "50190A04-5CF2-400E-BAE4-9C7F177ECFE9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "BA94EAAA-A4D2-4E36-BC69-BBE9644FE970" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.9:beta1:*:*:*:*:*:*", - "matchCriteriaId": "AFB264E6-1640-459C-8DD0-C9D72124F125" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.9:beta10:*:*:*:*:*:*", - "matchCriteriaId": "2A6E3454-14E2-43C8-8E71-1E800FCBE9D0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.9:beta2:*:*:*:*:*:*", - "matchCriteriaId": "BA610E96-CE50-46B0-B695-F4A5FA77AB73" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.9:beta3:*:*:*:*:*:*", - "matchCriteriaId": "30459EAB-E65B-4487-A90F-389477F0BA56" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.9:beta4:*:*:*:*:*:*", - "matchCriteriaId": "E89FFA90-6AB5-4587-8F40-E7001E4DD470" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.9:beta5:*:*:*:*:*:*", - "matchCriteriaId": "A2FDACC8-7BFD-477E-A79A-C933CB5C8EFD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.9:beta6:*:*:*:*:*:*", - "matchCriteriaId": "9139F742-A946-4D2F-9C14-95216C06ED4B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.9:beta7:*:*:*:*:*:*", - "matchCriteriaId": "0DBCDA70-BB1B-4408-A2F3-ADB7A7B77A25" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.9:beta8:*:*:*:*:*:*", - "matchCriteriaId": "AA4D368C-C167-4CF3-9013-FFC297D1D977" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.9:beta9:*:*:*:*:*:*", - "matchCriteriaId": "D3571DD2-5200-48AE-83C9-B1DFF3A1FEAC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.9:rc1:*:*:*:*:*:*", - "matchCriteriaId": "782DFA55-BB92-41CD-A4DF-D986C387EB8F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.9:rc2:*:*:*:*:*:*", - "matchCriteriaId": "2601CCF9-3A89-4EEF-9941-894AEAF89F23" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.10:*:*:*:*:*:*:*", - "matchCriteriaId": "F3A7C96C-8FBB-42B4-937E-3321C939CC87" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.10:beta1:*:*:*:*:*:*", - "matchCriteriaId": "BFE11FC5-8A49-434E-B828-AE7C011B03CC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.10:rc1:*:*:*:*:*:*", - "matchCriteriaId": "265EC12C-6239-4367-9769-73AC999556F8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.11:*:*:*:*:*:*:*", - "matchCriteriaId": "94084356-D39B-41B2-AC24-0ADAD0BF5988" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.11:beta1:*:*:*:*:*:*", - "matchCriteriaId": "6DA772E3-B022-4F5E-8D43-C0BE64F187D2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.11:beta2:*:*:*:*:*:*", - "matchCriteriaId": "C6589696-904B-4F7B-84F7-0E8D2F0ACFA7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.11:beta3:*:*:*:*:*:*", - "matchCriteriaId": "F5CF8EED-F09B-4AB8-A0F1-1F8DBB5385BE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.11:rc1:*:*:*:*:*:*", - "matchCriteriaId": "C3909436-175A-4DC7-956F-C0905DA579FA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.12:*:*:*:*:*:*:*", - "matchCriteriaId": "086C6335-7872-46A7-AEB1-9BE5AE5A788C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.12:beta1:*:*:*:*:*:*", - "matchCriteriaId": "CB0532A8-3F66-49D3-95BF-2E78DB6EC471" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.12:rc1:*:*:*:*:*:*", - "matchCriteriaId": "FED11C9F-4E2D-4364-AEEC-43E61531BA9B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.13:*:*:*:*:*:*:*", - "matchCriteriaId": "FF8233B1-04A0-4E25-97EE-CF466B48A12E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.14:*:*:*:*:*:*:*", - "matchCriteriaId": "FA714E7E-05EF-4598-9324-887BC66C675E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.15:*:*:*:*:*:*:*", - "matchCriteriaId": "C5CF3B73-D3B9-4D76-B411-C837BCE0806E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.15:rc1:*:*:*:*:*:*", - "matchCriteriaId": "CEC7C52B-0D8D-4509-B9B5-B12E54EA3A76" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.15:rc2:*:*:*:*:*:*", - "matchCriteriaId": "AB0514ED-C8F8-4F15-A40F-04D643F3DB60" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.15:rc3:*:*:*:*:*:*", - "matchCriteriaId": "D77DCDC0-29DD-4BC8-BE30-3A348963F821" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.16:*:*:*:*:*:*:*", - "matchCriteriaId": "D1752D91-3468-4E22-B60F-6789B3CBD7B4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.17:*:*:*:*:*:*:*", - "matchCriteriaId": "F433AA7E-A780-4D45-AD1A-5A4CE1F3FCD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.17:rc1:*:*:*:*:*:*", - "matchCriteriaId": "C4338C87-B3CB-4CA7-BFAA-ADA1D919F203" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.18:*:*:*:*:*:*:*", - "matchCriteriaId": "93E210A7-489B-4EA7-A840-599523157DD3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.19:*:*:*:*:*:*:*", - "matchCriteriaId": "B37565FA-72F5-4063-8D7A-97BC269F020B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.19:rc1:*:*:*:*:*:*", - "matchCriteriaId": "434AED09-680D-43BC-B9CA-E78028035CDC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.19:rc2:*:*:*:*:*:*", - "matchCriteriaId": "009AF32A-19B9-4E56-B5D2-2D19082EF102" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.19:rc3:*:*:*:*:*:*", - "matchCriteriaId": "2643AA61-AB01-4252-8E50-81D5C74F8707" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.19:rc5:*:*:*:*:*:*", - "matchCriteriaId": "02552E07-D9C8-4DF8-AD63-B3A7B5C2C2DF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.20:*:*:*:*:*:*:*", - "matchCriteriaId": "BC8FA821-818E-4BC7-834B-94EB5C042390" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.21:*:*:*:*:*:*:*", - "matchCriteriaId": "F3FBF3D3-95A6-4869-8A69-F0E5ECA40220" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.21:rc1:*:*:*:*:*:*", - "matchCriteriaId": "425B207B-D11B-468B-A2C6-BDF276AE4264" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.21:rc2:*:*:*:*:*:*", - "matchCriteriaId": "F8B0055B-D0F1-4D8C-AE96-06315FFCC602" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.22:*:*:*:*:*:*:*", - "matchCriteriaId": "D07785D0-E995-4208-AB8C-43B320D291F9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.22:rc1:*:*:*:*:*:*", - "matchCriteriaId": "A42AC8B9-BEB2-4495-8A42-2AEDB29A3DA3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.23:*:*:*:*:*:*:*", - "matchCriteriaId": "152DDD6E-CF56-4E1C-BE4D-C7BC0FD9B08C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.23:rc1:*:*:*:*:*:*", - "matchCriteriaId": "76C2D14E-FD1C-430A-AC08-D61F997D8BA8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.23:rc2:*:*:*:*:*:*", - "matchCriteriaId": "5B34C747-1D67-458A-B9D1-FA61954F7067" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.23:rc3:*:*:*:*:*:*", - "matchCriteriaId": "16E618FC-38AA-477A-8F8E-BC5BFB0713C1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.23:rc4:*:*:*:*:*:*", - "matchCriteriaId": "0149BCA7-DCFC-449B-8AD5-DC6F9BBC80B0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.23:rc5:*:*:*:*:*:*", - "matchCriteriaId": "31D2BD41-12CE-47F1-ABD5-BE7AFFABF96B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.24:*:*:*:*:*:*:*", - "matchCriteriaId": "19BBA666-4473-4C6D-BF48-34EF3F09AD7D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.24:rc1:*:*:*:*:*:*", - "matchCriteriaId": "75767F08-B52A-412D-ADA8-1E23777DA2DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.25:*:*:*:*:*:*:*", - "matchCriteriaId": "B7DDF6CC-7997-47E7-96D3-8DC10F1D17F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.25:rc1:*:*:*:*:*:*", - "matchCriteriaId": "854C857C-762D-400D-AFB6-3353558D0D82" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.25:rc2:*:*:*:*:*:*", - "matchCriteriaId": "BB239211-BF7F-4357-B19F-221147CFC37E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.26:*:*:*:*:*:*:*", - "matchCriteriaId": "A1926DD0-0A9B-4F9D-BB4F-AC7AB0B3F0E4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.27:*:*:*:*:*:*:*", - "matchCriteriaId": "2763A6C7-DBBA-4E2A-917C-B6FF524B9891" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.27:rc1:*:*:*:*:*:*", - "matchCriteriaId": "D357DF0B-E6CB-4E24-9AE3-6A2C9A422AF6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.27:rc2:*:*:*:*:*:*", - "matchCriteriaId": "8C5BFEAD-9028-4F69-AB72-6004B0885A68" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.27:rc3:*:*:*:*:*:*", - "matchCriteriaId": "9277C1BB-81B7-4971-B68B-20672AEC1644" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.27:rc4:*:*:*:*:*:*", - "matchCriteriaId": "588913EA-69A8-4053-9181-37FB0E8DA273" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.27:rc5:*:*:*:*:*:*", - "matchCriteriaId": "D7D20090-A8E7-47D8-AD67-327B01315BA0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.27:rc6:*:*:*:*:*:*", - "matchCriteriaId": "896D47F2-4F84-4F32-9F94-90F9B5F36BE8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.28:*:*:*:*:*:*:*", - "matchCriteriaId": "E7DECDF8-7742-4D58-99FA-100A01748B05" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.28:rc2:*:*:*:*:*:*", - "matchCriteriaId": "01590CB5-4BAA-43CC-802F-3486EAD52BCB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.28:rc3:*:*:*:*:*:*", - "matchCriteriaId": "6DEAD5D0-7D13-4B46-AC43-3F0A5291A53B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.28:rc4:*:*:*:*:*:*", - "matchCriteriaId": "45E0E86E-3932-4EE2-B34C-D5861FD16187" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.28:rc5:*:*:*:*:*:*", - "matchCriteriaId": "C6435C47-5DC0-4EB6-984D-9231EB334AFF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.28:rc6:*:*:*:*:*:*", - "matchCriteriaId": "2DF231E5-CD60-4D4D-9A08-443C8CA500F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.29:*:*:*:*:*:*:*", - "matchCriteriaId": "CA4FD3B1-3A68-4122-AA50-31BFC6C50408" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.29:beta1:*:*:*:*:*:*", - "matchCriteriaId": "828BE0B5-8DF7-4C29-B55B-6AA01FBFD004" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.29:rc1:*:*:*:*:*:*", - "matchCriteriaId": "B654AFC2-0A1D-477F-A922-B235B9EF83D8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.29:rc2:*:*:*:*:*:*", - "matchCriteriaId": "100CCE68-F893-441B-ABF4-DAF968BD623C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.29:rc3:*:*:*:*:*:*", - "matchCriteriaId": "B3E393C0-85F8-49E4-929C-A390E0F3D884" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.30:*:*:*:*:*:*:*", - "matchCriteriaId": "45790331-CE26-457F-8649-F027703E73EE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.31:*:*:*:*:*:*:*", - "matchCriteriaId": "0B0BFE2D-5C7B-42E0-B783-8C5907CA8635" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.32:*:*:*:*:*:*:*", - "matchCriteriaId": "7CD993C1-70B6-4ACB-B958-94E7EF973A8B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.33:*:*:*:*:*:*:*", - "matchCriteriaId": "C085686C-A0AA-4F56-9E7D-B5CB24B890D9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.34:*:*:*:*:*:*:*", - "matchCriteriaId": "D02A5197-06B9-469E-9817-45BB23324042" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.35:*:*:*:*:*:*:*", - "matchCriteriaId": "5EB6BE37-E564-4E42-BE39-36DD301C37A4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.37:*:*:*:*:*:*:*", - "matchCriteriaId": "314209F2-E0A0-4045-8108-8E7215312442" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.38:*:*:*:*:*:*:*", - "matchCriteriaId": "11A8ECBB-7E50-4447-88E2-893C1466C251" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.39:*:*:*:*:*:*:*", - "matchCriteriaId": "8B8F24A5-F5C3-495F-9AF0-2EE836E0147A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.40:*:*:*:*:*:*:*", - "matchCriteriaId": "46DE2DE3-F081-4B80-A4DA-C5AB27B3CA8C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.0.41:*:*:*:*:*:*:*", - "matchCriteriaId": "71EF1D77-7838-47DF-B6A2-DBBAC0058FED" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "C036011A-9AE1-423C-8B73-188B9BA20FEE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.0:beta1:*:*:*:*:*:*", - "matchCriteriaId": "F008946C-43E9-4ECD-AE9F-486A4686AE87" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.0:beta2:*:*:*:*:*:*", - "matchCriteriaId": "6A4D6BB0-8E1A-49A4-BBC9-CBFA252C92A4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.0:beta3:*:*:*:*:*:*", - "matchCriteriaId": "CFE1DB59-0A60-432B-9D88-906C4FE6D6B8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.0:beta4:*:*:*:*:*:*", - "matchCriteriaId": "C111BDD4-2A52-4FB7-8D21-6049A10BCDA2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.0:beta5:*:*:*:*:*:*", - "matchCriteriaId": "6B33807C-8E7B-4A04-BE92-59C1B845AD42" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.0:rc1:*:*:*:*:*:*", - "matchCriteriaId": "B1614466-8EAC-4404-A674-EFFE0FFFBDC3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "663C6EE5-5B5E-4C0F-9E7F-D0E1DA9AF9EA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.1:beta1:*:*:*:*:*:*", - "matchCriteriaId": "FF2D5068-5BF3-425C-8B1A-E12E3D3CD8F1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.1:beta2:*:*:*:*:*:*", - "matchCriteriaId": "BF4F7833-4F88-4C54-AEC7-3C4FB797AE38" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.1:beta3:*:*:*:*:*:*", - "matchCriteriaId": "F2A973ED-CA5B-4A18-ACAB-1542E3866896" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.1:beta4:*:*:*:*:*:*", - "matchCriteriaId": "FA737702-6335-42F9-99B9-856D531B70F3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.1:rc1:*:*:*:*:*:*", - "matchCriteriaId": "8EAD9719-2736-40AE-BBEB-8BA627E8DF7A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.1:rc2:*:*:*:*:*:*", - "matchCriteriaId": "62693E5F-2EF6-49B5-9946-42CE61F4ACFC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8051459E-94D3-4D4A-9D40-CC9475DDB00C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.2:beta1:*:*:*:*:*:*", - "matchCriteriaId": "65ACA253-BDE7-4CAE-8F74-71EBA4728358" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.2:beta2:*:*:*:*:*:*", - "matchCriteriaId": "9C776F58-A76E-4ED3-825B-52ADFB38D0E5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.2:beta3:*:*:*:*:*:*", - "matchCriteriaId": "FF62B46E-37C4-426A-8854-E961BEB543E4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.2:beta4:*:*:*:*:*:*", - "matchCriteriaId": "C5EDDB54-70C6-41D0-AC5C-C10F8D107964" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.2:beta5:*:*:*:*:*:*", - "matchCriteriaId": "CAEAB037-F146-444F-A867-D08BD48DA6F7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.2:beta6:*:*:*:*:*:*", - "matchCriteriaId": "4962A86F-C9F5-4F03-AFCD-D2E6FD08BD06" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.2:rc1:*:*:*:*:*:*", - "matchCriteriaId": "47CF2A43-2D15-4D70-A424-C12053D1A6A0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "42056C63-69A7-43CF-828C-0C3E365702D9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.3:rc1:*:*:*:*:*:*", - "matchCriteriaId": "6AF8999B-86FF-4EC2-8EF3-C7461A6EBF35" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.3:rc2:*:*:*:*:*:*", - "matchCriteriaId": "F79E13B4-A826-47E9-BE30-E5D9864E8681" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.3:rc3:*:*:*:*:*:*", - "matchCriteriaId": "C6577A0A-B689-424E-BAAE-BD5DF2615311" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.3:rc4:*:*:*:*:*:*", - "matchCriteriaId": "6FA7418E-2F52-4F24-8722-8CA9781943F5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.3:rc5:*:*:*:*:*:*", - "matchCriteriaId": "BABFD5AE-95DD-478E-8E55-1541C4EF3D2B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.3:rc6:*:*:*:*:*:*", - "matchCriteriaId": "511E1319-C882-4761-ACD5-84617B78578E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "5B6A39A3-7F86-4DC3-B248-859630AFB9A3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.4:beta1:*:*:*:*:*:*", - "matchCriteriaId": "27A6EDED-CB33-4C80-B9C0-9774CC1455B9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.4:beta2:*:*:*:*:*:*", - "matchCriteriaId": "0CB4A1D0-2360-4191-AE7C-0B1B4E0FB34B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.4:beta3:*:*:*:*:*:*", - "matchCriteriaId": "2D252442-7A38-4AD7-9CEA-DD5B090726DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.4:rc1:*:*:*:*:*:*", - "matchCriteriaId": "203E0B7E-7ED5-4F89-8E12-BDA590DC7DB0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "58377AE3-1C13-4C3F-BC55-8336DAEEF97F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.5:beta1:*:*:*:*:*:*", - "matchCriteriaId": "64DCD92E-792F-4A6F-AF83-1B04E3B9F62E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.5:beta2:*:*:*:*:*:*", - "matchCriteriaId": "225CEEB5-1CE9-4818-A299-77516A26F30C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.5:beta3:*:*:*:*:*:*", - "matchCriteriaId": "EC2F9039-5B77-484E-A764-6CEF41F2729E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.5:rc1:*:*:*:*:*:*", - "matchCriteriaId": "1A4DD7CF-90BD-4DD3-9E1A-7D2F527CAC53" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.5:rc2:*:*:*:*:*:*", - "matchCriteriaId": "6BA5FE79-5C4C-47E5-9DF2-CEF37F139389" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.5:rc3:*:*:*:*:*:*", - "matchCriteriaId": "A434DDF7-A9D4-42AE-8A92-41E45C42B683" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.6:*:*:*:*:*:*:*", - "matchCriteriaId": "005C2DA4-D00E-4206-851E-9226D66B5F2F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.6:beta1:*:*:*:*:*:*", - "matchCriteriaId": "1608ABE4-8EE7-4280-B8E0-D4518BA1D706" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.6:beta2:*:*:*:*:*:*", - "matchCriteriaId": "0AECC80A-1D17-4BFD-92D6-6CFBAF88BEFF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.6:beta3:*:*:*:*:*:*", - "matchCriteriaId": "F29E6D8C-3691-4451-AB5F-48574C98A551" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.6:beta4:*:*:*:*:*:*", - "matchCriteriaId": "D8C90D1A-B862-4B43-B5BB-67DE455DFC4D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.6:rc1:*:*:*:*:*:*", - "matchCriteriaId": "5C56374A-0D57-4545-B538-20964F392996" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.6:rc2:*:*:*:*:*:*", - "matchCriteriaId": "08722144-6645-4321-8340-6E68DF1AFE99" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.6:rc3:*:*:*:*:*:*", - "matchCriteriaId": "2C30D261-CBE2-4E3A-9ED0-9D2DFB04D465" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.6:rc4:*:*:*:*:*:*", - "matchCriteriaId": "665B34A9-4331-4FC4-BB78-D6EE89827D3B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.6:rc5:*:*:*:*:*:*", - "matchCriteriaId": "4B9D5E28-E8E0-47F6-8728-18F2DDE0DCCF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.7:*:*:*:*:*:*:*", - "matchCriteriaId": "97B17602-0D97-469B-A9B1-30AAC8F758F1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.7:beta1:*:*:*:*:*:*", - "matchCriteriaId": "093976B1-BC7C-4671-B4B1-0FB94D0F699A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.7:beta2:*:*:*:*:*:*", - "matchCriteriaId": "C248EEB8-1510-40A4-B37B-E8F9AAE8687C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.8:*:*:*:*:*:*:*", - "matchCriteriaId": "857B664A-C6F9-45E3-93EA-C0F53CEF5C46" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.8:beta1:*:*:*:*:*:*", - "matchCriteriaId": "51C96068-1E81-430D-9C5F-A4273CA0BBEC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.8:beta2:*:*:*:*:*:*", - "matchCriteriaId": "243E4DB3-2553-48E9-9DA2-8AF955389EC5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.8:beta3:*:*:*:*:*:*", - "matchCriteriaId": "E85CE44F-46D0-46F4-B4AB-271A9BC271EC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.8:beta4:*:*:*:*:*:*", - "matchCriteriaId": "2716FBF4-5BDB-4D76-AC79-AB9158DA1241" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.8:beta5:*:*:*:*:*:*", - "matchCriteriaId": "CFD6B80F-7574-4A9F-AC40-7E357EE3F50F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.8:rc1:*:*:*:*:*:*", - "matchCriteriaId": "244D10AC-1C34-4D18-AB06-F9C2C9F564BF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.8:rc2:*:*:*:*:*:*", - "matchCriteriaId": "8DBEEA4A-8175-4E06-8346-93541868A6BC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.8:rc3:*:*:*:*:*:*", - "matchCriteriaId": "C3CC9D97-1C0F-4A48-9F2A-A74960A84D08" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.8:rc4:*:*:*:*:*:*", - "matchCriteriaId": "A692466A-6258-4D90-B362-9797B03CDB9C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.8:rc5:*:*:*:*:*:*", - "matchCriteriaId": "9BE92591-5AD8-47D0-BDDE-350C2BFB5736" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.9:*:*:*:*:*:*:*", - "matchCriteriaId": "6DFDA458-74E8-4DEF-B524-A4A8672CB66A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.9:beta1:*:*:*:*:*:*", - "matchCriteriaId": "B5E6F6A5-0844-4625-8AA4-E1CA8E15C1DE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.9:beta10:*:*:*:*:*:*", - "matchCriteriaId": "786B4160-C9E9-4EDD-83D9-741576FDDF2E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.9:beta2:*:*:*:*:*:*", - "matchCriteriaId": "039D87A3-49FA-4C02-B137-42D4407DD4A5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.9:beta3:*:*:*:*:*:*", - "matchCriteriaId": "FEEA0BB0-24E2-4D13-ACD6-BC4DD7878AB1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.9:beta4:*:*:*:*:*:*", - "matchCriteriaId": "D7981F07-C65C-4AA8-8653-786FD6A50BD7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.9:beta5:*:*:*:*:*:*", - "matchCriteriaId": "EE280017-8064-416B-AFA2-3DC8D2B1331B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.9:beta6:*:*:*:*:*:*", - "matchCriteriaId": "CA584B09-52A3-4D87-8B72-B704069766E6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.9:beta7:*:*:*:*:*:*", - "matchCriteriaId": "A10C7AE8-85C0-4CD1-910B-320FE52AD542" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.9:beta8:*:*:*:*:*:*", - "matchCriteriaId": "6763A6C3-53E3-41AF-B5DF-4ACDC5371AFD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.9:beta9:*:*:*:*:*:*", - "matchCriteriaId": "1693150F-E485-47D9-A957-C0A8FEFC8844" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.9:rc1:*:*:*:*:*:*", - "matchCriteriaId": "7F08FBEB-3FA9-4C57-9CD7-717C41F352C6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.10:*:*:*:*:*:*:*", - "matchCriteriaId": "9A3E3BF3-4376-4692-A515-A7B6593F28F1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.10:beta1:*:*:*:*:*:*", - "matchCriteriaId": "9E83B68F-B0E2-4C37-A711-1714652AB961" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.10:beta2:*:*:*:*:*:*", - "matchCriteriaId": "4F17A4B7-99C2-407A-9536-4B54EDC02899" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.10:beta3:*:*:*:*:*:*", - "matchCriteriaId": "F854F244-78C9-46C6-8862-1DA58912FCE8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.10:beta4:*:*:*:*:*:*", - "matchCriteriaId": "9A4C883A-A2A3-4D5F-8114-CE9220FFF7B7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.10:beta5:*:*:*:*:*:*", - "matchCriteriaId": "3544F0FF-3EEE-4902-B412-EB57D6AE7A4B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.10:beta6:*:*:*:*:*:*", - "matchCriteriaId": "5F428FF4-21A8-4605-AFCD-E78F43E46AE6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.10:beta7:*:*:*:*:*:*", - "matchCriteriaId": "7132AA21-DC2F-4493-9BCC-27E3D8F075AB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.10:rc1:*:*:*:*:*:*", - "matchCriteriaId": "B65F8362-934F-452D-8E86-0DB2E3C7B43D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.10:rc2:*:*:*:*:*:*", - "matchCriteriaId": "934D0AB5-62FB-4EC1-971A-A1BA8EEAD008" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.10:rc3:*:*:*:*:*:*", - "matchCriteriaId": "5891F237-D1DB-4CCE-8A8B-D10E7EDCB926" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.11:*:*:*:*:*:*:*", - "matchCriteriaId": "AB6AF9D5-CE60-4FC9-91AB-E243F0D429E9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.11:beta1:*:*:*:*:*:*", - "matchCriteriaId": "E114E18D-2882-4843-9356-279C69ABCBA2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.11:beta2:*:*:*:*:*:*", - "matchCriteriaId": "5E271694-B8C8-4BCF-8B4A-0425BA50EF6A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.11:beta3:*:*:*:*:*:*", - "matchCriteriaId": "E36CC085-34FF-4B84-8628-74BEEC686C88" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.11:beta4:*:*:*:*:*:*", - "matchCriteriaId": "06793BE6-3370-4FCB-A400-C6AF95D1E66D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.11:rc1:*:*:*:*:*:*", - "matchCriteriaId": "DE742D36-3A33-4316-8326-FA2F1B228E83" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.11:rc2:*:*:*:*:*:*", - "matchCriteriaId": "25D0C5E1-4D8D-42EE-8C94-12D442181DCF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.11:rc3:*:*:*:*:*:*", - "matchCriteriaId": "3326F984-8312-4E7F-A269-0A06FAC8BE25" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.11:rc5:*:*:*:*:*:*", - "matchCriteriaId": "290CF6FC-3BD6-4974-9DEC-188B79DC816A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.13:*:*:*:*:*:*:*", - "matchCriteriaId": "7F848FA5-9682-454F-A9DE-671C4401F15F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.13:beta1:*:*:*:*:*:*", - "matchCriteriaId": "782ABB64-C2F2-4326-A69F-75E514055C38" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.13:rc1:*:*:*:*:*:*", - "matchCriteriaId": "0EF9CEE2-8DB6-480F-970C-E19FEF31D0A5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.13:rc2:*:*:*:*:*:*", - "matchCriteriaId": "28C13A65-C0D6-4904-8C92-E5233D7E5CC9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.14:*:*:*:*:*:*:*", - "matchCriteriaId": "C4B83678-98A1-440E-950C-4A27995C7294" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.14:beta1:*:*:*:*:*:*", - "matchCriteriaId": "38993FC7-12DD-4D75-8EC6-719C0AD66191" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.14:beta2:*:*:*:*:*:*", - "matchCriteriaId": "0CAF82B9-020B-48FD-BE3D-70B8A7A8CDA1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.14:rc1:*:*:*:*:*:*", - "matchCriteriaId": "C43481DF-59C5-4E9B-8CB9-49E4873B7263" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.15:*:*:*:*:*:*:*", - "matchCriteriaId": "FB9EEE31-479A-4370-BF00-C26C1AF502B6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.15:beta1:*:*:*:*:*:*", - "matchCriteriaId": "BFFC71CB-0B01-4A34-85B8-8A27C1E7D451" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.15:beta2:*:*:*:*:*:*", - "matchCriteriaId": "EC53C1C7-ED9C-44C2-B446-0426E4C92D16" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.15:beta3:*:*:*:*:*:*", - "matchCriteriaId": "B996835E-97DB-47B1-80B9-BE757680CAFD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.15:beta4:*:*:*:*:*:*", - "matchCriteriaId": "AC7256E6-502A-47A5-A692-90162AA40AAA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.15:beta5:*:*:*:*:*:*", - "matchCriteriaId": "53E7BDBC-5BF8-4BA3-959D-1D16ACD558D4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.15:beta6:*:*:*:*:*:*", - "matchCriteriaId": "79B6B4A0-9B7E-4835-9F82-2B1D1AF955AB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.15:rc1:*:*:*:*:*:*", - "matchCriteriaId": "27BBC74C-51A3-48BB-B867-3A5F58AD8B4C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.15:rc2:*:*:*:*:*:*", - "matchCriteriaId": "3DEDAB32-9D5C-4F12-B9E4-ABEA615DC11B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.15:rc3:*:*:*:*:*:*", - "matchCriteriaId": "C3DA5585-140C-4F27-8654-BCFCB12659B8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.15:rc4:*:*:*:*:*:*", - "matchCriteriaId": "AA8F6085-9769-44DE-8E43-FAB7C7791A77" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.15:rc5:*:*:*:*:*:*", - "matchCriteriaId": "5A4D700F-AA36-4A5B-8BD3-3BD9A452D743" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.16:*:*:*:*:*:*:*", - "matchCriteriaId": "95EABD7D-1F18-4FA5-BAA9-F8D69129E531" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.16:beta1:*:*:*:*:*:*", - "matchCriteriaId": "D6045135-54AF-4B83-9279-47BB1DB67172" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.16:beta2:*:*:*:*:*:*", - "matchCriteriaId": "DBB7D1F1-7959-4459-827C-90B193F58269" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.16:rc1:*:*:*:*:*:*", - "matchCriteriaId": "62A6F2F0-E088-458F-813F-5B45EA01B77F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.17:*:*:*:*:*:*:*", - "matchCriteriaId": "65B836CA-3740-48B0-966B-21E65EF3D636" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.17:beta1:*:*:*:*:*:*", - "matchCriteriaId": "96308F2E-E2DE-4C0F-B0A6-7FDFFF67A0A5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.17:beta2:*:*:*:*:*:*", - "matchCriteriaId": "7A21785C-989F-4E72-932B-E77892EF492A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.17:rc1:*:*:*:*:*:*", - "matchCriteriaId": "0D832C4A-0793-4B64-944D-086CF614CAEE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.17:rc2:*:*:*:*:*:*", - "matchCriteriaId": "7C8E2232-7077-4CE4-9141-80F2F744F0B6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.17:rc3:*:*:*:*:*:*", - "matchCriteriaId": "38CDA418-F580-4625-9D84-F01EA5D0FC5E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.17:rc4:*:*:*:*:*:*", - "matchCriteriaId": "D0FB8DC5-ABD5-41BE-99EC-E610504D6F50" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.18:*:*:*:*:*:*:*", - "matchCriteriaId": "3988FA1B-18D9-46AA-87BA-A6B01D4F4B25" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:*:*:*:*:*:*:*", - "matchCriteriaId": "51A46409-7AC6-45DB-B92D-29988C445BC1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta1:*:*:*:*:*:*", - "matchCriteriaId": "53B41406-956A-48C9-9CDA-D7257D19E6F9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta10:*:*:*:*:*:*", - "matchCriteriaId": "B100CFD4-788C-44BF-A55D-225F72314A1A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta11:*:*:*:*:*:*", - "matchCriteriaId": "7B6BFCBC-F3E9-4CDD-833F-01D51594B0F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta12:*:*:*:*:*:*", - "matchCriteriaId": "589DC20E-E642-4BC7-83CD-01323D7F6236" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta13:*:*:*:*:*:*", - "matchCriteriaId": "6A9B81C1-EAF8-44B6-A4FD-2568FFBB6FEF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta14:*:*:*:*:*:*", - "matchCriteriaId": "22EBF19B-7E53-4627-AE87-6B7C4ACD88F3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta15:*:*:*:*:*:*", - "matchCriteriaId": "43744C82-D271-4BF3-9AD8-A48C1B5BA33F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta16:*:*:*:*:*:*", - "matchCriteriaId": "FD68995C-816C-4E25-B8B3-0BC808490D73" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta17:*:*:*:*:*:*", - "matchCriteriaId": "6EDC3AE7-569F-4016-B35E-E8B8B3456959" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta18:*:*:*:*:*:*", - "matchCriteriaId": "17068432-BFE0-4BE1-A86B-7D6562D18103" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta19:*:*:*:*:*:*", - "matchCriteriaId": "A0F0F2AF-748A-411A-8B95-45A04800FF72" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta2:*:*:*:*:*:*", - "matchCriteriaId": "945C0B80-E562-4495-849E-23EE406D2EA8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta20:*:*:*:*:*:*", - "matchCriteriaId": "5E91B287-CDFC-4791-95D5-54AC847877D7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta21:*:*:*:*:*:*", - "matchCriteriaId": "1F09C15E-E20C-473D-AF13-5509669DA8FA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta22:*:*:*:*:*:*", - "matchCriteriaId": "36FD7096-C215-4CCA-B0BE-244E9708E947" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta23:*:*:*:*:*:*", - "matchCriteriaId": "4AC8DAFE-64A5-47C6-BE99-093E744181B9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta24:*:*:*:*:*:*", - "matchCriteriaId": "C075C36D-D191-4165-A2A8-A8BA6AD93862" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta25:*:*:*:*:*:*", - "matchCriteriaId": "F7E9A4DE-C0B7-4951-97D2-26EFFE065A5B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta26:*:*:*:*:*:*", - "matchCriteriaId": "6B9FC583-AA79-4ED1-924B-DE58FBB88385" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta27:*:*:*:*:*:*", - "matchCriteriaId": "727FA534-FB49-4784-A56E-D709071FFEE2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta28:*:*:*:*:*:*", - "matchCriteriaId": "17628553-688B-4574-9B2A-035937225DD5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta29:*:*:*:*:*:*", - "matchCriteriaId": "E96F2F5A-A881-4EDC-965F-43984EA06151" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta3:*:*:*:*:*:*", - "matchCriteriaId": "26E9442B-FCA7-42A3-9E73-343D9FF11985" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta30:*:*:*:*:*:*", - "matchCriteriaId": "1EB24053-49FC-488C-8DC4-12F5A485EC39" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta31:*:*:*:*:*:*", - "matchCriteriaId": "653700ED-B2E3-4DD1-99A1-ED0B4504E628" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta32:*:*:*:*:*:*", - "matchCriteriaId": "2C9B4D07-8B90-4932-8A37-D204995E85E8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta33:*:*:*:*:*:*", - "matchCriteriaId": "D9F43544-D08D-4733-AE0D-A6C5742275D2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta4:*:*:*:*:*:*", - "matchCriteriaId": "101240B5-FAC7-4D47-9C4A-840D06E082EE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta5:*:*:*:*:*:*", - "matchCriteriaId": "608088FF-8EED-4F05-96EA-0E23F669C078" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta6:*:*:*:*:*:*", - "matchCriteriaId": "82401AB8-5432-4D75-ADC2-A310132EB9C4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta7:*:*:*:*:*:*", - "matchCriteriaId": "CECEDABC-F229-43F7-9795-9E87198424D2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta8:*:*:*:*:*:*", - "matchCriteriaId": "712E5798-A0FC-44E7-972A-D2EF66F5C793" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:beta9:*:*:*:*:*:*", - "matchCriteriaId": "82690AE3-BFFA-4616-AE30-35A6D21DFC1E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:rc1:*:*:*:*:*:*", - "matchCriteriaId": "4D0082F7-DDD3-4266-B604-D1E2958ABAE1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:rc2:*:*:*:*:*:*", - "matchCriteriaId": "00A32AD4-38C7-41BE-8042-9BCED336AA42" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:rc3:*:*:*:*:*:*", - "matchCriteriaId": "BC96DBDE-15A7-4C63-8C71-AA5CD158E306" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:rc4:*:*:*:*:*:*", - "matchCriteriaId": "834A6D33-2334-4361-92CE-8AECAF3614CE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:rc5:*:*:*:*:*:*", - "matchCriteriaId": "AFC3A80A-4C35-419F-B576-40A3FAD37723" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:rc6:*:*:*:*:*:*", - "matchCriteriaId": "D0FCC174-9216-433D-A5CB-A7C275DD9D94" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.20:*:*:*:*:*:*:*", - "matchCriteriaId": "09E2B608-6C70-446F-A3A7-369048D99855" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.20:rc1:*:*:*:*:*:*", - "matchCriteriaId": "BE1A8933-9958-458B-A511-D018B7CA7D57" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.20:rc2:*:*:*:*:*:*", - "matchCriteriaId": "100BF4B6-2A63-416A-B19F-722A9B44F126" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.20:rc3:*:*:*:*:*:*", - "matchCriteriaId": "4DD8FB59-2260-4343-B4D6-279ED7D7D5E9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.20:rc4:*:*:*:*:*:*", - "matchCriteriaId": "FDDCE2DE-94B7-460D-8BBB-26ACA4847807" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.20:rc5:*:*:*:*:*:*", - "matchCriteriaId": "A812C450-8E1F-4667-99EC-7237E1E319E5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.20:rc6:*:*:*:*:*:*", - "matchCriteriaId": "AD94AB7F-B7CF-42B0-AB71-23F42F3F1067" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.21:*:*:*:*:*:*:*", - "matchCriteriaId": "5AA00AE0-F447-4361-AA37-0C98BDE491E3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.21:beta1:*:*:*:*:*:*", - "matchCriteriaId": "28F79E9F-4AA1-451A-8819-CAF21DB2C990" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.21:beta2:*:*:*:*:*:*", - "matchCriteriaId": "7E1C14E8-5644-4B5F-8894-092187B1EE28" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.21:rc1:*:*:*:*:*:*", - "matchCriteriaId": "77C9B755-140B-4DBF-8BF1-80431C0F9A54" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.21:rc2:*:*:*:*:*:*", - "matchCriteriaId": "599CE5F2-5D31-4A9D-86A0-9CFD3A34B193" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.21:rc3:*:*:*:*:*:*", - "matchCriteriaId": "5460DA6B-6F81-4B8C-9D8F-DB946E3F33EB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.22:*:*:*:*:*:*:*", - "matchCriteriaId": "21DACE94-FBDC-4A3D-8DD6-E62D18F5EE7A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.22:beta1:*:*:*:*:*:*", - "matchCriteriaId": "45E92521-FE62-4940-B194-A8482538401B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.22:beta2:*:*:*:*:*:*", - "matchCriteriaId": "6DF7D5B4-A8BD-4F3B-8DB3-D5AB94086A32" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.22:beta3:*:*:*:*:*:*", - "matchCriteriaId": "40F8973E-8150-4834-8D9B-370F3664E894" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.22:beta4:*:*:*:*:*:*", - "matchCriteriaId": "73045C50-73FE-4162-8E8B-7721131E4396" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.22:rc1:*:*:*:*:*:*", - "matchCriteriaId": "1879D7C8-ABF1-4ECE-BBC7-71978695D4C8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.23:*:*:*:*:*:*:*", - "matchCriteriaId": "220A02AF-6ADA-4B75-BC81-40B2D847029A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.24:*:*:*:*:*:*:*", - "matchCriteriaId": "ECEB8F61-195E-41DE-90CE-22854055E9D6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.25:*:*:*:*:*:*:*", - "matchCriteriaId": "D0F72B91-1F7F-41EB-ABC8-1B50AFEC70EA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.25:beta03:*:*:*:*:*:*", - "matchCriteriaId": "E695F515-AE7E-48AB-999C-75B62BEA0BE3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.25:beta04:*:*:*:*:*:*", - "matchCriteriaId": "D448D4A5-D827-4FF8-BAC1-E25FD8F01C41" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.25:beta05:*:*:*:*:*:*", - "matchCriteriaId": "935F2297-6CB4-4ABB-9F4D-F11708CDC069" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.25:beta06:*:*:*:*:*:*", - "matchCriteriaId": "25ED23F7-DF30-46B2-99EF-3924E22C1870" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.25:rc01:*:*:*:*:*:*", - "matchCriteriaId": "6FB56358-46E4-4999-A311-5E1819A6D5DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.25:rc02:*:*:*:*:*:*", - "matchCriteriaId": "F508CFA5-5602-445C-9E18-71B6A625F9E4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.26:*:*:*:*:*:*:*", - "matchCriteriaId": "111091B9-CBAE-4FC7-8B97-7D2345BFCB45" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.26:beta01:*:*:*:*:*:*", - "matchCriteriaId": "897D42F6-202B-425A-BF0D-76D1A74D8E67" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.26:beta02:*:*:*:*:*:*", - "matchCriteriaId": "50300181-3691-4EA2-B779-1C9CF59E08FE" - }, + "criteria": "cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.2.0", + "versionEndExcluding": "1.2.35", + "matchCriteriaId": "9789BC2F-6EB8-4357-90E8-0F372DA76170" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.26:beta03:*:*:*:*:*:*", - "matchCriteriaId": "CABA31D9-9EC0-4447-9C5E-8BC5DF5F431D" + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.0", + "matchCriteriaId": "48C7B5CA-82E7-4676-BDBA-76C1098DDEAB" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.26:beta04:*:*:*:*:*:*", - "matchCriteriaId": "D4568552-91F6-4E05-ADA5-4127CBD4D3EE" - }, + "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.5.8", + "matchCriteriaId": "80C038E4-C24D-45E9-8287-C205C0C07809" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.26:beta05:*:*:*:*:*:*", - "matchCriteriaId": "D72D51C0-1044-4A74-823F-7123340FB9BF" + "criteria": "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*", + "matchCriteriaId": "C35B68DF-1440-4587-8458-9C5F4D1E43F3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.26:beta06:*:*:*:*:*:*", - "matchCriteriaId": "BF7EE024-3E34-4452-A832-751BBC109086" + "criteria": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1B42AB65-443B-4655-BAEA-4EB4A43D9509" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.26:rc01:*:*:*:*:*:*", - "matchCriteriaId": "947395DE-A911-47B3-983D-B5D23672068D" + "criteria": "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", + "matchCriteriaId": "FBF7B6A8-3DF9-46EC-A90E-6EF68C39F883" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.27:*:*:*:*:*:*:*", - "matchCriteriaId": "54C6D9D3-50B2-4A63-B3D1-C76C70F4443E" + "criteria": "cpe:2.3:o:suse:linux_enterprise:9.0:-:*:*:*:*:*:*", + "matchCriteriaId": "C3243C77-D635-480D-908C-328A479719E8" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.28:*:*:*:*:*:*:*", - "matchCriteriaId": "4110AA74-C69D-45BC-A630-9EE3A2036BD6" + "criteria": "cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*", + "matchCriteriaId": "AED08A6F-CD23-4405-B1CF-C96BB8AE7D6B" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.29:*:*:*:*:*:*:*", - "matchCriteriaId": "F2DEFD05-10EE-4242-B885-FD1B0DF6CAA1" + "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*", + "matchCriteriaId": "513797E6-FCE6-4E84-9B66-202541F9601E" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.30:*:*:*:*:*:*:*", - "matchCriteriaId": "1CAA1090-C1C7-43A2-BD44-065572D226B6" - }, + "criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*", + "matchCriteriaId": "22A79A35-05DB-4B9F-AD3E-EA6F933CF10C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.31:*:*:*:*:*:*:*", - "matchCriteriaId": "2FD92305-91BF-4984-A029-8FA83CBF1A12" + "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.32:*:*:*:*:*:*:*", - "matchCriteriaId": "F9F9A6DB-19BF-4798-879E-9BD4AD5EFF2F" - }, + "criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.33:*:*:*:*:*:*:*", - "matchCriteriaId": "31EE280F-D76D-478B-ADD6-D5F2C7574A2F" + "criteria": "cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*", + "matchCriteriaId": "743CBBB1-C140-4FEF-B40E-FAE4511B1140" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:libpng:libpng:1.2.34:*:*:*:*:*:*:*", - "matchCriteriaId": "747314F7-A515-41FF-8095-62A9F05F0DEA" + "criteria": "cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*", + "matchCriteriaId": "7000D33B-F3C7-43E8-8FC7-9B97AADC3E12" } ] } @@ -1736,176 +190,457 @@ "url": "ftp://ftp.simplesystems.org/pub/png/src/libpng-1.2.34-ADVISORY.txt", "source": "secalert@redhat.com", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://downloads.sourceforge.net/libpng/libpng-1.2.34-ADVISORY.txt", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Product" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Mailing List" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://lists.vmware.com/pipermail/security-announce/2009/000062.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/33970", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/33976", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/34137", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/34140", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/34143", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/34145", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/34152", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/34210", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/34265", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/34272", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/34320", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/34324", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/34388", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/34462", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/34464", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/35074", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/35258", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/35302", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/35379", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/35386", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/36096", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://security.gentoo.org/glsa/glsa-200903-28.xml", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.405420", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.433952", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://sourceforge.net/mailarchive/message.php?msg_name=e56ccc8f0902181726i200f4bf0n20d919473ec409b7%40mail.gmail.com", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://sourceforge.net/project/shownotes.php?group_id=1689&release_id=662441", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://support.apple.com/kb/HT3549", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://support.apple.com/kb/HT3613", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://support.apple.com/kb/HT3639", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://support.apple.com/kb/HT3757", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://support.avaya.com/japple/css/japple?temp.documentID=366362&temp.productID=154235&temp.releaseID=361845&temp.bucketID=126655&PAGE=Document", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0046", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.debian.org/security/2009/dsa-1750", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.debian.org/security/2009/dsa-1830", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.kb.cert.org/vuls/id/649212", "source": "secalert@redhat.com", "tags": [ + "Broken Link", + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:051", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:075", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:083", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2009-0315.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2009-0325.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2009-0333.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2009-0340.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/archive/1/501767/100/0/threaded", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/archive/1/503912/100/0/threaded", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/archive/1/505990/100/0/threaded", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/33827", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/33990", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html", "source": "secalert@redhat.com", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, @@ -1913,80 +648,136 @@ "url": "http://www.us-cert.gov/cas/techalerts/TA09-218A.html", "source": "secalert@redhat.com", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.vmware.com/security/advisories/VMSA-2009-0007.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.vupen.com/english/advisories/2009/0469", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2009/0473", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2009/0632", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2009/1297", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2009/1451", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2009/1462", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2009/1522", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2009/1560", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2009/1621", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2009/2172", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48819", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10316", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6458", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00272.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00412.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-02xx/CVE-2009-0269.json b/CVE-2009/CVE-2009-02xx/CVE-2009-0269.json index 51a3894e122..47aba9882ff 100644 --- a/CVE-2009/CVE-2009-02xx/CVE-2009-0269.json +++ b/CVE-2009/CVE-2009-02xx/CVE-2009-0269.json @@ -2,8 +2,8 @@ "id": "CVE-2009-0269", "sourceIdentifier": "cve@mitre.org", "published": "2009-01-26T15:30:04.967", - "lastModified": "2023-11-07T02:03:36.497", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:26:02.317", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "CWE-399" + "value": "CWE-787" } ] } @@ -63,553 +63,78 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndIncluding": "2.6.28", - "matchCriteriaId": "9B5B312F-E76A-43E1-A73F-31535848D55B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*", - "matchCriteriaId": "43F9DBB0-8AF7-42CA-95DD-68A344E9D549" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*", - "matchCriteriaId": "BA39D4CE-22F0-46A2-B8CF-4599675E7D3A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EDD00664-A27C-4514-A2A4-079E8F9B0251" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E336C792-B7A1-4318-8050-DE9F03474CEF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*", - "matchCriteriaId": "7228AE50-BACB-4AB8-9CE5-17DB0CD661AF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*", - "matchCriteriaId": "D6D260FD-E55E-4A95-AB7F-B880DBE37BAD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*", - "matchCriteriaId": "E36D0159-1A05-4628-9C1C-360DED0F438C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*", - "matchCriteriaId": "3E6654B9-42EB-4C2C-8F71-710D50556180" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*", - "matchCriteriaId": "0FC560CC-F785-42D5-A25B-1BA02E7AC464" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*", - "matchCriteriaId": "C06F0037-DE20-4B4A-977F-BFCFAB026517" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*", - "matchCriteriaId": "1817C772-D367-4ABE-B835-466D31A6DC89" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*", - "matchCriteriaId": "C667B8E4-64EB-4A05-84FF-B2243DEF757D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*", - "matchCriteriaId": "9484B41A-DFB6-4481-80D8-440C711CEA53" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*", - "matchCriteriaId": "53D373AF-DE6B-428E-9F0F-F1D220900A4D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*", - "matchCriteriaId": "F2975DF7-F916-456C-BF7C-2694559E5282" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*", - "matchCriteriaId": "6D156EFF-D2E5-4F42-B6E7-954DE6CD90B4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*", - "matchCriteriaId": "784EB96E-2FD3-4F77-8DB6-4D6C7A928946" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*", - "matchCriteriaId": "86A98A70-51E3-4556-8DC4-DD09CF370D1A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*", - "matchCriteriaId": "469EE3B0-3CC2-4AC2-86A0-2DF34205E707" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*", - "matchCriteriaId": "FCFECB2B-6482-45F2-B3BB-EDDEDA0948A0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*", - "matchCriteriaId": "8EC547EB-9308-4477-8256-A0E04B42D6DA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*", - "matchCriteriaId": "6F55A024-9F8E-44F8-A0D8-696BC232524A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*", - "matchCriteriaId": "84595143-3B04-4CE8-81C0-28EEEC58CD0E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*", - "matchCriteriaId": "32EE2B49-DDEB-4B49-A5F0-CAA161095A5F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*", - "matchCriteriaId": "C3ABFA33-8FA1-488E-A9BD-1593F495F595" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*", - "matchCriteriaId": "62F6DE3A-E6CC-4D7E-BD08-E43DC4182200" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*", - "matchCriteriaId": "A9A29C44-EBE5-42B0-AFAD-C5A8F6EEF2F8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96A43C95-8569-40BE-9E5B-F9B3D0B9D188" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*", - "matchCriteriaId": "ABD70B2B-9827-4DBB-B82D-0B70C2D4AB1F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*", - "matchCriteriaId": "99662904-E5E3-4E81-B199-39707EAEB652" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*", - "matchCriteriaId": "615BDD1D-36AA-4976-909B-F0F66BF1090C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EE8A26D6-1BDA-45F0-8F7C-F95986050E32" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*", - "matchCriteriaId": "61A3EDF2-09D7-4116-AE46-D86E4B9602AC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*", - "matchCriteriaId": "12A55028-B8F9-4AD2-AE57-A80D561F3C79" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*", - "matchCriteriaId": "0C4E641C-67D4-4599-8EFB-0B2F8D81D68C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*", - "matchCriteriaId": "70460F6C-D6C0-4C1A-B13E-368705EAF223" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*", - "matchCriteriaId": "3F26BA18-08AD-45FE-9F83-25CCB2E27270" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*", - "matchCriteriaId": "6EBFF148-3EDA-4216-910B-8930D8C443C2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*", - "matchCriteriaId": "648C63F7-EA1D-4F2E-B8AF-1F380C83E542" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*", - "matchCriteriaId": "1697B855-4834-4633-A5C8-C1F7F13ACE0D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*", - "matchCriteriaId": "1FBAE75F-9145-4B9A-A6D8-E488C5326145" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*", - "matchCriteriaId": "5990C6C2-2F66-4C4D-8224-74163865F410" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*", - "matchCriteriaId": "3A45A9B9-4B19-4A5B-BC95-BCBC4EF00F12" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*", - "matchCriteriaId": "C23AD176-3B99-4593-BCBD-13C1E579A13E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*", - "matchCriteriaId": "034DFD7F-8919-4245-8480-7B272F591271" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*", - "matchCriteriaId": "4CEBC606-6488-48CE-8AA8-5B8CC724D5D0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*", - "matchCriteriaId": "A83C60AF-50A9-480E-860D-45E80AC0A6B7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22_rc1:*:*:*:*:*:*:*", - "matchCriteriaId": "44FDF616-E410-4540-B377-98D1FB88CE35" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22_rc7:*:*:*:*:*:*:*", - "matchCriteriaId": "5313B736-9904-442A-84D6-8FC7B9AC2059" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*", - "matchCriteriaId": "5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*", - "matchCriteriaId": "CE87D1BC-A72D-42D2-A93C-67A5823BEB14" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*", - "matchCriteriaId": "5AAC2E9D-0E82-4866-9046-ADD448418198" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*", - "matchCriteriaId": "760FB32D-9795-4B29-B79A-A32B5E70F7EE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*", - "matchCriteriaId": "0DFF67E9-B0C2-48D5-BB3A-CF21D10010FF" - }, + "versionEndExcluding": "2.6.28.1", + "matchCriteriaId": "284B0272-0D61-492A-8899-1A3BED5D2E35" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*", - "matchCriteriaId": "5881A78C-D162-4DE5-8353-2BB1EC1F428B" + "criteria": "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*", + "matchCriteriaId": "C35B68DF-1440-4587-8458-9C5F4D1E43F3" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*", - "matchCriteriaId": "B13D81D2-1A89-4E61-A90C-5E8BB880310B" + "criteria": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1B42AB65-443B-4655-BAEA-4EB4A43D9509" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*", - "matchCriteriaId": "80F9887E-2466-4C73-A8E1-2117492F9EC9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*", - "matchCriteriaId": "8FDE5B27-2EF0-464E-8F14-5E809D84D389" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*", - "matchCriteriaId": "815B2EE8-136F-44E4-997D-5F93A54775DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23_rc1:*:*:*:*:*:*:*", - "matchCriteriaId": "76D0AFF0-8CA9-42EF-A20E-3CD6E7DDF016" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*", - "matchCriteriaId": "13673DF5-09B1-40C8-AC54-A447DE8AB01E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*", - "matchCriteriaId": "52152F5A-1833-4490-A373-9C547B90B0F8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B64A095E-5E97-445E-B435-F09983CC0E7A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B8035F93-9DEE-4B92-ABAA-4ABE0B71BF41" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*", - "matchCriteriaId": "6EE92406-DBF3-463E-8A51-F9679E851FDB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*", - "matchCriteriaId": "3C60D19B-ED9B-443C-9D49-002ABD381119" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*", - "matchCriteriaId": "264C61EE-64F6-43AD-B54F-7D683C29E64F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.7:*:*:*:*:*:*:*", - "matchCriteriaId": "0149408A-30F6-4EDF-8B3B-CBAB884CE758" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24_rc1:*:*:*:*:*:*:*", - "matchCriteriaId": "3069324C-28FB-4BB6-9451-F3AC6A8DA64C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24_rc4:*:*:*:*:*:*:*", - "matchCriteriaId": "8F3D19AD-4268-45E7-B13D-BC93ABDF2226" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24_rc5:*:*:*:*:*:*:*", - "matchCriteriaId": "67E619E6-A515-43BC-B371-C1FF6DAA6CCE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*", - "matchCriteriaId": "71295664-89EC-4BB3-9F86-B1DDA20FAC5A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25:*:x86_64:*:*:*:*:*", - "matchCriteriaId": "6ED1BAE4-A6D3-49A1-BCAD-1E514D42F609" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*", - "matchCriteriaId": "37BE853A-BA6F-4A70-B166-E34441F0B7DE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:x86_64:*:*:*:*:*", - "matchCriteriaId": "4F7C4DFF-616C-497D-9BAB-67C2E21BC21D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*", - "matchCriteriaId": "85064FDF-4B62-43BF-B36C-F659D739BC22" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:x86_64:*:*:*:*:*", - "matchCriteriaId": "E6EBBFE8-2332-45CE-93F8-6815C2AE5D17" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*", - "matchCriteriaId": "CEADC505-FF44-4D45-8EA6-B23A1C4564D1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:x86_64:*:*:*:*:*", - "matchCriteriaId": "388414A1-C9B4-41BA-AD35-6501A463A095" - }, + "criteria": "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", + "matchCriteriaId": "FBF7B6A8-3DF9-46EC-A90E-6EF68C39F883" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*", - "matchCriteriaId": "0CE3C807-5C9B-4B71-868B-DF17ECB1514F" + "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:x86_64:*:*:*:*:*", - "matchCriteriaId": "FDBA01DD-C129-48F1-800B-838418F4A4A4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*", - "matchCriteriaId": "A6CADAA2-91D2-40C4-90F3-D7F40A3D4CB0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:x86_64:*:*:*:*:*", - "matchCriteriaId": "185F1EF8-04EB-43ED-B909-8BDF60F23E76" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*", - "matchCriteriaId": "45B6847C-873B-4BE1-852D-239115E59BA4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:x86_64:*:*:*:*:*", - "matchCriteriaId": "D9D4BCAD-B3CD-4FA1-A833-0D7D40289E07" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*", - "matchCriteriaId": "FF41209E-D27F-4642-A405-90E822A41897" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:x86_64:*:*:*:*:*", - "matchCriteriaId": "3483FAFA-353C-498F-AF68-8F5B84A0F30D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*", - "matchCriteriaId": "97F59FD9-46E5-4F63-80A0-091AD44D1867" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:x86_64:*:*:*:*:*", - "matchCriteriaId": "B3D5AEA5-210B-4E9F-8D9C-C25B84F15C75" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*", - "matchCriteriaId": "428844A5-E020-4AE9-8012-9AEDFCB7C32E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:x86_64:*:*:*:*:*", - "matchCriteriaId": "6B11A9E1-9D90-46DC-81B5-17A137205AB3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*", - "matchCriteriaId": "94C9D70D-A552-48D6-9497-EE07EB5649D1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:x86_64:*:*:*:*:*", - "matchCriteriaId": "07EEC559-9240-46BE-9057-0F17D1F61F99" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*", - "matchCriteriaId": "AF6169FF-9FF9-4A81-BAEB-6D5132F64F61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:x86_64:*:*:*:*:*", - "matchCriteriaId": "BBBC127F-D67E-43FE-BCFE-606C200084F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*", - "matchCriteriaId": "E6DC79CF-A504-4232-9F66-B5DCD0213DA0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:x86_64:*:*:*:*:*", - "matchCriteriaId": "42B18945-EE09-4E6B-8C11-E382E5F8F850" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*", - "matchCriteriaId": "192B4273-0935-4232-BBFD-A850855CAC5F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*", - "matchCriteriaId": "60E9FDA8-7EC3-4B9B-B508-27F948D60DDB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.15:*:*:*:*:*:*:*", - "matchCriteriaId": "E4E4A6E5-0C2C-42FD-B982-684CCB0DDFBB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.16:*:*:*:*:*:*:*", - "matchCriteriaId": "A16F2182-C489-4CA9-A56B-01463148D16F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.17:*:*:*:*:*:*:*", - "matchCriteriaId": "630A56D3-7A82-44DE-8888-2EB8CD1C24A0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26:*:*:*:*:*:*:*", - "matchCriteriaId": "E45F4429-5A9C-4E8B-96EE-CCF19776CABF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.1:*:*:*:*:*:*:*", - "matchCriteriaId": "1EFCAF09-BB20-424C-8648-014C0F71F8A9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*", - "matchCriteriaId": "3A74970C-5EEA-47A7-A62D-AF98F4D1228F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*", - "matchCriteriaId": "CEA56669-B09E-42C2-9591-245C46909A2F" - }, + "criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.4:*:*:*:*:*:*:*", - "matchCriteriaId": "E9B33D60-8023-4A0B-ACF7-9F811EEB8BCD" + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", + "matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.5:*:*:*:*:*:*:*", - "matchCriteriaId": "3D08D180-23F7-456F-98CA-26B53C678D76" + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*", + "matchCriteriaId": "C0507E91-567A-41D6-A7E5-5088A39F75FB" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*", - "matchCriteriaId": "856FE78A-29B5-4411-98A0-4B0281C17EB9" + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", + "matchCriteriaId": "4747CC68-FAF4-482F-929A-9DA6C24CB663" } ] } @@ -619,114 +144,200 @@ "references": [ { "url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git%3Ba=commit%3Bh=a17d5232de7b53d34229de79ec22f4bb04adb7e4", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00003.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://secunia.com/advisories/33758", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://secunia.com/advisories/34394", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://secunia.com/advisories/34502", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://secunia.com/advisories/34981", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://secunia.com/advisories/35390", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://secunia.com/advisories/35394", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://secunia.com/advisories/37471", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.debian.org/security/2009/dsa-1749", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.debian.org/security/2009/dsa-1787", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:118", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2009-0326.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2009-0360.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/33412", "source": "cve@mitre.org", "tags": [ - "Patch" + "Broken Link", + "Patch", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.ubuntu.com/usn/usn-751-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.vupen.com/english/advisories/2009/3316", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48188", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "VDB Entry" + ] }, { "url": "https://lists.launchpad.net/ecryptfs-devel/msg00010.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.launchpad.net/ecryptfs-devel/msg00011.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8169", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8944", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-08xx/CVE-2009-0846.json b/CVE-2009/CVE-2009-08xx/CVE-2009-0846.json index 894931c10eb..1c7d1ea0904 100644 --- a/CVE-2009/CVE-2009-08xx/CVE-2009-0846.json +++ b/CVE-2009/CVE-2009-08xx/CVE-2009-0846.json @@ -2,8 +2,8 @@ "id": "CVE-2009-0846", "sourceIdentifier": "cve@mitre.org", "published": "2009-04-09T00:30:00.267", - "lastModified": "2020-01-21T15:47:45.433", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:21:59.430", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-824" } ] } @@ -62,188 +62,135 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "032730AE-1E53-4CA2-96FD-AD60CD27F3CA" + "criteria": "cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.6.4", + "matchCriteriaId": "46577766-3490-43FD-8DDB-DDEF8862420D" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*", + "matchCriteriaId": "743CBBB1-C140-4FEF-B40E-FAE4511B1140" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:-:*:*:*:*:*:*:*", - "matchCriteriaId": "589D7E39-A243-49F9-8F67-4B9E92AE87DF" + "criteria": "cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*", + "matchCriteriaId": "7000D33B-F3C7-43E8-8FC7-9B97AADC3E12" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", + "matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "08FA60A9-10E1-4ACD-819C-17801FAD7671" + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", + "matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "E8973E93-0BBE-4BD3-9983-F6480FFEA228" + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*", + "matchCriteriaId": "C0507E91-567A-41D6-A7E5-5088A39F75FB" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "7A37987D-22F9-47AC-A07A-380F7E509BFE" + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", + "matchCriteriaId": "4747CC68-FAF4-482F-929A-9DA6C24CB663" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.5.7", + "matchCriteriaId": "EA0E35E1-9181-4A2B-93E5-8833E5AB5FDD" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6172AF57-B26D-45F8-BE3A-F75ABDF28F49" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E47F0770-67D7-42EE-A1AD-9D5B5E83BF2B" + "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "BE8C0C82-749E-4837-88F8-FB56A753B094" + "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7D74A418-50F0-42C0-ABBC-BBBE718FF025" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.2:beta1:*:*:*:*:*:*", - "matchCriteriaId": "4EA5E4B3-AD02-4E87-822B-8A6C91DA65FA" + "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:4.7:*:*:*:*:*:*:*", + "matchCriteriaId": "E1CA1D49-76E7-4195-98AF-BE916040ECC3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.2:beta2:*:*:*:*:*:*", - "matchCriteriaId": "1A0B70C1-476D-4FAF-BA96-CB3EB32B7BC5" + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0F9EF63F-DDA3-448B-92D7-27ED92C51FED" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "8AD672FA-918D-48CB-BC03-4E412AF0DCCC" + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "397313C3-6BF5-4A87-90B3-55678E807171" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "D0B363A4-BB7A-48A2-AE6B-BD2DDD46E7CB" + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "73322DEE-27A6-4D18-88A3-ED7F9CAEABD5" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "74EF42A5-EC47-4475-81D6-FD1E9C2B8A3C" + "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "53A61204-33CE-422F-8285-20A5E98ADF3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "30F2CBEF-6FA1-4E07-8163-6AFEDC93FCE5" + "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E2FE6DAA-4702-409A-98B6-DE13B12805A1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "D133CB0D-8A54-4DAA-9FE8-0B367544DE65" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:*", - "matchCriteriaId": "7B2C23BD-1995-4F09-B444-87DDDE21817E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:*", - "matchCriteriaId": "EEF118BE-6351-4768-A3F0-DFE0065273D9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.2.8:*:*:*:*:*:*:*", - "matchCriteriaId": "2574FC48-C80A-427A-AD12-42676D125D62" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "7F01A83F-3BD1-4DED-979A-B4B6B23039FD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*", - "matchCriteriaId": "6B1422F8-CC87-46EA-8649-A12D6E47335D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "ACEB5A36-8F72-417A-AC92-149612EC7BCB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7B8704B5-F37B-4C61-A924-3774A29BFEB3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "F953CEBA-BAC0-48DF-A3D0-1FABCC9963E2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "ED81A044-8A7B-4EEF-A4B3-EA49D76FAAED" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*", - "matchCriteriaId": "30AA5727-BD83-45CF-B308-BA5F8A577B9D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*", - "matchCriteriaId": "0E088E64-6FBD-4148-8F78-506364B7BB1E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "52F0EECF-7787-442B-9888-D22F7D36C3DE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EF344AED-BE00-4A9B-A9DE-C6FB0BEE4617" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "567406CA-58D8-453E-B36E-6D1D2EFC8EB6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "7830E03F-A813-4E35-893E-BF27395CEFB3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7764411E-C056-4696-822E-235F2620FAC4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "4DD315AE-868B-4061-BF01-CDBF59B02499" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B639DD5F-71C7-4D9B-BA5C-51CAF64140B6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2B904DCE-D59F-45C7-A814-DE42CF02792D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "9957FE9E-1E89-4C27-852C-44F866A1834E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "2C382DAA-68D2-4DD9-BE29-8EEB0BAF1A7A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "73BB258E-51CF-4D12-836B-BCEA587A3F5F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F81DE01C-BA3B-40B4-BD85-17692F0AF8A8" + "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5B5DCF29-6830-45FF-BC88-17E2249C653D" } ] } @@ -253,51 +200,164 @@ "references": [ { "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://lists.vmware.com/pipermail/security-announce/2009/000059.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://marc.info/?l=bugtraq&m=124896429301168&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://marc.info/?l=bugtraq&m=130497213107107&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2009-0409.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2009-0410.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/34594", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/34598", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/34617", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/34622", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/34628", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/34630", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/34637", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/34640", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/34734", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/35074", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/35667", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://security.gentoo.org/glsa/glsa-200904-09.xml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256728-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://support.apple.com/kb/HT3549", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-142.htm", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047180.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047181.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-002.txt", @@ -309,106 +369,198 @@ }, { "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0058", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0058", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21396120", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/662091", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "US Government Resource" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:098", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2009-0408.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/archive/1/502527/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/archive/1/502546/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/archive/1/504683/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/34409", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id?1021994", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/usn-755-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html", "source": "cve@mitre.org", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.vmware.com/security/advisories/VMSA-2009-0008.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.vupen.com/english/advisories/2009/0960", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2009/0976", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2009/1057", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2009/1106", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2009/1297", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2009/2084", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2009/2248", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10694", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5483", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6301", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00205.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00206.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-14xx/CVE-2009-1415.json b/CVE-2009/CVE-2009-14xx/CVE-2009-1415.json index 4f2200c1017..d1f1a9644df 100644 --- a/CVE-2009/CVE-2009-14xx/CVE-2009-1415.json +++ b/CVE-2009/CVE-2009-14xx/CVE-2009-1415.json @@ -2,8 +2,8 @@ "id": "CVE-2009-1415", "sourceIdentifier": "cve@mitre.org", "published": "2009-04-30T20:30:00.563", - "lastModified": "2017-08-17T01:30:20.287", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:22:16.227", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -55,7 +55,7 @@ "description": [ { "lang": "en", - "value": "CWE-255" + "value": "CWE-824" } ] } @@ -70,588 +70,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*", - "versionEndIncluding": "2.6.5", - "matchCriteriaId": "A5EDD6F6-742C-4A59-AFB5-A7BCFB6AA759" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.0.16:*:*:*:*:*:*:*", - "matchCriteriaId": "4FBB8F2C-498D-4D31-A7D7-9991BABEA7A6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.0.17:*:*:*:*:*:*:*", - "matchCriteriaId": "8856E1B1-8007-42E5-82EF-4700D4DEEDDA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.0.18:*:*:*:*:*:*:*", - "matchCriteriaId": "A9CF40D3-CE03-4C2A-8EEF-EB5989291806" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.0.19:*:*:*:*:*:*:*", - "matchCriteriaId": "EC60D4CC-922C-4941-A400-0CBEAC7F31D1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.0.20:*:*:*:*:*:*:*", - "matchCriteriaId": "754A0D19-A17A-4007-8355-497D14CFCBF9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.0.21:*:*:*:*:*:*:*", - "matchCriteriaId": "8140DBE1-8116-4051-9A57-07535586E0AF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.0.22:*:*:*:*:*:*:*", - "matchCriteriaId": "56D2DF7F-DCDD-486D-B906-F9DDE3A1DB70" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.0.23:*:*:*:*:*:*:*", - "matchCriteriaId": "F1CC840D-AD01-4EE2-8652-06742A6286BA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.0.24:*:*:*:*:*:*:*", - "matchCriteriaId": "84224A82-6D58-4000-A449-20C1632DAE85" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.0.25:*:*:*:*:*:*:*", - "matchCriteriaId": "A466931C-769A-4A28-B072-10930CE655E6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.1.13:*:*:*:*:*:*:*", - "matchCriteriaId": "2FEE50AC-8730-4F04-B57C-6BDF8B957F6D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.1.14:*:*:*:*:*:*:*", - "matchCriteriaId": "10F621DC-7967-4D97-A562-02E7033C89C2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.1.15:*:*:*:*:*:*:*", - "matchCriteriaId": "776E5481-399F-45BC-AD20-A18508B03916" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.1.16:*:*:*:*:*:*:*", - "matchCriteriaId": "63D7F972-9128-4A4D-8508-B38CE2F155E9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.1.17:*:*:*:*:*:*:*", - "matchCriteriaId": "C5D56873-E8C5-4E4B-BB85-6DCF6526B453" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.1.18:*:*:*:*:*:*:*", - "matchCriteriaId": "54FE4766-32D0-491E-8C71-5B998C468142" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.1.19:*:*:*:*:*:*:*", - "matchCriteriaId": "7F980857-2364-466A-8366-BD017D242222" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.1.20:*:*:*:*:*:*:*", - "matchCriteriaId": "4CDCF1F0-5A78-48FF-B4B0-303AE2420F6A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.1.21:*:*:*:*:*:*:*", - "matchCriteriaId": "0A2E649D-5C45-4412-927B-E3EDCE07587C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.1.22:*:*:*:*:*:*:*", - "matchCriteriaId": "066175C2-6E96-4BAE-B1A6-B23D25547FAC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.1.23:*:*:*:*:*:*:*", - "matchCriteriaId": "869D3010-67AE-44D0-BB8F-D9C410AEA1D8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "052B40C1-C29B-4189-9A45-DAE873AB716D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "02F71E61-7455-4E10-B9D8-2B7FDDFB10F6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "5E05A9A1-6B7A-43FB-A9B8-41B68CA5FDCD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "1FB08FD9-9AB8-4015-A8BE-FD9F7EBAC6DA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "B588AAE0-8C3F-47C7-812F-8C97BD8795E5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "EBB9154B-4254-4F33-8DB2-5B96E2DA4931" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.2.6:*:*:*:*:*:*:*", - "matchCriteriaId": "64D9C191-6A57-40BB-BDD1-6B1A6BBAB51E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.2.7:*:*:*:*:*:*:*", - "matchCriteriaId": "A2EA79D1-2EA8-4040-A5B5-C93EE937945A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.2.8:*:*:*:*:*:*:*", - "matchCriteriaId": "61D05BC3-1315-4AC7-884D-41459272C94B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.2.8.1a1:*:*:*:*:*:*:*", - "matchCriteriaId": "2901E522-6F54-4FA5-BF22-463A9D6B53D8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.2.9:*:*:*:*:*:*:*", - "matchCriteriaId": "738F29DA-9741-4BA5-B370-417443A3AC2E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.2.10:*:*:*:*:*:*:*", - "matchCriteriaId": "52173492-1031-4AA4-A600-6210581059D3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.2.11:*:*:*:*:*:*:*", - "matchCriteriaId": "BB636C36-2884-4F66-B68A-4494AEAF90C3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "777A16E4-A1F5-48DC-9BF0-CD9F0DCF8B55" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EC4231BD-201D-4B10-9E35-B9EEFC714F6A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "4C9200C3-0F46-4238-918B-38D95BF11547" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "024A9511-7CB4-4681-8429-0FE7FC34DF1A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "34CEF5ED-87A5-44B2-8A4A-9896957C057B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.3.5:*:*:*:*:*:*:*", - "matchCriteriaId": "1B84A4F5-CED7-4633-913F-BE8235F68616" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97564ABD-F9CE-4B3C-978A-1622DE3E4924" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3DB6EC88-DCE0-439B-89CD-18229965849B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1E2C89DD-CDBD-4772-A031-089F32006D80" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "8C2FD618-91F4-48E7-B945-90CC0A367DE6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "65DC9555-E76F-4F8D-AE39-5160B34A87FF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "8B61D180-9EEA-4258-9A59-7F004F2C83F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "00DE1208-BDDC-405B-A34A-B58D00A279DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B8EF689E-59AA-4619-ADB2-E195CFD4094A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B62AB660-5DA4-4F13-AF9E-DC53D0A18EED" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "22314ED6-D0CD-442E-A645-A9CCFE114AE1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.5.4:*:*:*:*:*:*:*", - "matchCriteriaId": "A9E1C5B2-27BF-4328-9336-98B8828EE4BE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.5.5:*:*:*:*:*:*:*", - "matchCriteriaId": "B5C952BF-A135-4B15-8A51-94D66B618469" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6ADED309-0A25-478D-B542-96217A0DD63E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DC0403DE-76B1-4E24-8014-64F73DCB53DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "69EA91B0-249F-41B2-8AD0-0C2AD29BE3D6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "7F714D22-873A-4D64-8151-86BB55EFD084" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4E9181F9-50FF-4995-9554-022CF93376C2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "AED0B40F-3413-40D6-B1EF-E6354D2A91F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.2:*:*:*:*:*:*:*", - "matchCriteriaId": "4E99A7D8-2303-4268-8EF8-6F01A042BEDE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.3:*:*:*:*:*:*:*", - "matchCriteriaId": "86C70F69-FB80-4F32-A798-71A5153E6C29" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.4:*:*:*:*:*:*:*", - "matchCriteriaId": "B2A1E604-500E-4181-BF66-BB69C7C3F425" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.5:*:*:*:*:*:*:*", - "matchCriteriaId": "0C8120E3-B60F-44E4-B837-4707A9BAEDBE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.6:*:*:*:*:*:*:*", - "matchCriteriaId": "84D3F16F-2C23-48E9-9F2D-1F1DF74719E5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.7:*:*:*:*:*:*:*", - "matchCriteriaId": "F7073EAD-06C9-4309-B479-135021E82B99" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.8:*:*:*:*:*:*:*", - "matchCriteriaId": "546C56AC-AFCC-47B7-A5A8-D3E3199BEA41" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.9:*:*:*:*:*:*:*", - "matchCriteriaId": "1895868E-E501-42C2-8450-EEED4447BAB3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.10:*:*:*:*:*:*:*", - "matchCriteriaId": "2ED1FCE0-260B-4FB2-9DBD-F4D0D35639AC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.11:*:*:*:*:*:*:*", - "matchCriteriaId": "199AA36A-3B23-438C-9109-CC9000372986" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.12:*:*:*:*:*:*:*", - "matchCriteriaId": "DD6FFF05-37B2-4D69-86AF-921591382D21" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.13:*:*:*:*:*:*:*", - "matchCriteriaId": "82BF8600-4E5D-4FF4-953C-F2DC726CA6CA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.14:*:*:*:*:*:*:*", - "matchCriteriaId": "04C40F0E-B102-4FE8-9E93-0ACFBF35226D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.15:*:*:*:*:*:*:*", - "matchCriteriaId": "22802660-D33F-4683-B82F-C94AC6170A73" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.16:*:*:*:*:*:*:*", - "matchCriteriaId": "3623E9BE-F513-4301-BF0C-6A7F87E78E7A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.17:*:*:*:*:*:*:*", - "matchCriteriaId": "B5DBAF08-1441-4F14-A740-E90044B77042" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.18:*:*:*:*:*:*:*", - "matchCriteriaId": "4CE9BB7E-DDD8-4CBF-AEC2-40D59A560BD2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:1.7.19:*:*:*:*:*:*:*", - "matchCriteriaId": "5D3B6684-3890-4B60-BE67-D06045A86B3B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.0.0:*:*:*:*:*:*:*", - "matchCriteriaId": "81C6C982-21D5-4FE3-A342-FC45BD78D2F1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A69E3A01-D8C6-4C36-8C4E-52B96541D5B8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F9D61596-01EB-4936-923B-63537625F926" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "599EB59C-7717-47A8-84C6-78B6D79AEB02" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "4A6CBB77-818D-4DFF-9DD9-07EBF9933B06" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "26E9005E-5034-43F2-B96E-7829E19FE3A8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "6FA854EA-29FE-4B91-AEA3-ED649D7FD25A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "4DC3A5EE-2892-4548-A0CB-D3289CD64D63" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "83F22BF4-A738-438B-8D0B-6993640F0D31" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "9D3193B7-8FB9-45E4-BFF6-891A3F14F021" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "5AF269AE-121B-4982-A765-5C7E806FA9FD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "A1C9F604-7FBE-4759-B039-8F5894574203" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.1.7:*:*:*:*:*:*:*", - "matchCriteriaId": "191821CD-E4CB-4269-B04C-284A9F9783B0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.1.8:*:*:*:*:*:*:*", - "matchCriteriaId": "B2A71474-958D-4689-A652-3E2A731F47FF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "38169043-17DF-4CF9-963A-8770B8882357" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "0D7E5D9C-0976-4C9A-9FEB-AB923845BAD6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "C4537676-A72E-4433-B44F-3664EDD6F240" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D7CCCB66-C7CC-4E5C-8253-C29D57BE9B43" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "8D090B10-68F2-424D-8234-2A280AA96B59" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "23168B77-645D-4A2A-A6E3-7001104064A4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4D085B16-3116-423F-BDE0-2D93E12650A8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "C59247E9-CDAE-4269-A8E4-F49F617CDD23" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "A6019C0C-E9DD-4831-8E6A-785AE1A930FD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "16F9CF15-8789-49B6-BB6D-B784C8FF20ED" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "A6DAE798-14C9-4CB6-A39F-69CDF9D8FBB0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.3.5:*:*:*:*:*:*:*", - "matchCriteriaId": "C51E0C88-B19C-408D-AC17-10CE7462D48A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.3.6:*:*:*:*:*:*:*", - "matchCriteriaId": "7A7FBFAA-263C-4B7B-A135-9824DFD8CCDA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.3.7:*:*:*:*:*:*:*", - "matchCriteriaId": "2AC41482-B3BC-4C93-A850-73A179BAB763" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.3.8:*:*:*:*:*:*:*", - "matchCriteriaId": "ADC80BE1-28A6-4348-A061-8FD9C805E945" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.3.9:*:*:*:*:*:*:*", - "matchCriteriaId": "9D8EF703-AE06-4DD7-9235-2D8CCDB24F96" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.3.10:*:*:*:*:*:*:*", - "matchCriteriaId": "9A8AC314-065B-4BC3-A5EE-CA6D3006F9F5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.3.11:*:*:*:*:*:*:*", - "matchCriteriaId": "D8201FF6-53A8-4850-A2B2-47AA65B2CB75" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "AFB33002-E5C6-4573-BC94-647DDE4E6F89" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "8D7D245A-D983-40AD-89A7-0EA00D38D570" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "A7223691-225D-4649-B410-F41D2C489BA5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D6B3DBF9-52EB-4741-85E4-E68645BD81E2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "350A6845-77D6-4D63-A13C-5DAB55F98727" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8A456D12-C43A-47B0-AC0D-BF02AEBA0828" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "4D457688-987A-4059-AA58-D9BF19ABC48B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:gnutls:2.6.4:*:*:*:*:*:*:*", - "matchCriteriaId": "AA20043D-EC85-4003-9E7B-27AB50F4E133" + "versionEndExcluding": "2.6.6", + "matchCriteriaId": "0CC336AC-F306-4643-91E0-BA1D4B07DC10" } ] } @@ -663,51 +83,101 @@ "url": "http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3515", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch" ] }, { "url": "http://permalink.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3502", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/34842", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/35211", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://security.gentoo.org/glsa/glsa-200905-04.xml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3488", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit" ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:116", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/34783", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id?1022157", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.vupen.com/english/advisories/2009/1218", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50257", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50260", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50445", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-15xx/CVE-2009-1532.json b/CVE-2009/CVE-2009-15xx/CVE-2009-1532.json index 1885e9faa4b..1b21d1bf23e 100644 --- a/CVE-2009/CVE-2009-15xx/CVE-2009-1532.json +++ b/CVE-2009/CVE-2009-15xx/CVE-2009-1532.json @@ -2,8 +2,8 @@ "id": "CVE-2009-1532", "sourceIdentifier": "secure@microsoft.com", "published": "2009-06-10T18:30:00.530", - "lastModified": "2023-12-07T18:38:56.693", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:22:27.067", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "CWE-399" + "value": "CWE-787" } ] } @@ -74,68 +74,58 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "4D3B5E4F-56A6-4696-BBB4-19DF3613D020" + "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*", - "matchCriteriaId": "9CFB1A97-8042-4497-A45D-C014B5E240AB" + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:-:*:x64:*", + "matchCriteriaId": "3A118DC8-CD3A-461F-867E-5174F24FBAE9" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*", - "matchCriteriaId": "7F9C7616-658D-409D-8B53-AC00DC55602A" + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:-:*:x86:*", + "matchCriteriaId": "1114016B-B51D-495D-96AC-A0E7992DA551" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*", - "matchCriteriaId": "FFF81F4B-7D92-4398-8658-84530FB8F518" + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x86:*:*:*:*:*", - "matchCriteriaId": "BA99C751-91CB-43D4-93FF-1C12342CAF1E" + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*", - "matchCriteriaId": "1DD1D5ED-FE7C-4ADF-B3AF-1F13E51B4FB5" + "criteria": "cpe:2.3:o:microsoft:windows_vista:-:-:*:*:*:*:*:*", + "matchCriteriaId": "BDD715BA-B0EB-4D42-BCB1-97B261459E52" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*", - "matchCriteriaId": "C162FFF0-1E8F-4DCF-A08F-6C6E324ED878" + "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*", + "matchCriteriaId": "3A04E39A-623E-45CA-A5FC-25DAA0F275A3" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "0A0D2704-C058-420B-B368-372D1129E914" + "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_vista:gold:*:*:*:*:*:*:*", - "matchCriteriaId": "1D12423F-FCCD-4F4C-9037-7607C1F1F99E" + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "34DF3B5E-F17F-49B4-9DC8-06749F3C9CC3" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_vista:sp1:*:*:*:*:*:*:*", - "matchCriteriaId": "49F99773-D1AF-4596-856A-CA164D4B68E5" + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*", + "matchCriteriaId": "C6109348-BC79-4ED3-8D41-EA546A540C79" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_vista:sp2:*:*:*:*:*:*:*", - "matchCriteriaId": "9F916C0D-3B99-46F3-A7AE-BAF067361499" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B47EBFCC-1828-45AB-BC6D-FB980929A81A" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_xp:sp3:*:*:*:*:*:*:*", - "matchCriteriaId": "E69F8C21-5996-4083-A02A-F04AE948CEA9" + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*", + "matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9" } ] } @@ -145,20 +135,35 @@ "references": [ { "url": "http://osvdb.org/54951", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/archive/1/504208/100/0/threaded", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id?1022350", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.us-cert.gov/cas/techalerts/TA09-160A.html", "source": "secure@microsoft.com", "tags": [ + "Broken Link", + "Third Party Advisory", "US Government Resource" ] }, @@ -166,20 +171,33 @@ "url": "http://www.vupen.com/english/advisories/2009/1538", "source": "secure@microsoft.com", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://www.zerodayinitiative.com/advisories/ZDI-09-041", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-019", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6244", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-17xx/CVE-2009-1721.json b/CVE-2009/CVE-2009-17xx/CVE-2009-1721.json index 33da9216634..cdff3c256b4 100644 --- a/CVE-2009/CVE-2009-17xx/CVE-2009-1721.json +++ b/CVE-2009/CVE-2009-17xx/CVE-2009-1721.json @@ -2,8 +2,8 @@ "id": "CVE-2009-1721", "sourceIdentifier": "cve@mitre.org", "published": "2009-07-31T19:00:01.093", - "lastModified": "2012-10-23T03:06:36.117", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:22:38.687", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "CWE-16" + "value": "CWE-824" } ] } @@ -73,28 +73,179 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:opensuse:opensuse:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "33910C38-56F2-4D36-BBA3-C88E163704B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*", + "matchCriteriaId": "C35B68DF-1440-4587-8458-9C5F4D1E43F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1B42AB65-443B-4655-BAEA-4EB4A43D9509" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.5.8", + "matchCriteriaId": "80C038E4-C24D-45E9-8287-C205C0C07809" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*", + "matchCriteriaId": "C0507E91-567A-41D6-A7E5-5088A39F75FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", + "matchCriteriaId": "4747CC68-FAF4-482F-929A-9DA6C24CB663" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", + "matchCriteriaId": "A5D026D0-EF78-438D-BEDD-FC8571F3ACEB" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*", + "matchCriteriaId": "7000D33B-F3C7-43E8-8FC7-9B97AADC3E12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*", + "matchCriteriaId": "B3BB5EDB-520B-4DEF-B06E-65CA13152824" + } + ] + } + ] } ], "references": [ { "url": "http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00000.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://release.debian.org/proposed-updates/stable_diffs/openexr_1.6.1-3%2Blenny3.debdiff", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch" ] }, + { + "url": "http://secunia.com/advisories/36030", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/36032", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/36096", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/36123", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/36753", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://security.debian.org/pool/updates/main/o/openexr/openexr_1.2.2-4.3+etch2.diff.gz", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch" ] }, @@ -102,44 +253,69 @@ "url": "http://security.debian.org/pool/updates/main/o/openexr/openexr_1.6.1-3+lenny3.diff.gz", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch" ] }, { "url": "http://support.apple.com/kb/HT3757", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.debian.org/security/2009/dsa-1842", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:190", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:191", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/35838", "source": "cve@mitre.org", "tags": [ - "Patch" + "Broken Link", + "Patch", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.securitytracker.com/id?1022674", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-831-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.us-cert.gov/cas/techalerts/TA09-218A.html", "source": "cve@mitre.org", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, @@ -147,20 +323,30 @@ "url": "http://www.vupen.com/english/advisories/2009/2035", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://www.vupen.com/english/advisories/2009/2172", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01286.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01290.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-27xx/CVE-2009-2768.json b/CVE-2009/CVE-2009-27xx/CVE-2009-2768.json index 74460df2a11..7919d64b5b6 100644 --- a/CVE-2009/CVE-2009-27xx/CVE-2009-2768.json +++ b/CVE-2009/CVE-2009-27xx/CVE-2009-2768.json @@ -2,8 +2,8 @@ "id": "CVE-2009-2768", "sourceIdentifier": "cve@mitre.org", "published": "2009-08-14T15:16:27.657", - "lastModified": "2023-11-07T02:04:15.230", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:22:43.770", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -78,6 +78,10 @@ { "lang": "en", "value": "CWE-476" + }, + { + "lang": "en", + "value": "CWE-824" } ] } @@ -92,13 +96,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndIncluding": "2.6.30", - "matchCriteriaId": "E8EFD951-8815-4199-9A17-E0AD64F5F8BB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:-:*:*:*:*:*:*", - "matchCriteriaId": "2887290A-1B43-4DB9-A9D0-B0B56CD78E48" + "versionEndExcluding": "2.6.31", + "matchCriteriaId": "AE1BA972-91FE-417F-B0AD-D3067DA8C96F" }, { "vulnerable": true, @@ -133,7 +132,10 @@ "references": [ { "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3440625d78711bee41a84cf29c3d8c579b522666", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://lkml.org/lkml/2009/6/22/91", @@ -192,6 +194,7 @@ "url": "http://www.securityfocus.com/bid/36037", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] diff --git a/CVE-2009/CVE-2009-30xx/CVE-2009-3046.json b/CVE-2009/CVE-2009-30xx/CVE-2009-3046.json index 935ce1c529f..f8ba2f4e000 100644 --- a/CVE-2009/CVE-2009-30xx/CVE-2009-3046.json +++ b/CVE-2009/CVE-2009-30xx/CVE-2009-3046.json @@ -2,8 +2,8 @@ "id": "CVE-2009-3046", "sourceIdentifier": "cve@mitre.org", "published": "2009-09-02T17:30:01.093", - "lastModified": "2017-09-19T01:29:25.593", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:18:38.427", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-264" + "value": "CWE-295" } ] } @@ -62,574 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:*:beta3:*:*:*:*:*:*", - "versionEndIncluding": "10.00", - "matchCriteriaId": "ECEF9B68-A095-4FE2-8270-EAE060034064" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:1.00:*:*:*:*:*:*:*", - "matchCriteriaId": "0F892EEF-54EC-4EC0-84B3-BD5C216AED80" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:2.00:*:*:*:*:*:*:*", - "matchCriteriaId": "089BEFE3-24B2-4C73-BA25-7C905ED68A50" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:2.10:*:*:*:*:*:*:*", - "matchCriteriaId": "3B73E6B0-2113-4D09-A665-7D8FEC3A3D59" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:2.10:beta1:*:*:*:*:*:*", - "matchCriteriaId": "76AECDD0-C14D-4A68-AF2E-1C41A51089EC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:2.10:beta2:*:*:*:*:*:*", - "matchCriteriaId": "1C06EBBF-8B64-4C22-9EDA-E133AFD205DC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:2.10:beta3:*:*:*:*:*:*", - "matchCriteriaId": "D888C22C-41F9-427D-9249-F010891DA48E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:2.12:*:*:*:*:*:*:*", - "matchCriteriaId": "326AE3EE-3BF3-4B7E-B3FC-445FB9D6E4C0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:3.00:*:*:*:*:*:*:*", - "matchCriteriaId": "94FAD06C-830A-4CB6-B9AF-7E093B64B69B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:3.00:beta:*:*:*:*:*:*", - "matchCriteriaId": "C9BDFBD0-3CAC-4617-B1B2-7F95E7C648D0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:3.10:*:*:*:*:*:*:*", - "matchCriteriaId": "5366D587-7E77-4288-AB31-48108D04E0B5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:3.21:*:*:*:*:*:*:*", - "matchCriteriaId": "60EFFC44-A329-4FA5-B57C-FA8892F8226B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:3.50:*:*:*:*:*:*:*", - "matchCriteriaId": "9241CFD0-9E61-487F-B076-2D7B8ACEA381" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:3.51:*:*:*:*:*:*:*", - "matchCriteriaId": "ACEE8213-BD3A-405B-BC4C-8B80EBDF5A42" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:3.60:*:*:*:*:*:*:*", - "matchCriteriaId": "0A9A60F2-516D-4ECA-9ABC-4887EC4176E4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:3.61:*:*:*:*:*:*:*", - "matchCriteriaId": "AB49750B-DAA1-4417-8384-1F4D47F2227D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:3.62:*:*:*:*:*:*:*", - "matchCriteriaId": "1099D38B-82EC-43C9-9DF5-D5EDC19834DE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:3.62:beta:*:*:*:*:*:*", - "matchCriteriaId": "A6D64030-1877-4F29-8340-93DB6E0F1F13" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:4.00:*:*:*:*:*:*:*", - "matchCriteriaId": "E5AC1241-B922-4BE7-93C1-077FC0DA1CA5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:4.00:beta2:*:*:*:*:*:*", - "matchCriteriaId": "D65D0F7A-9414-4CF5-8460-DFDB55F61E5A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:4.00:beta3:*:*:*:*:*:*", - "matchCriteriaId": "85184E8A-C42D-4CBD-ACB4-B58752C305D3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:4.00:beta4:*:*:*:*:*:*", - "matchCriteriaId": "D422BB16-9F9C-4554-B2F1-826EB5BCB1ED" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:4.00:beta5:*:*:*:*:*:*", - "matchCriteriaId": "DA682571-536B-4CD9-A820-47E897B01480" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:4.00:beta6:*:*:*:*:*:*", - "matchCriteriaId": "298457B8-051B-46D0-81B4-C5B63B69EB98" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:4.01:*:*:*:*:*:*:*", - "matchCriteriaId": "D7D4BC07-C37E-4F99-8DEA-54A45250050A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:4.02:*:*:*:*:*:*:*", - "matchCriteriaId": "8E2B80FF-7ACB-43F5-9BD5-BF18A0EB4DD9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "CECFBC71-7814-4A24-A918-C593673727B4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*", - "matchCriteriaId": "57824075-E3F7-4B23-B4D6-8417C3147085" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*", - "matchCriteriaId": "FE078F27-6FC1-466C-8331-A89F8B6FE0B1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*", - "matchCriteriaId": "822FC5FB-3A6F-4F5B-A75B-7D42C3DB8E22" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*", - "matchCriteriaId": "7B7673C9-C69E-4CD8-9AF4-57AA81B8038A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*", - "matchCriteriaId": "5839EB88-DF5E-4AB0-899B-DF9F72F5F442" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*", - "matchCriteriaId": "2E1865A4-E038-4A1C-877D-5A3CFA9576BF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*", - "matchCriteriaId": "93966A66-4332-4E76-9B1A-2BBF10AF0ACC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*", - "matchCriteriaId": "B4F51D99-C77D-4DB6-8D4B-DF1CE9078543" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*", - "matchCriteriaId": "FAA91E77-301C-48F6-9A57-D5FDCEF743BC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*", - "matchCriteriaId": "1C49DDEF-681C-4A34-9FF8-17249C42842D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*", - "matchCriteriaId": "EF365891-F3FA-4740-94B2-01F85254A2F9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E42B4261-C511-4F3A-8596-6BD4E343DC31" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", - "matchCriteriaId": "9D2F38FE-7E98-48B2-B0B2-35312368B21F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", - "matchCriteriaId": "63687D75-860D-4A36-B6BB-45BD4268B6FC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*", - "matchCriteriaId": "BD500741-CF39-4F0C-9F96-6CBDFF8973D0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*", - "matchCriteriaId": "359941FD-A5CE-43C1-AA76-C1B79BCB08C4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*", - "matchCriteriaId": "CC9AC78A-CA47-476D-935E-67932BAB98A1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D3E9662C-441F-4AB2-AC4C-30F31C32949A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*", - "matchCriteriaId": "B8D681B3-73E6-4257-84B4-DE83F6D659B3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*", - "matchCriteriaId": "CAD1A2C1-74F6-4CFC-B4F3-4CE3F1E49E76" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", - "matchCriteriaId": "8BF4EF8B-18CA-417C-BA30-024EE25B6AE8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", - "matchCriteriaId": "D9E5F2A5-F50F-4085-AB7D-8C91121A429A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*", - "matchCriteriaId": "3E90912E-0CF8-404B-9E86-461497C65A5A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*", - "matchCriteriaId": "9E19DD71-9447-4946-931F-4866537C8BC7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*", - "matchCriteriaId": "54075890-6E0C-4AB7-8BD5-2023419CC251" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*", - "matchCriteriaId": "0ABC3435-77CD-4591-8282-7ADA60225CF9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*", - "matchCriteriaId": "91FA8A44-2CAF-4EE4-940F-0D09BD07FD39" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D7C35850-B79C-4EE4-A6F2-CC5D2304724B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*", - "matchCriteriaId": "50B797C8-3290-4278-9D4B-A15A14FB8D3A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*", - "matchCriteriaId": "FFEC078C-A8F4-471B-A367-59A86B78590D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*", - "matchCriteriaId": "E10F658D-D2E4-4789-8172-F8842C3EEA05" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*", - "matchCriteriaId": "55B110B5-ADE5-46AB-8BF1-AF61A0ECE5D8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*", - "matchCriteriaId": "E7C6479D-4E40-4ED0-9A9D-9725CF3F0DB4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*", - "matchCriteriaId": "81687D99-7444-4205-A7BE-992CC758675F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*", - "matchCriteriaId": "D75C4301-68E9-4A10-B9C5-711252BF629B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*", - "matchCriteriaId": "0B147C1A-EA6C-40C8-A54A-96840A6FE9DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*", - "matchCriteriaId": "CC690371-3326-421E-8BAC-14F48840671B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*", - "matchCriteriaId": "E20418A7-1FA7-45EF-99B5-12D283EA6CB2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*", - "matchCriteriaId": "6BE50982-8026-466C-9F51-867425C9986F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*", - "matchCriteriaId": "B54B2BD7-AB8F-4124-87EE-7A4BBEB348C7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*", - "matchCriteriaId": "B85C5F65-B814-4BF5-AB43-D0CFFE8175A0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*", - "matchCriteriaId": "8B0FAFA5-D27A-4F57-8B25-3E98DBF279A2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", - "matchCriteriaId": "A8F6644C-97E6-4023-9C5C-5C1E1B0B55D7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", - "matchCriteriaId": "FD889EC7-E5D2-4137-B85C-86D7DB5CED27" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", - "matchCriteriaId": "97452A26-7231-43BE-B70E-B8D05365CAB4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", - "matchCriteriaId": "D9DBA733-467C-4505-8199-DD25A5FFBF97" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", - "matchCriteriaId": "B332FF1C-731D-454C-AA9E-3534040F09E5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", - "matchCriteriaId": "D7965089-8592-47F2-958B-7DBE669BCAC9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", - "matchCriteriaId": "E1750B2D-7AC8-45CF-9879-1D0476EEE86C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", - "matchCriteriaId": "5CBAA39D-01A0-4B6B-926B-C36C238E5258" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", - "matchCriteriaId": "6F3707AA-D67A-4966-8DE4-8AEAC3C99B36" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*", - "matchCriteriaId": "ECEE4473-88C0-4E28-A5B5-F7383B0E5558" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "76410AD4-78CA-48EA-83F0-099D0A49626F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", - "matchCriteriaId": "9754B270-E01D-415E-9A91-09ECB9B82B28" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*", - "matchCriteriaId": "A01CAF7E-F196-4851-BF1B-CADA51DDBF6D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*", - "matchCriteriaId": "D4682E92-E5E7-4351-959E-25A79CA4271B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", - "matchCriteriaId": "9DF2B21F-7E97-416B-AF5C-35338A254552" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", - "matchCriteriaId": "DBAC41D6-73D4-44E9-87E4-E1E955B9580A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", - "matchCriteriaId": "52FCCB1C-165C-49FF-B70B-475B37BDF02A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", - "matchCriteriaId": "4FA5A5E5-3703-44AC-9963-A20A55002B48" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", - "matchCriteriaId": "DC3E5BEF-3F29-4929-A37C-C49322B19047" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*", - "matchCriteriaId": "7B0E7B5D-2568-4128-8F99-E74D24A7E991" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", - "matchCriteriaId": "E6A04906-7267-4A09-87BF-D639C7CF315B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BEA17D3F-A17B-47A6-8066-583F63D11468" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", - "matchCriteriaId": "76C58A91-23BA-4336-A81B-B7FDFAF6CA91" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", - "matchCriteriaId": "EC6E40C4-FA29-4D7A-9018-44154503A68F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", - "matchCriteriaId": "ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", - "matchCriteriaId": "98E48C83-01AE-4A33-A004-14B99792674C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", - "matchCriteriaId": "B56A2B78-70BD-439B-B1ED-A17FA5EF0990" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*", - "matchCriteriaId": "623E4466-82CC-4BDD-BE25-3BB33B585547" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", - "matchCriteriaId": "8F90E537-5A0F-4302-9CC3-8EE7EB21DD1D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", - "matchCriteriaId": "DF0002A4-8A90-471C-9813-F648D53E4F3A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", - "matchCriteriaId": "F5ECA190-D7D3-4248-A61E-0D87E67E3D31" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", - "matchCriteriaId": "8FD514B3-AFCD-4CB1-9D1B-18625B771E0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", - "matchCriteriaId": "8A15E0FA-5570-4C5F-B087-38591D9EBABA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", - "matchCriteriaId": "3D9F72B1-F398-4E07-8652-2042ADDB8414" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", - "matchCriteriaId": "2FA2F504-6690-4AAD-97A6-6487E450C92E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", - "matchCriteriaId": "19B927D3-D766-4D53-9870-15A7184E4C6F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", - "matchCriteriaId": "54FE202A-E068-4ECE-B61D-230EFF0E60B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", - "matchCriteriaId": "5B43E22F-D894-4763-BF55-C9B77911C8EC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", - "matchCriteriaId": "4218D36C-CCE7-443B-842B-AA1A2C865734" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", - "matchCriteriaId": "3311565E-3971-416B-AC9C-6CF9F4EF0F8A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", - "matchCriteriaId": "CAC4250E-E638-4015-B5EF-7B5405F7FBFC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", - "matchCriteriaId": "F1B7AA6F-9918-4356-894C-72833B791201" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:10.00:alpha:*:*:*:*:*:*", - "matchCriteriaId": "85DB12A2-D43F-47BE-9719-466BE967E30E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", - "matchCriteriaId": "F12E0FE8-3982-453B-9C01-ABB2DE96866F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", - "matchCriteriaId": "DA76A537-6A1B-41D8-A923-24DC77F92E0E" + "criteria": "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.00", + "matchCriteriaId": "72795166-DE8D-400D-B5A5-82839ED19708" } ] } @@ -641,6 +98,7 @@ "url": "http://www.opera.com/docs/changelogs/freebsd/1000/", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -648,6 +106,7 @@ "url": "http://www.opera.com/docs/changelogs/linux/1000/", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -655,6 +114,7 @@ "url": "http://www.opera.com/docs/changelogs/mac/1000/", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -662,6 +122,7 @@ "url": "http://www.opera.com/docs/changelogs/solaris/1000/", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -669,6 +130,7 @@ "url": "http://www.opera.com/docs/changelogs/windows/1000/", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -676,12 +138,16 @@ "url": "http://www.opera.com/support/kb/view/929/", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6357", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2011/CVE-2011-01xx/CVE-2011-0199.json b/CVE-2011/CVE-2011-01xx/CVE-2011-0199.json index 3a48b3accbf..4614e28eca6 100644 --- a/CVE-2011/CVE-2011-01xx/CVE-2011-0199.json +++ b/CVE-2011/CVE-2011-01xx/CVE-2011-0199.json @@ -2,8 +2,8 @@ "id": "CVE-2011-0199", "sourceIdentifier": "product-security@apple.com", "published": "2011-06-24T20:55:02.137", - "lastModified": "2011-10-27T03:21:46.387", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:18:23.823", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-295" } ] } @@ -62,93 +84,17 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "3C69DEE9-3FA5-408E-AD27-F5E7043F852A" + "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.6.0", + "versionEndExcluding": "10.6.8", + "matchCriteriaId": "C49EABED-46D6-4AFC-A440-15B6A44D81E3" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D25D1FD3-C291-492C-83A7-0AFAFAADC98D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "5B565F77-C310-4B83-B098-22F9489C226C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "546EBFC8-79F0-42C2-9B9A-A76CA3F19470" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*", - "matchCriteriaId": "119C8089-8C98-472E-9E9C-1741AA21DD35" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "831C5105-6409-4743-8FB5-A91D8956202F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.6:*:*:*:*:*:*:*", - "matchCriteriaId": "0B63D169-E2AA-4315-891F-B4AF99F2753C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.7:*:*:*:*:*:*:*", - "matchCriteriaId": "1E715DFC-ADB8-43D0-9941-76BB0BE7BCF5" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "26E34E35-CCE9-42BE-9AFF-561D8AA90E25" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A04FF6EE-D4DA-4D70-B0CE-154292828531" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "9425320F-D119-49EB-9265-3159070DFE93" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "F6BE138D-619B-4E44-BFB2-8DFE5F0D1E12" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*", - "matchCriteriaId": "EF0D1051-F850-4A02-ABA0-968E1336A518" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "A1C9705A-74D4-43BA-A119-C667678F9A15" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.6:*:*:*:*:*:*:*", - "matchCriteriaId": "4BBF5FE5-4B25-47BE-8D9D-F228746408EC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.7:*:*:*:*:*:*:*", - "matchCriteriaId": "8CE84A25-CEFB-4165-9498-2E4BF60E2C0E" + "criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.6.0", + "versionEndExcluding": "10.6.8", + "matchCriteriaId": "A890E117-79B8-434D-92DF-2CCF73469519" } ] } @@ -160,6 +106,7 @@ "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html", "source": "product-security@apple.com", "tags": [ + "Mailing List", "Patch", "Vendor Advisory" ] @@ -174,7 +121,12 @@ }, { "url": "http://www.securityfocus.com/bid/48447", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-58xx/CVE-2012-5821.json b/CVE-2012/CVE-2012-58xx/CVE-2012-5821.json index bcc32e6b6e8..e4329c83989 100644 --- a/CVE-2012/CVE-2012-58xx/CVE-2012-5821.json +++ b/CVE-2012/CVE-2012-58xx/CVE-2012-5821.json @@ -2,8 +2,8 @@ "id": "CVE-2012-5821", "sourceIdentifier": "cve@mitre.org", "published": "2012-11-04T22:55:04.827", - "lastModified": "2017-08-29T01:32:47.103", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:18:43.307", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-310" + "value": "CWE-295" } ] } @@ -68,6 +90,36 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", + "matchCriteriaId": "01EDA41C-6B2E-49AF-B503-EB3882265C11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", + "matchCriteriaId": "E4174F4F-149E-41A6-BBCC-D01114C05F38" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", + "matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", + "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE" + } + ] + } + ] } ], "references": [ @@ -80,19 +132,32 @@ }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:101", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.ubuntu.com/usn/USN-1642-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79930", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0351", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-12xx/CVE-2014-1266.json b/CVE-2014/CVE-2014-12xx/CVE-2014-1266.json index 00a7745df73..9ae7568d97c 100644 --- a/CVE-2014/CVE-2014-12xx/CVE-2014-1266.json +++ b/CVE-2014/CVE-2014-12xx/CVE-2014-1266.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1266", "sourceIdentifier": "product-security@apple.com", "published": "2014-02-22T17:05:21.767", - "lastModified": "2019-03-08T16:06:29.247", + "lastModified": "2024-02-09T03:19:52.270", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-295" } ] } @@ -62,123 +84,31 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "DEE0068D-C699-4646-9658-610409925A79" + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0", + "versionEndExcluding": "6.1.6", + "matchCriteriaId": "A7D52A72-B69F-4374-AB94-5FDF905845CA" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "87C215DD-BC98-4283-BF13-69556EF7CB78" + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0", + "versionEndExcluding": "7.0.6", + "matchCriteriaId": "70EADE0F-0D8F-4C12-952D-89FD079A50F2" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:iphone_os:6.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "C1C3966E-C136-47A9-B5B4-70613756ED27" + "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.9", + "versionEndExcluding": "10.9.2", + "matchCriteriaId": "C3EDC17F-CBB3-4FFE-9C4C-A92583BE53CD" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:iphone_os:6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "22AD2A1F-A637-47DE-A69F-DAE4ABDFA4BD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:iphone_os:6.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F6D398B8-821B-4DE9-ADF1-4983051F964C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:iphone_os:6.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E0CCE5F2-4D32-404B-BAAC-E64F11BD41FB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:iphone_os:6.1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "D54D4BD4-0C6C-4125-ABC8-9FC1E804E530" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:iphone_os:6.1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "ED1FADB5-2390-4F49-A1A3-0B8EAB652ADB" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.9:*:*:*:*:*:*:*", - "matchCriteriaId": "A48A5310-A589-4E9B-99BC-F840CC1A6A44" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "F241EBFB-CCB3-4D16-B476-AC1578D3C435" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:tvos:6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5365205F-B91D-4123-8CFD-EA42E0DEA944" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:tvos:6.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D8C7F676-5ACC-4330-9591-465CA8AF77AA" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:iphone_os:7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "07A11433-B725-4BD6-B998-4B3637F061EC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:iphone_os:7.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4FD62141-07B1-4E3D-80BC-25D519F90DBD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:iphone_os:7.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "D9737BD4-B4F4-4291-A1E9-B692ECBC657E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:iphone_os:7.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B6160869-944D-4E34-BB81-6A1259D692B1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:iphone_os:7.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "090CAC3C-4B20-46E5-A8C7-950B7E1DB5E9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:iphone_os:7.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "E96F77DD-0962-4E55-97A2-9BC2FE01D8A8" + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0", + "versionEndExcluding": "6.0.2", + "matchCriteriaId": "0812CC13-F57E-432D-8FF3-21F3B642E883" } ] } @@ -188,7 +118,10 @@ "references": [ { "url": "http://it.slashdot.org/comments.pl?sid=4821073&cid=46310187", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "http://support.apple.com/kb/HT6146", @@ -213,19 +146,32 @@ }, { "url": "http://support.apple.com/kb/HT6150", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://news.ycombinator.com/item?id=7281378", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://www.cs.columbia.edu/~smb/blog/2014-02/2014-02-23.html", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Exploit" + ] }, { "url": "https://www.cs.columbia.edu/~smb/blog/2014-02/2014-02-24.html", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Exploit" + ] }, { "url": "https://www.imperialviolet.org/2014/02/22/applebug.html", diff --git a/CVE-2015/CVE-2015-88xx/CVE-2015-8854.json b/CVE-2015/CVE-2015-88xx/CVE-2015-8854.json index 65b654992d5..cc13ca85fd4 100644 --- a/CVE-2015/CVE-2015-88xx/CVE-2015-8854.json +++ b/CVE-2015/CVE-2015-88xx/CVE-2015-8854.json @@ -2,8 +2,8 @@ "id": "CVE-2015-8854", "sourceIdentifier": "cve@mitre.org", "published": "2017-01-23T21:59:00.470", - "lastModified": "2023-11-07T02:28:44.680", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:01:53.227", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-399" + "value": "CWE-1333" } ] } @@ -84,9 +84,29 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.3.3", - "matchCriteriaId": "4C482A8F-1A8C-48A6-9D16-F62F2C780872" + "criteria": "cpe:2.3:a:marked_project:marked:*:*:*:*:*:node.js:*:*", + "versionEndExcluding": "0.3.4", + "matchCriteriaId": "AEC25255-6640-4076-8C2D-C8EF16960829" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", + "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", + "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956" } ] } @@ -104,23 +124,35 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO2RMVVZVV6NFTU46B5RYRK7ZCXYARZS/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6BJG6RGDH7ZWVVAUFBFI5L32RSMQN2S/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://nodesecurity.io/advisories/23", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] }, { "url": "https://support.f5.com/csp/article/K05052081?utm_source=f5support&%3Butm_medium=RSS", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2019/CVE-2019-00xx/CVE-2019-0039.json b/CVE-2019/CVE-2019-00xx/CVE-2019-0039.json index 405e34fa195..91ba0ee21df 100644 --- a/CVE-2019/CVE-2019-00xx/CVE-2019-0039.json +++ b/CVE-2019/CVE-2019-00xx/CVE-2019-0039.json @@ -2,7 +2,7 @@ "id": "CVE-2019-0039", "sourceIdentifier": "sirt@juniper.net", "published": "2019-04-10T20:29:00.850", - "lastModified": "2021-10-25T16:19:19.683", + "lastModified": "2024-02-09T03:16:30.397", "vulnStatus": "Analyzed", "descriptions": [ { @@ -218,51 +218,6 @@ "versionStartIncluding": "18.3", "versionEndExcluding": "18.3r1-s1", "matchCriteriaId": "2220DA95-2D2E-487B-8907-4E692B2489C7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:15.1r7-s3:*:*:*:*:*:*:*", - "matchCriteriaId": "E299F853-F3AB-4A89-B7CE-3D370EB38AAD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:15.1x53-d69:*:*:*:*:*:*:*", - "matchCriteriaId": "BEB6630C-F491-4432-8D0D-D5796205D90C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:15.1x53-d495:*:*:*:*:*:*:*", - "matchCriteriaId": "699D950D-2C6F-4A3E-B03A-119A233DDA81" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:15.1x53-d591:*:*:*:*:*:*:*", - "matchCriteriaId": "98AD3323-6DA0-43AD-98CC-5809F800E699" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:16.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2AC40ABB-E364-46C9-A904-C0ED02806250" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:17.1:*:*:*:*:*:*:*", - "matchCriteriaId": "50B47EC5-0276-4799-B536-12B33B5F003B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:17.2r3-s1:*:*:*:*:*:*:*", - "matchCriteriaId": "912E40E5-AE6E-4481-86DC-51534B501072" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:17.4:*:*:*:*:*:*:*", - "matchCriteriaId": "974B6128-ABD2-4D9C-87A1-5F1740DDCB95" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:18.1:*:*:*:*:*:*:*", - "matchCriteriaId": "BBF736F6-ED05-4DC1-96FB-3F35BA5B3EFD" } ] } @@ -274,6 +229,7 @@ "url": "http://www.securityfocus.com/bid/107899", "source": "sirt@juniper.net", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] diff --git a/CVE-2019/CVE-2019-124xx/CVE-2019-12496.json b/CVE-2019/CVE-2019-124xx/CVE-2019-12496.json index 398c0b49560..fe1142a9a06 100644 --- a/CVE-2019/CVE-2019-124xx/CVE-2019-12496.json +++ b/CVE-2019/CVE-2019-124xx/CVE-2019-12496.json @@ -2,7 +2,7 @@ "id": "CVE-2019-12496", "sourceIdentifier": "cve@mitre.org", "published": "2019-05-31T11:29:02.733", - "lastModified": "2019-05-31T14:29:35.293", + "lastModified": "2024-02-09T03:20:19.517", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -98,16 +98,14 @@ "url": "https://github.com/hybridgroup/gobot/compare/ed53198...7f973df", "source": "cve@mitre.org", "tags": [ - "Patch", - "Third Party Advisory" + "Patch" ] }, { "url": "https://github.com/hybridgroup/gobot/releases/tag/v1.13.0", "source": "cve@mitre.org", "tags": [ - "Release Notes", - "Third Party Advisory" + "Release Notes" ] } ] diff --git a/CVE-2020/CVE-2020-45xx/CVE-2020-4574.json b/CVE-2020/CVE-2020-45xx/CVE-2020-4574.json index 94eb2038dc8..5986988759e 100644 --- a/CVE-2020/CVE-2020-45xx/CVE-2020-4574.json +++ b/CVE-2020/CVE-2020-45xx/CVE-2020-4574.json @@ -2,7 +2,7 @@ "id": "CVE-2020-4574", "sourceIdentifier": "psirt@us.ibm.com", "published": "2020-07-29T14:15:13.397", - "lastModified": "2020-07-30T12:59:07.660", + "lastModified": "2024-02-09T03:16:35.507", "vulnStatus": "Analyzed", "descriptions": [ { @@ -124,6 +124,7 @@ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/184181", "source": "psirt@us.ibm.com", "tags": [ + "Third Party Advisory", "VDB Entry" ] }, diff --git a/CVE-2021/CVE-2021-259xx/CVE-2021-25926.json b/CVE-2021/CVE-2021-259xx/CVE-2021-25926.json index 8967da8f5b5..cae56d7744b 100644 --- a/CVE-2021/CVE-2021-259xx/CVE-2021-25926.json +++ b/CVE-2021/CVE-2021-259xx/CVE-2021-25926.json @@ -2,8 +2,8 @@ "id": "CVE-2021-25926", "sourceIdentifier": "vulnerabilitylab@mend.io", "published": "2021-04-12T14:15:16.413", - "lastModified": "2023-11-07T03:31:31.817", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:12:43.137", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -85,14 +85,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:sickrage:sickrage:*:*:*:*:*:*:*:*", - "versionStartIncluding": "9.3.55", - "versionEndIncluding": "10.0.11", - "matchCriteriaId": "A1C31FB1-4641-47C8-9549-133F23022087" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sickrage:sickrage:9.3.54:dev1:*:*:*:*:*:*", - "matchCriteriaId": "85A76B51-B436-44F0-B25E-BFC0EA9D57EC" + "versionStartIncluding": "9.3.54", + "versionEndExcluding": "10.0.11", + "matchCriteriaId": "EE3C8187-9890-40AF-80B2-3B005E12249F" }, { "vulnerable": true, @@ -115,7 +110,12 @@ }, { "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25926%2C", - "source": "vulnerabilitylab@mend.io" + "source": "vulnerabilitylab@mend.io", + "tags": [ + "Exploit", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-299xx/CVE-2022-29951.json b/CVE-2022/CVE-2022-299xx/CVE-2022-29951.json index a6ef474c862..06ef747ea11 100644 --- a/CVE-2022/CVE-2022-299xx/CVE-2022-29951.json +++ b/CVE-2022/CVE-2022-299xx/CVE-2022-29951.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29951", "sourceIdentifier": "cve@mitre.org", "published": "2022-07-26T22:15:10.800", - "lastModified": "2022-08-02T19:49:16.797", + "lastModified": "2024-02-09T03:16:09.380", "vulnStatus": "Analyzed", "descriptions": [ { diff --git a/CVE-2022/CVE-2022-299xx/CVE-2022-29952.json b/CVE-2022/CVE-2022-299xx/CVE-2022-29952.json index a25ff066cff..93943ed3654 100644 --- a/CVE-2022/CVE-2022-299xx/CVE-2022-29952.json +++ b/CVE-2022/CVE-2022-299xx/CVE-2022-29952.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29952", "sourceIdentifier": "cve@mitre.org", "published": "2022-07-26T22:15:10.843", - "lastModified": "2022-08-02T20:53:46.357", + "lastModified": "2024-02-09T03:16:01.237", "vulnStatus": "Analyzed", "descriptions": [ { diff --git a/CVE-2022/CVE-2022-303xx/CVE-2022-30319.json b/CVE-2022/CVE-2022-303xx/CVE-2022-30319.json index c04a7ec5f84..59eb95e527b 100644 --- a/CVE-2022/CVE-2022-303xx/CVE-2022-30319.json +++ b/CVE-2022/CVE-2022-303xx/CVE-2022-30319.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30319", "sourceIdentifier": "cve@mitre.org", "published": "2022-07-28T16:15:11.500", - "lastModified": "2022-08-10T14:12:49.247", + "lastModified": "2024-02-09T03:27:04.150", "vulnStatus": "Analyzed", "descriptions": [ { @@ -45,7 +45,7 @@ "description": [ { "lang": "en", - "value": "CWE-287" + "value": "CWE-290" } ] } diff --git a/CVE-2022/CVE-2022-312xx/CVE-2022-31260.json b/CVE-2022/CVE-2022-312xx/CVE-2022-31260.json index f325814939e..40f736ad955 100644 --- a/CVE-2022/CVE-2022-312xx/CVE-2022-31260.json +++ b/CVE-2022/CVE-2022-312xx/CVE-2022-31260.json @@ -2,7 +2,7 @@ "id": "CVE-2022-31260", "sourceIdentifier": "cve@mitre.org", "published": "2022-07-17T20:15:08.360", - "lastModified": "2022-07-25T22:13:00.363", + "lastModified": "2024-02-09T03:16:13.837", "vulnStatus": "Analyzed", "descriptions": [ { @@ -45,7 +45,7 @@ "description": [ { "lang": "en", - "value": "CWE-668" + "value": "CWE-306" } ] } diff --git a/CVE-2022/CVE-2022-354xx/CVE-2022-35411.json b/CVE-2022/CVE-2022-354xx/CVE-2022-35411.json index 0f1f3bfb918..a8e04b3f058 100644 --- a/CVE-2022/CVE-2022-354xx/CVE-2022-35411.json +++ b/CVE-2022/CVE-2022-354xx/CVE-2022-35411.json @@ -2,8 +2,8 @@ "id": "CVE-2022-35411", "sourceIdentifier": "cve@mitre.org", "published": "2022-07-08T19:15:08.700", - "lastModified": "2023-11-07T03:49:18.267", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T03:16:18.977", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-502" + "value": "CWE-522" } ] } @@ -116,12 +116,16 @@ "url": "https://github.com/ehtec/rpcpy-exploit", "source": "cve@mitre.org", "tags": [ + "Exploit", "Third Party Advisory" ] }, { "url": "https://medium.com/%40elias.hohl/remote-code-execution-0-day-in-rpc-py-709c76690c30", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-436xx/CVE-2023-43609.json b/CVE-2023/CVE-2023-436xx/CVE-2023-43609.json new file mode 100644 index 00000000000..c33e986d979 --- /dev/null +++ b/CVE-2023/CVE-2023-436xx/CVE-2023-43609.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-43609", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2024-02-09T04:15:07.583", + "lastModified": "2024-02-09T04:15:07.583", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\n\n\n\n\n\n\nIn Emerson Rosemount GC370XA, GC700XA, and GC1500XA products, an unauthenticated user with network access could obtain access to sensitive information or cause a denial-of-service condition.\n\n\n\n\n\n\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-030-01", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.emerson.com/documents/automation/security-notification-emerson-gas-chromatographs-cyber-security-notification-icsa-24-030-01-en-10103910.pdf", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46687.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46687.json new file mode 100644 index 00000000000..0f8fb8def6a --- /dev/null +++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46687.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-46687", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2024-02-09T04:15:07.813", + "lastModified": "2024-02-09T04:15:07.813", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\n\n\nIn Emerson Rosemount GC370XA, GC700XA, and GC1500XA products, an unauthenticated user with network access could execute arbitrary commands in root context from a remote computer.\n\n\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-030-01", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.emerson.com/documents/automation/security-notification-emerson-gas-chromatographs-cyber-security-notification-icsa-24-030-01-en-10103910.pdf", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-497xx/CVE-2023-49716.json b/CVE-2023/CVE-2023-497xx/CVE-2023-49716.json new file mode 100644 index 00000000000..d64b03a126e --- /dev/null +++ b/CVE-2023/CVE-2023-497xx/CVE-2023-49716.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-49716", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2024-02-09T04:15:08.007", + "lastModified": "2024-02-09T04:15:08.007", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\nIn Emerson Rosemount GC370XA, GC700XA, and GC1500XA products, an authenticated user with network access could run arbitrary commands from a remote computer.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-030-01", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.emerson.com/documents/automation/security-notification-emerson-gas-chromatographs-cyber-security-notification-icsa-24-030-01-en-10103910.pdf", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51698.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51698.json index 0090e08dc8d..827bdb2b1a0 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51698.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51698.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51698", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-12T21:15:10.150", - "lastModified": "2024-01-27T03:15:07.783", + "lastModified": "2024-02-09T03:15:09.000", "vulnStatus": "Modified", "descriptions": [ { @@ -104,6 +104,10 @@ "Vendor Advisory" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT3UIQOSZ6UNH5QTFOOY2DJ4MITM2C2C/", + "source": "security-advisories@github.com" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZKXNZ3HGH6KH65OEKVCEAOZJWNZ32FQ/", "source": "security-advisories@github.com" diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51761.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51761.json new file mode 100644 index 00000000000..c11f228a3b9 --- /dev/null +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51761.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-51761", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2024-02-09T04:15:08.210", + "lastModified": "2024-02-09T04:15:08.210", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\n\n\n\n\nIn Emerson Rosemount GC370XA, GC700XA, and GC1500XA products, an unauthenticated user with network access could bypass authentication and acquire admin capabilities.\n\n\n\n\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-030-01", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.emerson.com/documents/automation/security-notification-emerson-gas-chromatographs-cyber-security-notification-icsa-24-030-01-en-10103910.pdf", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5981.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5981.json index 0e2210b55da..f82820733c5 100644 --- a/CVE-2023/CVE-2023-59xx/CVE-2023-5981.json +++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5981.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5981", "sourceIdentifier": "secalert@redhat.com", "published": "2023-11-28T12:15:07.040", - "lastModified": "2024-01-29T16:15:08.063", + "lastModified": "2024-02-09T03:15:09.133", "vulnStatus": "Modified", "descriptions": [ { @@ -185,6 +185,10 @@ "Vendor Advisory" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/", + "source": "secalert@redhat.com" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0553.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0553.json index 36565870a61..391b50374f1 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0553.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0553.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0553", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-16T12:15:45.557", - "lastModified": "2024-02-02T14:15:54.243", + "lastModified": "2024-02-09T03:15:09.317", "vulnStatus": "Modified", "descriptions": [ { @@ -174,6 +174,10 @@ "Vendor Advisory" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/", + "source": "secalert@redhat.com" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0567.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0567.json index dbc35a00909..b37436791f7 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0567.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0567.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0567", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-16T14:15:48.527", - "lastModified": "2024-02-02T14:15:54.373", + "lastModified": "2024-02-09T03:15:09.447", "vulnStatus": "Modified", "descriptions": [ { @@ -137,6 +137,10 @@ "Vendor Advisory" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/", + "source": "secalert@redhat.com" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21399.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21399.json index 13454fcad90..ae55a35ba73 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21399.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21399.json @@ -2,12 +2,16 @@ "id": "CVE-2024-21399", "sourceIdentifier": "secure@microsoft.com", "published": "2024-02-02T01:15:08.970", - "lastModified": "2024-02-02T01:57:57.640", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T03:00:47.227", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de Microsoft Edge (basado en Chromium)" } ], "metrics": { @@ -34,10 +38,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*", + "versionEndExcluding": "121.0.2277.98", + "matchCriteriaId": "A62F7A19-DCD7-4AF2-BC20-B6F1541BCED1" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21399", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23334.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23334.json index 93b531bcb38..c5b6c681ef9 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23334.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23334.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23334", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-29T23:15:08.563", - "lastModified": "2024-02-05T18:44:40.053", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T03:15:09.603", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -128,6 +128,10 @@ "Vendor Advisory" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICUOCFGTB25WUT336BZ4UNYLSZOUVKBD/", + "source": "security-advisories@github.com" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXWVZIVAYWEBHNRIILZVB3R3SDQNNAA7/", "source": "security-advisories@github.com", diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23829.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23829.json index b0571a1f037..8f73c6ff866 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23829.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23829.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23829", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-29T23:15:08.767", - "lastModified": "2024-02-06T18:38:53.870", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T03:15:09.727", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -127,6 +127,10 @@ "Vendor Advisory" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICUOCFGTB25WUT336BZ4UNYLSZOUVKBD/", + "source": "security-advisories@github.com" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXWVZIVAYWEBHNRIILZVB3R3SDQNNAA7/", "source": "security-advisories@github.com", diff --git a/README.md b/README.md index e1518dba4a8..0e3e974bc54 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-02-09T03:00:24.960458+00:00 +2024-02-09T05:00:25.262408+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-02-09T02:54:11.277000+00:00 +2024-02-09T04:15:08.210000+00:00 ``` ### Last Data Feed Release @@ -29,54 +29,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -238003 +238007 ``` ### CVEs added in the last Commit -Recently added CVEs: `10` +Recently added CVEs: `4` -* [CVE-2023-32341](CVE-2023/CVE-2023-323xx/CVE-2023-32341.json) (`2024-02-09T01:15:08.033`) -* [CVE-2023-42016](CVE-2023/CVE-2023-420xx/CVE-2023-42016.json) (`2024-02-09T01:15:08.260`) -* [CVE-2023-45187](CVE-2023/CVE-2023-451xx/CVE-2023-45187.json) (`2024-02-09T01:15:08.493`) -* [CVE-2023-45190](CVE-2023/CVE-2023-451xx/CVE-2023-45190.json) (`2024-02-09T01:15:08.707`) -* [CVE-2023-45191](CVE-2023/CVE-2023-451xx/CVE-2023-45191.json) (`2024-02-09T01:15:08.890`) -* [CVE-2024-1353](CVE-2024/CVE-2024-13xx/CVE-2024-1353.json) (`2024-02-09T01:15:09.140`) -* [CVE-2024-22318](CVE-2024/CVE-2024-223xx/CVE-2024-22318.json) (`2024-02-09T01:15:09.440`) -* [CVE-2024-22332](CVE-2024/CVE-2024-223xx/CVE-2024-22332.json) (`2024-02-09T01:15:09.650`) -* [CVE-2024-23639](CVE-2024/CVE-2024-236xx/CVE-2024-23639.json) (`2024-02-09T01:15:09.867`) -* [CVE-2024-24819](CVE-2024/CVE-2024-248xx/CVE-2024-24819.json) (`2024-02-09T01:15:10.080`) +* [CVE-2023-43609](CVE-2023/CVE-2023-436xx/CVE-2023-43609.json) (`2024-02-09T04:15:07.583`) +* [CVE-2023-46687](CVE-2023/CVE-2023-466xx/CVE-2023-46687.json) (`2024-02-09T04:15:07.813`) +* [CVE-2023-49716](CVE-2023/CVE-2023-497xx/CVE-2023-49716.json) (`2024-02-09T04:15:08.007`) +* [CVE-2023-51761](CVE-2023/CVE-2023-517xx/CVE-2023-51761.json) (`2024-02-09T04:15:08.210`) ### CVEs modified in the last Commit -Recently modified CVEs: `112` +Recently modified CVEs: `72` -* [CVE-2024-20003](CVE-2024/CVE-2024-200xx/CVE-2024-20003.json) (`2024-02-09T02:01:04.183`) -* [CVE-2024-20002](CVE-2024/CVE-2024-200xx/CVE-2024-20002.json) (`2024-02-09T02:01:37.090`) -* [CVE-2024-20001](CVE-2024/CVE-2024-200xx/CVE-2024-20001.json) (`2024-02-09T02:02:13.153`) -* [CVE-2024-20004](CVE-2024/CVE-2024-200xx/CVE-2024-20004.json) (`2024-02-09T02:04:19.843`) -* [CVE-2024-20006](CVE-2024/CVE-2024-200xx/CVE-2024-20006.json) (`2024-02-09T02:04:52.490`) -* [CVE-2024-20007](CVE-2024/CVE-2024-200xx/CVE-2024-20007.json) (`2024-02-09T02:05:10.947`) -* [CVE-2024-20009](CVE-2024/CVE-2024-200xx/CVE-2024-20009.json) (`2024-02-09T02:05:28.177`) -* [CVE-2024-20010](CVE-2024/CVE-2024-200xx/CVE-2024-20010.json) (`2024-02-09T02:05:47.917`) -* [CVE-2024-20011](CVE-2024/CVE-2024-200xx/CVE-2024-20011.json) (`2024-02-09T02:06:03.160`) -* [CVE-2024-20012](CVE-2024/CVE-2024-200xx/CVE-2024-20012.json) (`2024-02-09T02:06:22.713`) -* [CVE-2024-20013](CVE-2024/CVE-2024-200xx/CVE-2024-20013.json) (`2024-02-09T02:06:40.570`) -* [CVE-2024-20015](CVE-2024/CVE-2024-200xx/CVE-2024-20015.json) (`2024-02-09T02:06:59.953`) -* [CVE-2024-20016](CVE-2024/CVE-2024-200xx/CVE-2024-20016.json) (`2024-02-09T02:07:50.523`) -* [CVE-2024-24004](CVE-2024/CVE-2024-240xx/CVE-2024-24004.json) (`2024-02-09T02:10:07.263`) -* [CVE-2024-24002](CVE-2024/CVE-2024-240xx/CVE-2024-24002.json) (`2024-02-09T02:10:13.973`) -* [CVE-2024-24001](CVE-2024/CVE-2024-240xx/CVE-2024-24001.json) (`2024-02-09T02:10:25.807`) -* [CVE-2024-0408](CVE-2024/CVE-2024-04xx/CVE-2024-0408.json) (`2024-02-09T02:15:08.383`) -* [CVE-2024-0409](CVE-2024/CVE-2024-04xx/CVE-2024-0409.json) (`2024-02-09T02:15:08.533`) -* [CVE-2024-0749](CVE-2024/CVE-2024-07xx/CVE-2024-0749.json) (`2024-02-09T02:15:08.690`) -* [CVE-2024-1283](CVE-2024/CVE-2024-12xx/CVE-2024-1283.json) (`2024-02-09T02:15:08.810`) -* [CVE-2024-1284](CVE-2024/CVE-2024-12xx/CVE-2024-1284.json) (`2024-02-09T02:15:08.883`) -* [CVE-2024-23206](CVE-2024/CVE-2024-232xx/CVE-2024-23206.json) (`2024-02-09T02:15:08.950`) -* [CVE-2024-23213](CVE-2024/CVE-2024-232xx/CVE-2024-23213.json) (`2024-02-09T02:15:09.080`) -* [CVE-2024-23222](CVE-2024/CVE-2024-232xx/CVE-2024-23222.json) (`2024-02-09T02:15:09.197`) -* [CVE-2024-20955](CVE-2024/CVE-2024-209xx/CVE-2024-20955.json) (`2024-02-09T02:26:25.517`) +* [CVE-2009-1532](CVE-2009/CVE-2009-15xx/CVE-2009-1532.json) (`2024-02-09T03:22:27.067`) +* [CVE-2009-1721](CVE-2009/CVE-2009-17xx/CVE-2009-1721.json) (`2024-02-09T03:22:38.687`) +* [CVE-2009-2768](CVE-2009/CVE-2009-27xx/CVE-2009-2768.json) (`2024-02-09T03:22:43.770`) +* [CVE-2009-0040](CVE-2009/CVE-2009-00xx/CVE-2009-0040.json) (`2024-02-09T03:25:43.877`) +* [CVE-2009-0269](CVE-2009/CVE-2009-02xx/CVE-2009-0269.json) (`2024-02-09T03:26:02.317`) +* [CVE-2011-0199](CVE-2011/CVE-2011-01xx/CVE-2011-0199.json) (`2024-02-09T03:18:23.823`) +* [CVE-2012-5821](CVE-2012/CVE-2012-58xx/CVE-2012-5821.json) (`2024-02-09T03:18:43.307`) +* [CVE-2014-1266](CVE-2014/CVE-2014-12xx/CVE-2014-1266.json) (`2024-02-09T03:19:52.270`) +* [CVE-2015-8854](CVE-2015/CVE-2015-88xx/CVE-2015-8854.json) (`2024-02-09T03:01:53.227`) +* [CVE-2019-0039](CVE-2019/CVE-2019-00xx/CVE-2019-0039.json) (`2024-02-09T03:16:30.397`) +* [CVE-2019-12496](CVE-2019/CVE-2019-124xx/CVE-2019-12496.json) (`2024-02-09T03:20:19.517`) +* [CVE-2020-4574](CVE-2020/CVE-2020-45xx/CVE-2020-4574.json) (`2024-02-09T03:16:35.507`) +* [CVE-2021-25926](CVE-2021/CVE-2021-259xx/CVE-2021-25926.json) (`2024-02-09T03:12:43.137`) +* [CVE-2022-29952](CVE-2022/CVE-2022-299xx/CVE-2022-29952.json) (`2024-02-09T03:16:01.237`) +* [CVE-2022-29951](CVE-2022/CVE-2022-299xx/CVE-2022-29951.json) (`2024-02-09T03:16:09.380`) +* [CVE-2022-31260](CVE-2022/CVE-2022-312xx/CVE-2022-31260.json) (`2024-02-09T03:16:13.837`) +* [CVE-2022-35411](CVE-2022/CVE-2022-354xx/CVE-2022-35411.json) (`2024-02-09T03:16:18.977`) +* [CVE-2022-30319](CVE-2022/CVE-2022-303xx/CVE-2022-30319.json) (`2024-02-09T03:27:04.150`) +* [CVE-2023-51698](CVE-2023/CVE-2023-516xx/CVE-2023-51698.json) (`2024-02-09T03:15:09.000`) +* [CVE-2023-5981](CVE-2023/CVE-2023-59xx/CVE-2023-5981.json) (`2024-02-09T03:15:09.133`) +* [CVE-2024-21399](CVE-2024/CVE-2024-213xx/CVE-2024-21399.json) (`2024-02-09T03:00:47.227`) +* [CVE-2024-0553](CVE-2024/CVE-2024-05xx/CVE-2024-0553.json) (`2024-02-09T03:15:09.317`) +* [CVE-2024-0567](CVE-2024/CVE-2024-05xx/CVE-2024-0567.json) (`2024-02-09T03:15:09.447`) +* [CVE-2024-23334](CVE-2024/CVE-2024-233xx/CVE-2024-23334.json) (`2024-02-09T03:15:09.603`) +* [CVE-2024-23829](CVE-2024/CVE-2024-238xx/CVE-2024-23829.json) (`2024-02-09T03:15:09.727`) ## Download and Usage