mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-02-09T05:00:25.262408+00:00
This commit is contained in:
parent
2a2f2898fd
commit
3390df78b5
@ -2,8 +2,8 @@
|
||||
"id": "CVE-1999-0046",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "1997-02-06T05:00:00.000",
|
||||
"lastModified": "2022-08-17T07:15:09.560",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:19:37.180",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -44,42 +44,12 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:data_general:dg_ux:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE3A815C-B264-4B1F-8243-894C21F8D1EA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:data_general:dg_ux:2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FDB5057F-A306-4250-B247-701948713AD8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:data_general:dg_ux:3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D7E43C99-DEC8-4519-90A9-ADBAA56B99C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:data_general:dg_ux:4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BEC4E336-7290-4FF2-BB71-A1ABDA3283D5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
@ -113,68 +83,8 @@
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:digital:ultrix:2.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2CF862B0-24FF-4BAE-9687-981C3491D567"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:digital:ultrix:3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "944F5BF5-F48F-4EFE-A929-D6BDEF561C28"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:digital:ultrix:4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "18EE0235-30CD-4104-ADB8-45AA5B3CBC3A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:digital:ultrix:4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0699893A-AE83-4605-BF2B-FC0C17BF2A69"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:digital:ultrix:4.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "08B83DF0-860D-4A8C-ACA7-A1A68D81B8DB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:digital:ultrix:4.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "75521BE7-13C8-416B-A4E1-98BB321FAB26"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:digital:ultrix:4.3a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C1E9DB14-F083-4F54-AC49-62A20D206803"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:digital:ultrix:4.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E447AB53-09AE-4CB1-8582-0FC4A5523775"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:digital:ultrix:4.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "48B61776-3055-40C9-B446-7E544DE7E87E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:digital:unix:3.2g:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BD4B2280-5114-4CBD-9B06-221BD9CE4229"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:digital:unix:4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E1E08495-C0C5-40A9-A8FF-834F5F6083B3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:digital:unix:4.0a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "781D13E2-35BB-4D58-A68F-86401D08D438"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:digital:unix:4.0b:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "07476CFD-859F-4AD7-8514-130E7A86BAE5"
|
||||
"criteria": "cpe:2.3:o:digital:ultrix:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8D2066A9-7DAE-403C-8C12-5414C6770F8D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -298,68 +208,33 @@
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:next:nextstep:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4902BDC4-9FEC-4EB9-9D93-54FF81AF138C"
|
||||
"criteria": "cpe:2.3:o:next:nextstep:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8772D1A6-9458-499F-B9E7-758A6DA735B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:next:nextstep:1.0a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D9583554-25FF-46B5-BFA6-5B0F3CEDA725"
|
||||
"criteria": "cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "91F372EA-3A78-4703-A457-751B2C98D796"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:next:nextstep:2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "286C0359-C286-4CA8-B017-046FCE58B544"
|
||||
"criteria": "cpe:2.3:o:oracle:solaris:2.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A57664FD-9E75-4F9B-92C4-7D85A263D04B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:next:nextstep:2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F2D08ADE-122E-4836-9335-96D153E39128"
|
||||
"criteria": "cpe:2.3:o:oracle:solaris:2.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "69C7B4A8-E8D0-425C-B979-17E85458B0C6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:next:nextstep:3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BC203236-BBF4-4D76-B17F-EF03472DBB7D"
|
||||
"criteria": "cpe:2.3:o:oracle:solaris:7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F538D2B-1AE1-4766-830E-CF7999181128"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:next:nextstep:3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "79392496-3278-4759-8269-3C22F97BEC15"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:next:nextstep:3.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E30E1606-E633-45AE-AC3B-4CEC9BB009CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:next:nextstep:3.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1D10FFF9-B15E-451A-AD55-5E949A351585"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:next:nextstep:4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1FEE8CF7-908D-4E24-A2BA-B58BF4031C9E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*",
|
||||
"matchCriteriaId": "1F881110-7B54-49DA-B23A-710273430C44"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*",
|
||||
"matchCriteriaId": "200D8CB2-0D52-40A8-9CD9-6E4513605201"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*",
|
||||
"matchCriteriaId": "54AF87E4-52A4-44CA-B48E-A5BB139E6410"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*",
|
||||
"matchCriteriaId": "F66BAF35-A8B9-4E95-B270-444206FDD35B"
|
||||
"criteria": "cpe:2.3:o:oracle:solaris:8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "722A52CF-4C6E-44D3-90C4-D2F72A40EF58"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -399,7 +274,11 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0046",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-1999-1152",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "1998-06-03T04:00:00.000",
|
||||
"lastModified": "2016-10-18T02:01:45.917",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:15:08.037",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,13 +66,14 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-307"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -58,8 +81,19 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:h:compaq_microcom:microcom_6000_access_integrator:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9034E278-C405-43E2-94E0-D8D6F7CE8B09"
|
||||
"criteria": "cpe:2.3:o:compaq:microcom_6000_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15D5A948-4AC0-458B-BE97-9645C403B476"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:compaq:microcom_6000:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4591EAE6-42A5-409D-A480-7B80CE152043"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -69,7 +103,10 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=90296493106214&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-1999-1324",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "1999-12-31T05:00:00.000",
|
||||
"lastModified": "2017-10-10T01:29:05.653",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:15:13.613",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-307"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,13 +80,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dec:dec_openvms_vax:5.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B7A9C111-7745-41F2-A020-7F53C69DF2D7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dec:dec_openvms_vax:5.5.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E2E763B2-BB89-4E5C-98BA-7252FF90C37B"
|
||||
"criteria": "cpe:2.3:o:hp:openvms_vax:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.3",
|
||||
"versionEndIncluding": "5.5.2",
|
||||
"matchCriteriaId": "8EC148C6-C2CE-4347-AB6A-6B58C84CDF77"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -76,13 +95,20 @@
|
||||
"url": "http://ciac.llnl.gov/ciac/bulletins/d-06.shtml",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"US Government Resource",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7225",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2000-0944",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2000-12-19T05:00:00.000",
|
||||
"lastModified": "2017-10-10T01:29:23.967",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:15:18.653",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-522"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,8 +80,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cgi_script_center:news_update:1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE82C697-800F-4BCE-8105-C267B72C20FA"
|
||||
"criteria": "cpe:2.3:a:cgi:script_center_news_update:1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "27376C80-C1F3-41D3-844F-0BE1C05E4E7D"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -71,6 +93,7 @@
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0402.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -78,13 +101,20 @@
|
||||
"url": "http://www.securityfocus.com/bid/1881",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5433",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2000-1094",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2001-01-09T05:00:00.000",
|
||||
"lastModified": "2016-10-18T02:08:37.423",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:20:04.147",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -44,7 +44,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,63 +58,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:aol:instant_messenger:2.0_n:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED10DFD8-2532-466D-8EBB-F05081F2935D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:aol:instant_messenger:2.5.1366:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0D371BDC-9E31-4EB1-88E9-82C2976086E1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:aol:instant_messenger:2.5.1598:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "64B46D19-9103-40C5-A6A4-D5BE8DF8276E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:aol:instant_messenger:3.0.1470:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D47319C5-1E96-4AEB-ABA9-638DFF22BD56"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:aol:instant_messenger:3.0_n:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "483C0045-4C10-4120-AB89-C36467993E25"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:aol:instant_messenger:3.5.1635:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7577D890-E06A-477C-80BE-48075FB16437"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:aol:instant_messenger:3.5.1670:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "34B6D42F-9FD9-4E0D-BB59-8E65E817889C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:aol:instant_messenger:3.5.1808:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9C2B7D7B-DB48-458B-9CA5-813782BA600D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:aol:instant_messenger:3.5.1856:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FF19BBC6-C4F2-4636-8650-E178FFD6BF4C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:aol:instant_messenger:4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E00F0805-8C73-43B1-87AC-744434046E59"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:aol:instant_messenger:4.1.2010:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B2707D6-D5EC-4A22-B5E1-2A34913CB3FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:aol:instant_messenger:4.2.1193:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "172E406F-108C-4D9A-80AB-78CDF134C4A8"
|
||||
"criteria": "cpe:2.3:a:aol:aim:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.2229",
|
||||
"matchCriteriaId": "90BDB096-13CB-4E99-B7C6-953B82D6A954"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -124,20 +70,34 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=97668265628917&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=97683774417132&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.atstake.com/research/advisories/2000/a121200-1.txt",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.osvdb.org/1692",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2001-0395",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2001-07-02T04:00:00.000",
|
||||
"lastModified": "2008-09-05T20:24:00.023",
|
||||
"lastModified": "2024-02-09T03:14:07.077",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,13 +66,14 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-307"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -58,8 +81,19 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:h:lightwave:consoleserver:3200:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FC62A9CE-B599-4DD0-B805-9B37E4F3D42F"
|
||||
"criteria": "cpe:2.3:o:lightwavemo:consoleserver_3200_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "154E7000-4A6E-422F-BD39-39CCD1528126"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:lightwavemo:consoleserver_3200:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D570E489-5590-4407-ADFF-58AA53C565AD"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -71,6 +105,7 @@
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-04/0170.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
@ -79,7 +114,10 @@
|
||||
"url": "http://www.securityfocus.com/bid/2578",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2001-1291",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2001-07-12T04:00:00.000",
|
||||
"lastModified": "2017-10-10T01:30:02.077",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:14:12.003",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,13 +66,14 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-307"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -58,8 +81,19 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:h:3com:superstack_ii_ps_hub:40:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B0F8B31D-AA7C-40C1-96F0-639C91C8B726"
|
||||
"criteria": "cpe:2.3:o:3com:superstack_ii_ps_hub_40_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F49F33A2-9F45-483D-ACB2-1D3458F7E1A6"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:3com:superstack_ii_ps_hub_40:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "682AE800-EC04-4A5B-BE9A-46D788654775"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -71,6 +105,9 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/196957",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -78,13 +115,20 @@
|
||||
"url": "http://www.securityfocus.com/bid/3034",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6855",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2001-1339",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2001-05-24T04:00:00.000",
|
||||
"lastModified": "2008-09-05T20:26:17.810",
|
||||
"lastModified": "2024-02-09T03:15:26.757",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,13 +66,14 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-307"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -58,8 +81,19 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:beck_ipc_gmbh:ipc_at_chip_embedded-webserver:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F2F9DC4E-550A-4CC2-BCE9-B16B68DF1AE5"
|
||||
"criteria": "cpe:2.3:o:anybus:ipc\\@chip_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F2C352B1-002E-4AC1-A5A0-2B5689EAE01A"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:anybus:ipc\\@chip:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "28349ED6-BC75-4682-80DC-1FFA0B70DBF3"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -69,12 +103,16 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.iss.net/security_center/static/6605.php",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -82,19 +120,28 @@
|
||||
"url": "http://www.kb.cert.org/vuls/id/198979",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/186418",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/2771",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2002-0628",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2003-01-07T05:00:00.000",
|
||||
"lastModified": "2023-11-07T01:55:51.953",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:14:16.373",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -48,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-307"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -143,12 +165,16 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21089",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.ciac.org/ciac/bulletins/m-123.shtml",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
@ -157,23 +183,34 @@
|
||||
"url": "http://www.iss.net/security_center/static/9349.php",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.polycom.com/common/pw_item_show_doc/0%2C%2C1444%2C00.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/5635",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44241",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2002-0862",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2002-10-04T04:00:00.000",
|
||||
"lastModified": "2021-07-23T12:55:03.667",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:26:26.820",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -21,17 +21,17 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"accessComplexity": "MEDIUM",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 7.5
|
||||
"baseScore": 6.8
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.6,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
@ -48,7 +48,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,144 +62,45 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adam_megacz:tinyssl:1.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F56C6A1-E4A4-4F47-8043-A2695D12A4D5"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "685F1981-EA61-4A00-89F8-A748A88962F8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:kde:konqueror:2.2.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D435E39F-4F70-481B-9225-B072B79BEB69"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_98:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40FC681A-7B85-4495-8DCC-C459FE7E2F13"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:kde:konqueror:3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8AD68BAB-8945-4A22-938E-12C01D0111D0"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_98se:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2354216-8103-49F9-A95C-7DE4F738BBEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:kde:konqueror:3.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7B3220BF-B0AF-4C90-89BD-B425EE58021D"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_me:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5E44D629-D3EB-4F67-BF67-B25910453562"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:kde:konqueror:3.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FA53FB7A-AF7F-45B2-AF23-11B1FC4EC289"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:-:*:*:-:*:*:*",
|
||||
"matchCriteriaId": "4C5FEF8F-FB20-4518-A9ED-412B8E924AA2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:ie_for_macintosh:5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "24AF4E57-D3DF-4D5A-958D-A593454A39A7"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:-:*:*:terminal_server:*:*:*",
|
||||
"matchCriteriaId": "E30F6C9C-3371-44FF-AD0B-3CAA0AB6F1B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:ie_for_macintosh:5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "54861851-0AD7-43C7-AF38-ECE9BD69CAE1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:ie_for_macintosh:5.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BFCB6BED-ACFD-431B-B272-C0954ED203FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E6B8985B-B927-4928-B1DB-18E29F796992"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:5.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3A04FEA6-37B0-44B0-844F-55652ABA1F85"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4D56FB8E-2553-47C1-82A2-9E59023780CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8541EEED-94F4-42F8-9719-57F3EC85D52B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40F8042F-C621-45AE-9F8C-70469579643A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:5.5:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2CD04E07-3664-4D4F-BF3E-6B33AF0F2D12"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D05ED9D0-CF78-4FAD-9371-6FB3D5825148"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A19F6133-25D1-44A5-B6B9-354703436783"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "413C07EA-139F-4B7D-A58B-835BD2591FA0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:office:98:*:mac:*:*:*:*:*",
|
||||
"matchCriteriaId": "36227AF5-8A53-41E3-88E3-5978C22BBAB2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:office:2001:*:macintosh:*:*:*:*:*",
|
||||
"matchCriteriaId": "1B397137-45EC-4856-9F91-0C682BF6990E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:office:2001:sr1:mac_os:*:*:*:*:*",
|
||||
"matchCriteriaId": "68257FB3-3280-4299-A96B-613F60D797C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:office:v.x:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "310DF9B3-3494-4BD4-8A9D-82211EA6C518"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:outlook_express:4.5:*:macos:*:*:*:*:*",
|
||||
"matchCriteriaId": "846A98FC-362A-4C0D-95D9-E4809BA5057E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:outlook_express:5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1F71D6D7-6CB2-4BE9-839A-A5714144029C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:outlook_express:5.0:*:macos:*:*:*:*:*",
|
||||
"matchCriteriaId": "0C607D22-B01D-4404-9657-0D322CE59B0D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:outlook_express:5.0.1:*:macos:*:*:*:*:*",
|
||||
"matchCriteriaId": "A47283EA-513A-4EDC-BADA-659AFA28EA38"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:outlook_express:5.0.2:*:macos:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBA048BD-04A9-4BB9-9F3C-60FB1BE1D2BD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:outlook_express:5.0.3:*:macos:*:*:*:*:*",
|
||||
"matchCriteriaId": "FB6349F9-6C93-48A1-92F6-18BF1D286DF9"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B47EBFCC-1828-45AB-BC6D-FB980929A81A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -207,228 +108,29 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:baltimore_technologies:mailsecure:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "263600BD-C8FA-4A8D-A51B-0DE5BA769FAC"
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C37BA825-679F-4257-9F2B-CE2318B75396"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:kde:kde:2.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EEAE9343-7A7F-4CB0-8CEF-52D61BD689C3"
|
||||
"criteria": "cpe:2.3:a:microsoft:office:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2C6AE930-8EFD-4EE5-AD18-A1205B80DE60"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:kde:kde:2.2.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3F531972-E0A7-4E7C-A899-3766CEAAE2EF"
|
||||
},
|
||||
"criteria": "cpe:2.3:a:microsoft:outlook_express:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DC52CAA4-467E-402C-BC60-AB322FC5786F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:kde:kde:3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4CEED379-3111-4451-B782-8C66CE568A1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:kde:kde:3.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B146FCD3-F6E7-4412-94FD-F9E66089C227"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:kde:kde:3.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "99CB51E4-0BFC-4C7C-B9EE-3DBCB0188D73"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "294EBA01-147B-4DA0-937E-ACBB655EDE53"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4E8B7346-F2AA-434C-A048-7463EC1BB117"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BE1A6107-DE00-4A1C-87FC-9E4015165B5B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_2000_terminal_services:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9D34EFE5-22B7-4E8D-B5B2-2423C37CFFA7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8208AFC9-0EFC-4A90-AD5A-FD94F5542885"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4D4168AE-D19E-482E-8F2B-3E798B2D84E7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B5E149E7-B748-44F6-BB55-68D5BF87AF41"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2D3B703C-79B2-4FA2-9E12-713AB977A880"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AA733AD2-D948-46A0-A063-D29081A56F1F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "799DA395-C7F8-477C-8BC7-5B4B88FB7503"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E53CDA8E-50A8-4509-B070-CCA5604FFB21"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:alpha:*:*:*:*:*",
|
||||
"matchCriteriaId": "1A4FF113-BDCB-472C-A300-3DE5A12A7031"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E7E6AD3-5418-4FEA-84B5-833059CA880D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5BDCBCB8-DAA3-465F-ADDE-9143B8251989"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:alpha:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8E32528-4DA7-4FF8-BBA1-929C5C44FAD4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA262C44-C0E6-493A-B8E5-4D26E4013226"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B86E0671-ED68-4549-B3AC-FD8BD79B0860"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:alpha:*:*:*:*:*",
|
||||
"matchCriteriaId": "3F9C691E-CD79-4D8B-BD35-04BDE4422A4E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB519FE0-9E7D-4E71-8873-356C9D7CEAB5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BB76E7EC-C396-4537-9065-4E815DA7097C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:alpha:*:*:*:*:*",
|
||||
"matchCriteriaId": "0EF2010D-5D16-40A7-B7DE-8168C76E5BDB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:*",
|
||||
"matchCriteriaId": "224F8968-9F4C-4727-AAA3-61F5578EF54C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4CD026E2-B073-40A6-AD4A-8C76B9169B01"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:alpha:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD500955-71F7-41AD-96EE-E8CC6A7FA7A3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:*",
|
||||
"matchCriteriaId": "407DA6E8-0832-49FE-AE14-35C104C237EC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DBFB3E49-3FB5-4947-856D-727CBFFBA543"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:alpha:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC031C07-FA91-426B-9772-64910AE12635"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:*",
|
||||
"matchCriteriaId": "AFE612D2-DF38-404F-AED1-B8C9C24012DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9236480-6450-42E1-B1FF-F336488A683A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:alpha:*:*:*:*:*",
|
||||
"matchCriteriaId": "D97FA0F5-6A53-4E3A-BFCF-1AFF4B83CB37"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:*",
|
||||
"matchCriteriaId": "BCC5E316-FB61-408B-BAA2-7FE03D581250"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "14F55877-A759-4C8A-84D5-70508E449799"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:alpha:*:*:*:*:*",
|
||||
"matchCriteriaId": "C79E6858-BB9C-4229-9DBE-8DA8627D10A4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:terminal_server:*:*:*:*:*",
|
||||
"matchCriteriaId": "2FECD4B0-23A0-4C0B-9888-D28A5941D848"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*",
|
||||
"matchCriteriaId": "91D6D065-A28D-49DA-B7F4-38421FF86498"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*",
|
||||
"matchCriteriaId": "BC176BB0-1655-4BEA-A841-C4158167CC9B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "580B0C9B-DD85-40FA-9D37-BAC0C96D57FC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*",
|
||||
"matchCriteriaId": "4BF263CB-4239-4DB0-867C-9069ED02CAD7"
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -438,35 +140,61 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=102866120821995&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=102918200405308&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=102976967730450&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-050",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9776",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1056",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1332",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2671",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2002-1337",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2003-03-07T05:00:00.000",
|
||||
"lastModified": "2018-10-30T16:26:22.763",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:19:11.660",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -48,7 +48,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,263 +62,23 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:advanced_message_server:1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FABD33DF-FEC4-4519-B2ED-4E498A7329FB"
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "C6D3A2C0-B076-4351-8085-DA3A37117453"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:advanced_message_server:1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2455BE6E-7540-4545-B40A-0366BDA6AE7E"
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.10.0",
|
||||
"versionEndExcluding": "8.11.6",
|
||||
"matchCriteriaId": "5AE239ED-94EE-40C7-9133-D1F4779A2E0C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:2.6:*:nt:*:*:*:*:*",
|
||||
"matchCriteriaId": "3300A5FC-69D9-4F19-AB0E-0273F5ECF45C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:2.6.1:*:nt:*:*:*:*:*",
|
||||
"matchCriteriaId": "EC340D43-0E4D-4365-A604-9DDF3BD62039"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:3.0:*:nt:*:*:*:*:*",
|
||||
"matchCriteriaId": "E43CBCA0-47B1-4992-A636-A0BF4441B91A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:3.0.1:*:nt:*:*:*:*:*",
|
||||
"matchCriteriaId": "2FA4711B-319B-4410-A1B5-C6D8C4B1EC68"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:3.0.2:*:nt:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4981D22-AA6B-4901-95BA-F1BB893828B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:5.59:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5DFC5B8B-9102-46A9-9BD3-5CC0B671383F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:5.61:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "51BC02ED-17B1-44B3-97DB-F626A2BD2524"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:5.65:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EF58EBCB-5735-4569-957D-C37CC38F0823"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D30A1136-074A-460D-9794-DDD530626800"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "76A9602B-8E5A-4BF4-81F5-D1152D09FCAD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EFD0B100-D822-4EBF-8EC9-ADAB8141116B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "196D77DF-E6D4-46D0-BC2C-8804A587CA25"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B743E5A3-6B15-4877-9424-A1F1A4214B73"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:8.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "76A60742-7815-4658-A6F7-147AA48C24B6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9A1A24F2-9C6B-4DF0-AB04-55D051812DD1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "120271B8-08A9-4C21-A108-0DA61095A006"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "84E6ECDA-DF65-47FF-A42F-FD5C1D864FA3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7AA859AF-4E4E-4077-8E98-523E617A1DDC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A9791650-C367-43B6-A0F4-5BB56CE10778"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8340DDA8-77DD-4AEB-B267-F86F64A851B3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "07DCBBEE-1DF0-40FE-B755-1FC35CF16788"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "581626E7-47B5-4819-B34F-B6DFD07A12F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8BBE9A4A-8AB9-4A97-A106-970FEB08952C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BD99394C-5408-4A01-8D4E-417FFFFDE9C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AAB59A24-87DE-4CAD-A2BA-AFCC0B2A55B2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "97D641EF-0B69-45A1-B85E-3C9C93AB9D42"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8972211B-6A5B-4095-9CBB-CEF4C23C9C65"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8F81A2AD-90A0-4B97-86A3-92690A0FCA71"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "598F74BA-2B71-435E-92B8-9DEADB3311A5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "79A46DF2-8EEB-40C8-B1CA-01BC064BD25E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "581E5904-1A2B-49FF-BE3F-D42019AD816B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B6CC4C83-4FB9-4344-AFCB-C260659F81DD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CAF763B4-58E3-4868-8C92-47DE3E4E5F40"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8A4FCB77-7FAC-4A4B-851C-2F352B44D3CB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6FEB3923-8F4B-4523-84F9-17D1CFA37F8C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "58CD19B4-4BFD-4DE8-B21F-6B6CDE6793C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5492A89B-8140-4CF7-BE81-09C25A64373A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B2A6D5AF-2134-4EC5-B53A-CE95B5505325"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1B5FE819-E570-4AEE-BF0C-B9B1960A1AB8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "913AF73A-F6DE-4FAF-8A09-02CD33784B27"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.1.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "661A9B85-09EE-4D38-9160-8EEA6BE07BD7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD930C49-512B-4114-8A97-80B1816CFCFA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7E8553E3-578B-4BE3-BBAD-5589338586E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.2.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7EE5C8E-8E2E-4C98-B8C5-B590E44B1EAC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.2.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2A3930ED-DE49-4F01-A904-5D66E34832F4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.2.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3A51855-94DD-4F2E-BFF8-4ABE4613F962"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "74C77927-A67A-4C1B-BB80-18148E1F0FE0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:3.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9C9D22E3-18F8-42F9-993E-81E832B0B125"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:3.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7BABB5CA-26F4-4DB6-9D43-1C82751DCCA1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sgi:freeware:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7970668-A80C-461D-A779-A8A6880D319B"
|
||||
"criteria": "cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.12.0",
|
||||
"versionEndExcluding": "8.12.8",
|
||||
"matchCriteriaId": "64788C22-64F9-41DB-A4C2-BFCD6DBD8EE6"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -330,6 +90,11 @@
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:h:hp:alphaserver_sc:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5556D665-3792-4832-9EEE-D1122C9BF98E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*",
|
||||
@ -397,28 +162,23 @@
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "34EBF074-78C8-41AF-88F1-DA6726E56F8B"
|
||||
"criteria": "cpe:2.3:o:oracle:solaris:2.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "69C7B4A8-E8D0-425C-B979-17E85458B0C6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*",
|
||||
"matchCriteriaId": "8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"
|
||||
"criteria": "cpe:2.3:o:oracle:solaris:7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F538D2B-1AE1-4766-830E-CF7999181128"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*",
|
||||
"matchCriteriaId": "1894C542-AA81-40A9-BF47-AE24C93C1ACB"
|
||||
"criteria": "cpe:2.3:o:oracle:solaris:8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "722A52CF-4C6E-44D3-90C4-D2F72A40EF58"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*",
|
||||
"matchCriteriaId": "A711CDC2-412C-499D-9FA6-7F25B06267C6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*",
|
||||
"matchCriteriaId": "0B837BB7-5F62-4CD5-9C64-8553C28EA8A7"
|
||||
"criteria": "cpe:2.3:o:oracle:solaris:9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4F864AD7-53A2-4225-870F-062876CE45DD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -458,84 +218,112 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:h:hp:alphaserver_sc:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5556D665-3792-4832-9EEE-D1122C9BF98E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-002.txt.asc",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "ftp://ftp.sco.com/pub/updates/OpenServer/CSSA-2003-SCO.6",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.5",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "ftp://patches.sgi.com/support/free/security/advisories/20030301-01-P",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000571",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2003:028",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=104673778105192&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=104678739608479&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=104678862109841&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=104678862409849&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=104679411316818&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www-1.ibm.com/support/search.wss?rs=0&q=IY40500&apar=only",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www-1.ibm.com/support/search.wss?rs=0&q=IY40501&apar=only",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www-1.ibm.com/support/search.wss?rs=0&q=IY40502&apar=only",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.cert.org/advisories/CA-2003-07.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
@ -543,45 +331,65 @@
|
||||
},
|
||||
{
|
||||
"url": "http://www.debian.org/security/2003/dsa-257",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.iss.net/security_center/static/10748.php",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.kb.cert.org/vuls/id/398025",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2003-073.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2003-074.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2003-227.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/6991",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -589,13 +397,17 @@
|
||||
"url": "http://www.sendmail.org/8.12.8.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2222",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2002-1657",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2002-12-31T05:00:00.000",
|
||||
"lastModified": "2017-07-11T01:29:18.977",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:06:02.117",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-916"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -69,19 +91,32 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://archives.postgresql.org/pgsql-admin/2002-08/msg00253.php",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=111402558115859&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=111403050902165&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20215",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2002-2058",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2002-12-31T05:00:00.000",
|
||||
"lastModified": "2008-09-05T20:32:13.277",
|
||||
"lastModified": "2024-02-09T03:13:12.903",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-327"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,8 +80,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:teekai:teekai_tracking_online:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6CF716C7-4724-4285-B70B-D80DC93AECC2"
|
||||
"criteria": "cpe:2.3:a:teekai:tracking_online:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "523720B9-4867-4CE1-B26B-DCC3B67ADB19"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -67,15 +89,30 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://online.securityfocus.com/archive/82/275246",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.iss.net/security_center/static/9286.php",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/4926",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2002-2227",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2002-12-31T05:00:00.000",
|
||||
"lastModified": "2017-07-29T01:29:00.903",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:26:37.673",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -44,7 +44,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -72,21 +72,36 @@
|
||||
"url": "http://www.rtfm.com/ssldump/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/291329",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/5693",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10087",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2003-0595",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2003-08-27T04:00:00.000",
|
||||
"lastModified": "2008-09-10T19:19:45.913",
|
||||
"lastModified": "2024-02-09T03:18:52.730",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -48,7 +48,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,13 +62,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:witango:tango_server:2000:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "181CC9FA-F528-498D-B213-1507D556DFCC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:witango:witango_server:5.0.1.061:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "661B431E-D000-4B4F-82FE-0671D89293E4"
|
||||
"criteria": "cpe:2.3:a:terascript:wintango_application_server:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.0.1.062",
|
||||
"matchCriteriaId": "21260B88-939C-48A9-BB79-828035DD41E5"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -80,6 +76,7 @@
|
||||
"url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0038.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2003-0721",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2003-09-17T04:00:00.000",
|
||||
"lastModified": "2018-05-03T01:29:22.693",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:14:35.583",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -48,7 +48,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-129"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,68 +62,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:university_of_washington:pine:3.98:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "49E9FC97-FE8B-46E9-BFB5-AC24524CCB97"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:university_of_washington:pine:4.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A5BFF7E7-E49E-466A-A0D3-FDF13596BAF7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:university_of_washington:pine:4.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D405F684-38E2-4AC4-8451-F4842E67C509"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:university_of_washington:pine:4.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "358A71B0-79F2-4728-AC1E-5872BC64B2C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:university_of_washington:pine:4.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16766308-A2F2-4155-A4F7-702808CC9450"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:university_of_washington:pine:4.21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AA9E599F-D922-42B7-9FB5-FB025B095895"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:university_of_washington:pine:4.30:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9F7C068F-1664-4022-B88D-E486EEDD501C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:university_of_washington:pine:4.33:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3F37B4B-C812-46AD-A23B-3FE60D31587D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:university_of_washington:pine:4.44:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8E10453B-C2A8-4203-B8D1-C77D00DE4315"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:university_of_washington:pine:4.50:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9C8E2F32-BEBE-49DA-9A8D-1C9A17CDDDC0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:university_of_washington:pine:4.52:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D9269B2E-4375-41C0-B937-D72EE5EAE4E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:university_of_washington:pine:4.53:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C8E05D27-10F6-43CF-B7E9-73A82DE02953"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:university_of_washington:pine:4.56:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DED052D4-BF8D-4F63-83C4-6F58ADEFE9E0"
|
||||
"criteria": "cpe:2.3:a:washington:pine:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.58",
|
||||
"matchCriteriaId": "6B025441-B8A0-441D-9FB5-E6D9679625D9"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -133,20 +74,30 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009850.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=106329356702508&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=106367213400313&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.idefense.com/advisory/09.10.03.txt",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
@ -156,17 +107,24 @@
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2003-273.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2003-274.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A503",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2003-1229",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2003-12-31T05:00:00.000",
|
||||
"lastModified": "2022-09-13T18:45:57.620",
|
||||
"lastModified": "2024-02-09T03:26:42.917",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -58,293 +58,17 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:java_web_start:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2C1E8E17-C426-424C-82D7-0D54D2B83687"
|
||||
"criteria": "cpe:2.3:a:oracle:jre:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.3.0",
|
||||
"versionEndIncluding": "1.4.1",
|
||||
"matchCriteriaId": "FF497F0F-1E5C-4A09-AFC6-E288A12AC0B5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:java_web_start:1.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2C248C52-F922-458D-9566-0AEA9FEC037A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:java_web_start:1.0.1_01:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D5B745C9-7B4B-4ECD-AE4C-11C332DB08FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:java_web_start:1.0.1_02:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2D1EEB86-E5BB-4034-B9FD-C869F6D069EF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:java_web_start:1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B53966B2-0CC5-4590-A7C7-82252F837A26"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.3:*:solaris:*:*:*:*:*",
|
||||
"matchCriteriaId": "D66D2BCE-FAF5-4F88-A09F-28226C4A98D2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.3.0_02:*:linux:*:*:*:*:*",
|
||||
"matchCriteriaId": "74D5059B-CF4F-4EEE-99B4-B3052831F2A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.3.0_02:*:windows:*:*:*:*:*",
|
||||
"matchCriteriaId": "1F601DB9-596C-4922-AAA1-601B7DF82AF7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.3.0_05:*:linux:*:*:*:*:*",
|
||||
"matchCriteriaId": "6D7E0A15-F9F8-4FE0-99DC-C7F1C4C607DF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.3.0_05:*:windows:*:*:*:*:*",
|
||||
"matchCriteriaId": "2E525A70-8256-4BE9-B9F2-CB4F0005C285"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_01:*:linux:*:*:*:*:*",
|
||||
"matchCriteriaId": "7914F3C3-70D2-4528-8781-74F8EE2A672F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_01:*:solaris:*:*:*:*:*",
|
||||
"matchCriteriaId": "C25FD66C-2B23-4A08-95A9-C026B6C7B334"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_01a:*:windows:*:*:*:*:*",
|
||||
"matchCriteriaId": "4EE03D61-ED9C-4E5A-8B8A-B9DE6D953A59"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_03:*:linux:*:*:*:*:*",
|
||||
"matchCriteriaId": "91C7D131-506C-4AEC-A736-0E4D4C6DFED7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_03:*:solaris:*:*:*:*:*",
|
||||
"matchCriteriaId": "38B09D0A-D9E1-440C-9111-5E04D983F687"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_03:*:windows:*:*:*:*:*",
|
||||
"matchCriteriaId": "7C3BD547-71C6-4A69-9F98-AD082595B6C9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_05:*:linux:*:*:*:*:*",
|
||||
"matchCriteriaId": "4229767D-F6B2-47A2-A1EA-CA86A10ECF17"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_05:*:solaris:*:*:*:*:*",
|
||||
"matchCriteriaId": "AA641432-0B20-4F91-A9C1-804BBE1E05D7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_05:*:windows:*:*:*:*:*",
|
||||
"matchCriteriaId": "2A23F13E-57BD-4D8D-A767-5D8BA4F24A88"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.3_02:*:solaris:*:*:*:*:*",
|
||||
"matchCriteriaId": "96DAF51F-68D8-4462-9DC3-2ECDC026C32F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.3_05:*:solaris:*:*:*:*:*",
|
||||
"matchCriteriaId": "6CB0EEBB-725C-4CBB-8F27-0D497B4DB734"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.4:*:linux:*:*:*:*:*",
|
||||
"matchCriteriaId": "32CA2101-45D2-41D8-A11A-506683EDC0DC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.4:*:solaris:*:*:*:*:*",
|
||||
"matchCriteriaId": "2E449C78-3BFD-4F52-9EE2-3BC5FC27FBCC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.4:*:windows:*:*:*:*:*",
|
||||
"matchCriteriaId": "3C4BAD5A-329C-4C6F-B517-E7C95EEAEB99"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.4.0_02:*:linux:*:*:*:*:*",
|
||||
"matchCriteriaId": "AD97824E-C229-4530-A4E6-C4281E2580C6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.4.0_02:*:solaris:*:*:*:*:*",
|
||||
"matchCriteriaId": "B90BBCB8-7DF5-4801-8B43-197C2FB88823"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.4.0_02:*:windows:*:*:*:*:*",
|
||||
"matchCriteriaId": "666FE53E-C775-4D7D-98E0-C8638B2F2FAA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.4.1:*:linux:*:*:*:*:*",
|
||||
"matchCriteriaId": "C92F64D1-9916-44AC-8025-F116B70CD76A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.4.1:*:solaris:*:*:*:*:*",
|
||||
"matchCriteriaId": "DF21C410-30BF-423D-979F-7B5682573E04"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.4.1:*:windows:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA9FCF82-886A-4C70-8107-FB5BE705DD45"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.3.0:*:solaris:*:*:*:*:*",
|
||||
"matchCriteriaId": "36C3E5A4-7B4E-4DA3-A3B2-33ED7FDB7B0F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.3.0:*:windows:*:*:*:*:*",
|
||||
"matchCriteriaId": "58EC15B8-4653-490D-8F3A-5AA5CDBA1DB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.3.0:update1:linux:*:*:*:*:*",
|
||||
"matchCriteriaId": "51BB57BF-7996-45FE-A406-309ADEC4A052"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.3.0:update2:linux:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B3248A9-A42D-47D7-9EF6-A68BB3F55096"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.3.0:update2:solaris:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F54BFB9-ACE4-4C70-9D5E-C964A37B49D9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.3.0:update2:windows:*:*:*:*:*",
|
||||
"matchCriteriaId": "F2255FF1-CD7F-416E-82CE-727A0D9B9B00"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.3.0:update5:linux:*:*:*:*:*",
|
||||
"matchCriteriaId": "6ED3AE5C-F50B-4ABE-AD92-D6F91E6F1D6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.3.0:update5:solaris:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD448EDD-02A6-4902-8003-2C24490CDDEF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.3.0:update5:windows:*:*:*:*:*",
|
||||
"matchCriteriaId": "6668C814-CF6F-4684-B84E-F0E24C318677"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.3.1:*:linux:*:*:*:*:*",
|
||||
"matchCriteriaId": "AB5A6F28-5B2E-4020-AC22-5FF1AB5DC0F8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.3.1:update1:linux:*:*:*:*:*",
|
||||
"matchCriteriaId": "2458734D-2871-4104-B791-F12218A65CA0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.3.1:update1:solaris:*:*:*:*:*",
|
||||
"matchCriteriaId": "CEB5308E-DFBE-4038-A618-F5448E7B590D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.3.1:update1a:windows:*:*:*:*:*",
|
||||
"matchCriteriaId": "CD25BB5F-16E0-48D8-BD6B-9AAA95EF84F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.3.1_03:*:linux:*:*:*:*:*",
|
||||
"matchCriteriaId": "C1C8FAED-AD0F-4B28-A5EF-DBD6514D60CF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.3.1_03:*:solaris:*:*:*:*:*",
|
||||
"matchCriteriaId": "16C38B5F-673D-47F2-87C6-59B2CBF917BC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.3.1_03:*:windows:*:*:*:*:*",
|
||||
"matchCriteriaId": "78916851-B219-4E06-A35F-EAF3680A8F75"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.3.1_05:*:linux:*:*:*:*:*",
|
||||
"matchCriteriaId": "76CB2CF8-242B-4C09-9B1A-12C39E35AB18"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.3.1_05:*:solaris:*:*:*:*:*",
|
||||
"matchCriteriaId": "7B1A497B-BF46-4B5B-B4C4-1382319F2ACB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.3.1_05:*:windows:*:*:*:*:*",
|
||||
"matchCriteriaId": "2E95B9F6-ADF2-47A5-A0AC-2A129A7A40CB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.4:*:linux:*:*:*:*:*",
|
||||
"matchCriteriaId": "16EB847E-C18B-4B07-940D-C0E312D11365"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.4:*:solaris:*:*:*:*:*",
|
||||
"matchCriteriaId": "68727223-1523-467A-8AAA-ED3E4C6C4B61"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.4:*:windows:*:*:*:*:*",
|
||||
"matchCriteriaId": "682E551B-7B86-4161-84D5-6E1D9664A2A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.4.0_02:*:linux:*:*:*:*:*",
|
||||
"matchCriteriaId": "9E919686-B384-4C33-8264-18B5140BB526"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.4.0_02:*:solaris:*:*:*:*:*",
|
||||
"matchCriteriaId": "A6980636-7B47-4AAF-B261-13E0704FABF6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.4.0_02:*:windows:*:*:*:*:*",
|
||||
"matchCriteriaId": "E14CBB9A-E9A4-4BAF-ADA9-DDCEEC93A0DC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.4.1:*:linux:*:*:*:*:*",
|
||||
"matchCriteriaId": "B2F5A718-AB93-4C7F-80A8-9A90ECE2AC77"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.4.1:*:solaris:*:*:*:*:*",
|
||||
"matchCriteriaId": "C78AAFC5-05A6-47A2-A3B2-1B032C9169F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.4.1:*:windows:*:*:*:*:*",
|
||||
"matchCriteriaId": "8373EE84-FCAE-4CF7-BE9D-9588D05CA827"
|
||||
"criteria": "cpe:2.3:a:sun:java_web_start:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.0",
|
||||
"versionEndIncluding": "1.2",
|
||||
"matchCriteriaId": "0F06D4B3-926F-4D30-ACF7-A9B334E29B11"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -368,6 +92,16 @@
|
||||
"url": "http://java.sun.com/products/jsse/CHANGES.txt",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/7943",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -375,6 +109,7 @@
|
||||
"url": "http://securitytracker.com/id?1006007",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -383,6 +118,7 @@
|
||||
"url": "http://securitytracker.com/id?1007483",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -391,6 +127,7 @@
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-50081-1",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
@ -399,6 +136,7 @@
|
||||
"url": "http://www.securityfocus.com/bid/6682",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
@ -408,6 +146,7 @@
|
||||
"url": "http://www.securitytracker.com/id?1006001",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2004-0366",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2004-05-04T04:00:00.000",
|
||||
"lastModified": "2017-07-11T01:30:06.337",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:14:39.287",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -48,7 +48,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,9 +62,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:leon_j_breedt:pam-pgsql:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "0.5.2",
|
||||
"matchCriteriaId": "BDFBBA0B-216A-46B8-9B49-16A9E9F957A2"
|
||||
"criteria": "cpe:2.3:a:pam-pgsql:pam-pgsql:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.5.2",
|
||||
"matchCriteriaId": "A5C6ACAE-C08D-48B3-8701-AAE917ABD719"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -72,21 +72,38 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://secunia.com/advisories/11237",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.debian.org/security/2004/dsa-469",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/10266",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15651",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2005-0369",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2005-05-02T04:00:00.000",
|
||||
"lastModified": "2016-10-18T03:11:06.860",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:13:32.143",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -44,7 +44,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-129"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,15 +58,15 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:armagetron:armagetron:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:armagetronad:armagetron:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "0.2.6.0",
|
||||
"matchCriteriaId": "5C52FDC9-AC81-4F1F-9112-0C2C2512C308"
|
||||
"matchCriteriaId": "E02DEC87-A8AA-4B60-A528-03A54EFD3899"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:armagetron:armagetron_advanced:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:armagetronad:armagetron_advanced:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "0.2.7.0",
|
||||
"matchCriteriaId": "8EBF70D5-B05E-4EDC-B74B-DD6C45163BBC"
|
||||
"matchCriteriaId": "60E336F6-94E6-4977-9ED0-CDE0E4D8F4D7"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -76,7 +76,10 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=110811699206052&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2005-0408",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2005-02-14T05:00:00.000",
|
||||
"lastModified": "2008-09-10T19:35:31.147",
|
||||
"lastModified": "2024-02-09T03:13:25.890",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-916"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -70,7 +92,10 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031707.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.redteam-pentesting.de/advisories/rt-sa-2005-002.txt",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2005-2946",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2005-09-16T22:03:00.000",
|
||||
"lastModified": "2009-01-07T05:00:00.000",
|
||||
"lastModified": "2024-02-09T03:13:55.780",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,6 +18,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -51,7 +73,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-310"
|
||||
"value": "CWE-327"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -65,228 +87,29 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "14D983EC-61B0-4FD9-89B5-9878E4CE4405"
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.9.8",
|
||||
"matchCriteriaId": "725D1BFE-7122-43F8-A9EC-E1737C7AD73C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "778A6957-455B-420A-BAAF-E7F88FF4FB1E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B5D7BE3C-8CA2-4FB2-B4AE-B201D88C2A9D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BC4C5F05-BC0B-478D-9A6F-7C804777BA41"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "27F417A1-5D97-4BC4-8B97-5AC40236DA21"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8847BD34-BDE6-4AE9-96D9-75B9CF93A6A8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4EDB5A09-BE86-4352-9799-A875649EDB7D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B6231CAA-00A8-41CE-8436-B84518014CF1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A70AD93B-E876-4EAB-9970-752D42E15E99"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F03FA9C0-24C7-46AC-92EC-7834BC34C79B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "716ADA01-38B8-4C15-A3BB-D9688DA30599"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B73326F7-7DCE-4EDE-95D7-AE7AED263A14"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B5E4742C-A983-4F00-B24F-AB280C0E876D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA2D251C-9C45-4EFE-8262-E88AB7CE713A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6D81E175-E698-40EF-9601-425893FFB1FC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FA0F25B7-A172-4300-8718-112E817A6165"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8A0628DF-3A4C-4078-B615-22260671EABF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52B1BE89-BAE0-4656-943B-B9B81D9B54B3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D097222B-ED20-459C-9167-55751FA2C87A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "86DDC8F2-7920-4A73-927E-562C89806972"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "962FCB86-15AD-4399-8B7D-EC1DEA919C59"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0FCA45CE-4127-47AD-BBA8-8A6DD83AE1C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA1CA40-7DB5-4DCA-97A8-9A8CF4FECECC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "180D07AE-C571-4DD6-837C-43E2A946007A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA3E4D2A-6488-4F8B-A3CA-4161A10FA4DB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "90789533-C741-4B1C-A24B-2C77B9E4DE5F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1520065B-46D7-48A4-B9D0-5B49F690C5B4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5B76FE2D-FBE0-4A3B-A0EA-179332D74F0E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2AA526B9-726A-49D5-B3CA-EBE2DA303CA0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "494E48E7-EF86-4860-9A53-94F6C313746E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2636B92E-47D5-42EA-9585-A2B84FBE71CB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "72FE2F46-2D0C-4C90-AFBE-D2E7B496D6E4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "45A518E8-21BE-4C5C-B425-410AB1208E9C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9E3AB748-E463-445C-ABAB-4FEDDFD1878B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "660E4B8D-AABA-4520-BC4D-CF8E76E07C05"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85BFEED5-4941-41BB-93D1-CD5C2A41290E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9644CC68-1E91-45E7-8C53-1E3FC9976A4E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9B1B98C4-1FFD-4A7C-AA86-A34BC6F7AB31"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "73934717-2DA3-4614-A076-D6EDA5EB0626"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "78E79A05-64F3-4397-952C-A5BB950C967D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F7C9E77-1EB2-4720-A8FD-23DC1C877D5A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "549BB01D-F322-4FE3-BDA2-4FEA8ED8568A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DE6CBD6-D6DD-4BC5-93F6-FDEA70163336"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "98693865-2E79-4BD6-9F89-1994BC9A3E73"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D6476506-EC37-4726-82DC-D0E8254A8CDD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5D6ECEF7-CB16-4604-894B-6EB19F1CEF55"
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "42E47538-08EE-4DC1-AC17-883C44CF77BB"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -294,6 +117,13 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.cits.rub.de/MD5Collisions/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.ubuntu.com/usn/usn-179-1",
|
||||
"source": "cve@mitre.org",
|
||||
@ -305,6 +135,8 @@
|
||||
"url": "https://bugzilla.ubuntu.com/show_bug.cgi?id=13593",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2005-3435",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2005-11-02T11:02:00.000",
|
||||
"lastModified": "2017-07-11T01:33:12.017",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:13:36.147",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-522"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -70,11 +92,26 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=113018731120709&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/17310/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22860",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2006-1058",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2006-04-04T10:04:00.000",
|
||||
"lastModified": "2017-10-11T01:30:40.860",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:05:29.307",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -22,6 +22,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -55,7 +77,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-916"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -75,32 +97,113 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:avaya:aura_application_enablement_services:4.01:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA477675-E93D-41F6-A10C-4B6CFBA97C93"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:avaya:aura_application_enablement_services:4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0DBE1432-359B-4250-8381-E24511D24B14"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:avaya:aura_sip_enablement_services:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.0",
|
||||
"matchCriteriaId": "7CCDF311-E2C3-4AAC-83D1-44938370FBFD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:avaya:message_networking:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3D8F6982-2F4D-4D78-92C1-97689D59F3A5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:avaya:messaging_storage_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0",
|
||||
"versionEndExcluding": "4.0",
|
||||
"matchCriteriaId": "9AEA45A8-8768-4CB4-8996-91D7F7AEC9F5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://bugs.busybox.net/view.php?id=604",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/19477",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/25098",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/25848",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-250.htm",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-0244.html",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/17330",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25569",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9483",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2006-3211",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2006-06-24T01:06:00.000",
|
||||
"lastModified": "2018-10-18T16:46:18.173",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:21:27.257",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -37,7 +37,7 @@
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
"userInteractionRequired": true
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -48,7 +48,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,14 +62,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cjguestbook:cjguestbook:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:cjguestbook_project:cjguestbook:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.3",
|
||||
"matchCriteriaId": "C711815A-A4DD-4E5D-A3DB-FC7DB1F7A3F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cjguestbook:cjguestbook:1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7B40858C-7B2D-4853-9919-C02B9FD39E57"
|
||||
"matchCriteriaId": "01B47CAF-4E2B-49B1-8448-0142BBC1D1DF"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -77,25 +72,53 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://secunia.com/advisories/20751",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://securityreason.com/securityalert/1141",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/438008/100/0/threaded",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/18556",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2006/2488",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27322",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2006-3295",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2006-06-29T01:05:00.000",
|
||||
"lastModified": "2018-10-18T16:46:38.187",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:26:31.087",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -37,7 +37,7 @@
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
"userInteractionRequired": true
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -48,7 +48,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,8 +62,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:george_currums:open_guestbook:0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "520FD3FC-4A25-4AD5-A5C0-C388C36D0A63"
|
||||
"criteria": "cpe:2.3:a:georgecurrums:open_guestbook:0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "412F81FE-221A-4B73-9DAB-6D38371190C0"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -71,28 +71,53 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://secunia.com/advisories/20796",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://securityreason.com/securityalert/1166",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/438381/100/0/threaded",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/18666",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2006/2545",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27397",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2006-3568",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2006-07-13T01:05:00.000",
|
||||
"lastModified": "2018-10-18T16:48:01.347",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:20:20.603",
|
||||
"vulnStatus": "Analyzed",
|
||||
"evaluatorSolution": "This vulnerability may also affect versions of this product previous to Fantastic, Guestbook, 2.0.1.",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -38,7 +38,7 @@
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
"userInteractionRequired": true
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,7 +49,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -63,8 +63,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fantastic_scripts:fantastic_guestbook:2.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8F77B8BD-1221-4AC2-B5D2-0894D7A3855A"
|
||||
"criteria": "cpe:2.3:a:fantastic_guestbook_project:fantastic_guestbook:2.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "05926CD3-3E0A-410B-9A06-20C7521458D7"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -76,28 +76,60 @@
|
||||
"url": "http://it.security.netsons.org/exploit/FGB.txt",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/21024",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.osvdb.org/27107",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/440152/100/100/threaded",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/18942",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2006/2762",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27697",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2006-4175",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2007-03-26T23:19:00.000",
|
||||
"lastModified": "2017-07-20T01:32:53.460",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:23:12.537",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -48,7 +48,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-824"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -85,28 +85,64 @@
|
||||
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=491",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/24634",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102853-1",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.osvdb.org/33524",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/23117",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id?1017814",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1090",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33189",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2006-6143",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2006-12-31T05:00:00.000",
|
||||
"lastModified": "2020-01-21T15:45:35.710",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:26:18.233",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,7 +55,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-824"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -105,36 +105,142 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "23E304C9-F780-4358-A58D-1E4C93977704"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://docs.info.apple.com/article.html?artnum=305391",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://fedoranews.org/cms/node/2375",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://fedoranews.org/cms/node/2376",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://osvdb.org/31281",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/23667",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/23696",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/23701",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/23706",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/23707",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/23772",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/23903",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/24966",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200701-21.xml",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://securitytracker.com/id?1017493",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-002-rpc.txt",
|
||||
@ -155,28 +261,48 @@
|
||||
},
|
||||
{
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:008",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/456406/100/0/threaded",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/21970",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.ubuntu.com/usn/usn-408-1",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA07-009B.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
@ -186,24 +312,39 @@
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA07-109A.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2007/0111",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1470",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31422",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.rpath.com/browse/RPL-925",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2007-0681",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2007-02-03T01:28:00.000",
|
||||
"lastModified": "2017-10-19T01:30:03.300",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:13:40.213",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -48,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-522"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,9 +84,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:extcalendar:extcalendar:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:extcalendar_project:extcalendar:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2",
|
||||
"matchCriteriaId": "AA0297AD-BF2A-437E-A9EE-28B52666B48E"
|
||||
"matchCriteriaId": "CB2BC2E7-1A6D-4FF5-ADA7-0E2AAD5C6A3E"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -72,13 +94,29 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://osvdb.org/38130",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32035",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/3239",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2007-1213",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2007-04-04T16:19:00.000",
|
||||
"lastModified": "2018-10-16T16:37:09.673",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:23:20.957",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -48,7 +48,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-824"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -73,27 +73,52 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/466186/100/200/threaded",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/23276",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id?1017845",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1215",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-017",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1797",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2007-2442",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2007-06-26T22:30:00.000",
|
||||
"lastModified": "2021-02-02T18:29:01.460",
|
||||
"lastModified": "2024-02-09T03:23:38.943",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -48,7 +48,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
"value": "CWE-824"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -153,6 +153,141 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://osvdb.org/36596",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/25800",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/25801",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/25814",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/25821",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/25841",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/25870",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/25888",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/25890",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/25894",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/25911",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/26033",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/26228",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/26235",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/26909",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/27706",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/40346",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200707-11.xml",
|
||||
"source": "cve@mitre.org",
|
||||
@ -217,6 +352,7 @@
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-0384.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -224,6 +360,7 @@
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-0562.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -231,6 +368,7 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/472288/100/0/threaded",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -239,6 +377,7 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/472432/100/0/threaded",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -247,6 +386,7 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/472507/30/5970/threaded",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -255,6 +395,7 @@
|
||||
"url": "http://www.securityfocus.com/bid/24655",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -263,6 +404,7 @@
|
||||
"url": "http://www.securityfocus.com/bid/25159",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -271,6 +413,7 @@
|
||||
"url": "http://www.securitytracker.com/id?1018293",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -293,6 +436,7 @@
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA07-177A.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
@ -302,6 +446,7 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2337",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -309,6 +454,7 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2354",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -316,6 +462,7 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2491",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -323,6 +470,7 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2732",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -330,6 +478,7 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3229",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -337,6 +486,7 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2010/1574",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2007-4000",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2007-09-05T10:17:00.000",
|
||||
"lastModified": "2020-01-21T15:45:47.303",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:24:08.707",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -48,7 +48,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-264"
|
||||
"value": "CWE-824"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,38 +62,25 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DD315AE-868B-4061-BF01-CDBF59B02499"
|
||||
},
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.5",
|
||||
"versionEndIncluding": "1.6.2",
|
||||
"matchCriteriaId": "FA78988C-2288-47F6-9E90-9804CC38E3DB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B639DD5F-71C7-4D9B-BA5C-51CAF64140B6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B904DCE-D59F-45C7-A814-DE42CF02792D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9957FE9E-1E89-4C27-852C-44F866A1834E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2C382DAA-68D2-4DD9-BE29-8EEB0BAF1A7A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "73BB258E-51CF-4D12-836B-BCEA587A3F5F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F81DE01C-BA3B-40B4-BD85-17692F0AF8A8"
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E3EFD171-01F7-450B-B6F3-0F7E443A2337"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -101,72 +88,166 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://secunia.com/advisories/26676",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/26680",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/26700",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/26728",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/26783",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/26987",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://securityreason.com/securityalert/3092",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2007-006.txt",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200709-01.xml",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.kb.cert.org/vuls/id/377544",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:174",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.novell.com/linux/security/advisories/2007_19_sr.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-0858.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/478794/100/0/threaded",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/25533",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id?1018647",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3051",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250976",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36438",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.rpath.com/browse/RPL-1696",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9278",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00087.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2007-4150",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2007-08-03T20:17:00.000",
|
||||
"lastModified": "2008-11-15T06:55:47.280",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:19:27.583",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,26 +15,48 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 10.0
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 10.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": true,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
@ -48,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-327"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -71,16 +93,29 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://osvdb.org/46979",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.portcullis.co.uk/uplds/advisories/vapassword%20-%2006-042.txt",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/25153",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2007-4580",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2007-08-28T18:17:00.000",
|
||||
"lastModified": "2018-10-15T21:36:32.437",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:23:50.357",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -48,7 +48,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,27 +62,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:trustware:bufferzone:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.1",
|
||||
"matchCriteriaId": "1CA9B868-465B-4010-9B3C-BD0E0A306728"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:trustware:bufferzone:*:*:enterprise:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:bufferzonesecurity:bufferzone:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.1",
|
||||
"versionEndIncluding": "2.5",
|
||||
"matchCriteriaId": "E0FD93D8-42E4-450F-BBC7-F8B14C86DC96"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:trustware:bufferzone:*:*:free:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.5",
|
||||
"matchCriteriaId": "2214235C-B284-4261-B03A-DEBADEACBA65"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:trustware:bufferzone:*:*:pro:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.5",
|
||||
"matchCriteriaId": "ECB29D57-6F8E-435A-978A-8724AEB5E803"
|
||||
"matchCriteriaId": "751BA5D4-AE36-4AEC-A09F-A91003583DA1"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -90,17 +73,44 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://osvdb.org/39154",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/26608",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://securityreason.com/securityalert/3071",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/477726/100/0/threaded",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36278",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2007-4639",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2007-08-31T23:17:00.000",
|
||||
"lastModified": "2018-10-15T21:36:45.733",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:23:57.630",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -48,7 +48,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
"value": "CWE-824"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,8 +62,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:enterprisedb:enterprisedb_advanced_server:8.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "303CB449-2C68-4C66-986A-3A9A3BE3A32E"
|
||||
"criteria": "cpe:2.3:a:enterprisedb:postgres_advanced_server:8.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BC7D7162-696B-4867-80B0-C06A34DA4146"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -71,24 +71,47 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://secunia.com/advisories/26640",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/478057/100/0/threaded",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/25481",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3040",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36328",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2007-4682",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2007-11-15T01:46:00.000",
|
||||
"lastModified": "2017-07-29T01:33:06.363",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:24:53.567",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -48,7 +48,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
"value": "CWE-824"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,63 +62,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0760FDDB-38D3-4263-9B4D-1AF5E613A4F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B8B16DB-4D1F-41B7-A7A2-2A443596E1AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AFD4DE58-46C7-4E69-BF36-C5FD768B8248"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CF824694-52DE-44E3-ACAD-60B2A84CD3CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B73A0891-A37A-4E0D-AA73-B18BFD6B1447"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "26AC38AB-D689-4B2B-9DAE-F03F4DFD15BE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0C580935-0091-4163-B747-750FB7686973"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BB0F2132-8431-4CEF-9A3D-A69425E3834E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8719F3C4-F1DE-49B5-9301-22414A2B6F9C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "09ED46A8-1739-411C-8807-2A416BDB6DFE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "786BB737-EA99-4EC6-B742-0C35BF2453F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8D089858-3AF9-4B82-912D-AA33F25E3715"
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.4",
|
||||
"versionEndIncluding": "10.4.10",
|
||||
"matchCriteriaId": "2CE430AB-7B7B-44B9-9960-291A08CFC849"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -128,44 +75,75 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://docs.info.apple.com/article.html?artnum=307041",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/27643",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://securitytracker.com/id?1018950",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.kb.cert.org/vuls/id/498105",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/26444",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA07-319A.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3868",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38465",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2007-5460",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2007-10-15T22:17:00.000",
|
||||
"lastModified": "2018-10-15T21:44:57.297",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:07:07.377",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -48,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-310"
|
||||
"value": "CWE-327"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -63,8 +85,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_mobile:5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "188596B9-7646-4841-B684-B224B48B3F15"
|
||||
"criteria": "cpe:2.3:a:microsoft:activesync:4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A17BFED1-CAE1-4A94-AC66-1D41365E050B"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -74,8 +96,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:activesync:4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A17BFED1-CAE1-4A94-AC66-1D41365E050B"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_mobile:5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "188596B9-7646-4841-B684-B224B48B3F15"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -83,24 +105,46 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://osvdb.org/38499",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://securityreason.com/securityalert/3232",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/482299/100/0/threaded",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/25976",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37223",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2007-5756",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2007-11-14T01:46:00.000",
|
||||
"lastModified": "2017-07-29T01:33:50.850",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:13:48.570",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -48,7 +48,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
"value": "CWE-129"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,8 +62,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:winpcap:winpcap:4.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9DAF026E-5D07-4188-B081-A575A8F4CFE9"
|
||||
"criteria": "cpe:2.3:a:winpcap:winpcap:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.0.2",
|
||||
"matchCriteriaId": "4A6E528E-DE46-46F1-B8EA-0D885DA7D9E3"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -73,27 +74,59 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=625",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/27676",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/26409",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id?1018935",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3835",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.winpcap.org/misc/changelog.htm",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38433",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2007-6013",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2007-11-19T21:46:00.000",
|
||||
"lastModified": "2018-10-15T21:48:56.710",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:15:00.740",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -48,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
"value": "CWE-327"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,138 +84,30 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "503E4894-3F39-471F-9A56-052718813BF9"
|
||||
"criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.5",
|
||||
"versionEndIncluding": "2.3.1",
|
||||
"matchCriteriaId": "B79A4099-2B16-42DF-977B-550F7E5C7C60"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E3EFD171-01F7-450B-B6F3-0F7E443A2337"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wordpress:wordpress:1.5-strayhorn:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B86BC4AC-62D0-47AA-8E81-50ED0B3CB88E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "38085E5A-7B41-4E43-8A22-5FD44970F3EA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CF628FB8-1AC4-4F15-9967-E60785A32D1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F0BF1F6-A54A-48E8-A872-015FE10E5D03"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4F0B6EAC-E43D-4D1B-856F-7C23250A2355"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "51FAD0FC-CE84-4332-B061-75C0C8A0B6AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BDCFE9AA-39E9-4366-AAB7-F7A891BC797E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BAF4671A-8449-438E-922B-94E5542137BC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EECE66B3-3696-4E98-AF63-DF2FB256A6FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E75BB382-6B47-4C6A-BF94-80443BEB1A23"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EFA75368-506F-4772-B0F2-8AAECDF288F2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FDDD9E5C-766F-4945-B87D-781E780AB03E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A48C0BB5-2D87-49ED-A8EB-843E5F0EAE8E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E6AAA17D-FBB8-4F54-82E2-870D6FA5C299"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B2A0CAEE-5C14-44C6-85FB-6AFDAAA1C3F2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "66BE667A-A937-4C38-B4D5-29B33F23F7B9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8A3624D4-E666-4A1B-B465-714ACBA0034C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7A7CBC45-320E-48CF-9A63-07DDE2FB61BE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "266E32CD-66FB-4E19-8091-EC748B177D8A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D3DD9120-2224-4612-A6EE-539F47BD50E0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A9FBA02-8A6A-471F-92CD-D8E77B5061C2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1B5BC7E8-4C8A-4183-AB8C-1DAE12935387"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A0F9137B-D13F-488B-8196-85E06FAB682E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "82F257F4-CB62-4C6F-8866-AA253EC8C0C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "79AB6F6F-2FE3-4FC3-9009-D40EA852711F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82F4D88-779D-4D5D-96CD-2B31B61BA29E"
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "72E4DB7F-07C3-46BB-AAA2-05CD0312C57F"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -203,46 +117,103 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/058576.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://osvdb.org/40801",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/27714",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/28310",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://securityreason.com/securityalert/3375",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://trac.wordpress.org/ticket/5367",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.cl.cam.ac.uk/~sjm217/advisories/wordpress-cookie-auth.txt",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/483927/100/0/threaded",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id?1018980",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3941",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38578",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00079.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00098.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2008-0141",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2008-01-08T19:46:00.000",
|
||||
"lastModified": "2017-09-29T01:30:09.097",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:04:22.147",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -48,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-255"
|
||||
"value": "CWE-330"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,8 +84,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:webportal:webportal_cms:0.6_beta:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "56776AA3-3EAD-479E-9E45-3AEF312868BB"
|
||||
"criteria": "cpe:2.3:a:webportal_cms_project:webportal_cms:0.6.0:beta:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "12F7AE7C-07C0-4817-93FA-73F4B169E4F7"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -75,16 +97,27 @@
|
||||
"url": "http://www.securityfocus.com/bid/27145",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39486",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/4835",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2008-3188",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2008-07-22T16:41:00.000",
|
||||
"lastModified": "2021-03-30T14:07:47.277",
|
||||
"lastModified": "2024-02-09T03:19:49.357",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -48,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-326"
|
||||
"value": "CWE-327"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -87,10 +109,27 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/31096",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/31339",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/30301",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2008-3775",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2008-08-22T16:41:00.000",
|
||||
"lastModified": "2018-10-11T20:49:45.260",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:10:19.803",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -48,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-310"
|
||||
"value": "CWE-327"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,55 +84,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:folder_lock:folder_lock:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "5.9.2",
|
||||
"matchCriteriaId": "F19203E4-95F9-4942-872F-B8A3AE6E8618"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:folder_lock:folder_lock:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:newsoftwares:folder_lock:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "5.9.5",
|
||||
"matchCriteriaId": "4A40DFC4-80A1-4082-9B9D-FC2B661CBFAD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:folder_lock:folder_lock:5.5.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1CB6533F-61D5-453A-8A12-B08B6308B526"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:folder_lock:folder_lock:5.6.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "923A1C0A-0FC1-4A26-BF22-7BE4BBDD9785"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:folder_lock:folder_lock:5.7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "05CBF4B7-914C-48E6-9182-C52B5426F8C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:folder_lock:folder_lock:5.7.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5D4A19A7-76D6-44C0-9DAA-57354F883E5C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:folder_lock:folder_lock:5.7.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "010C0434-A40D-4ABA-B105-58820231C275"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:folder_lock:folder_lock:5.7.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2277377E-4086-421E-9E36-E930F7BC8654"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:folder_lock:folder_lock:5.8.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F3CAB0D5-0454-443B-A059-3894ABB20217"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:folder_lock:folder_lock:5.9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5D1FDC1C-9936-4485-95B4-9398C036FB3F"
|
||||
"matchCriteriaId": "0EDC1BF9-973E-498F-8D00-016A851C3A1B"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -118,21 +94,46 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://secunia.com/advisories/31559",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://securityreason.com/securityalert/4183",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/495612/100/0/threaded",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/30771",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44575",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2008-4905",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2008-11-04T00:58:40.227",
|
||||
"lastModified": "2009-01-29T06:57:42.530",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:05:09.550",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -48,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-310"
|
||||
"value": "CWE-330"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -65,156 +87,6 @@
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "5.1.3",
|
||||
"matchCriteriaId": "1E3019EC-DA80-4761-B832-964F6EF93A65"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:1.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8AB16906-D886-490E-B677-96E498869033"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:1.6.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AA278206-6FE9-47B0-A2C5-29DB5FBA209D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:2.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B47D305A-E52B-487C-A224-A877B88153F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:2.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4CF012B6-1435-4030-AD9A-62DB01DE0662"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:2.0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "11CBA97F-C726-4C89-8669-3B54A20910B2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:2.0.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CF0A64C3-BE11-4876-9080-9F48BE9FB1D6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:2.5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "36A454B2-25F5-4D11-BB6F-8E3B59FFB0FF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:2.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DAD9ECE7-068C-45A7-9E84-5F39C16EC163"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:2.5.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FCF5981C-6983-46E3-92E5-8AD5732CAF5A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:2.5.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "829B4A24-B296-4998-9660-DFCCC84B5737"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:2.5.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "55B3F7BE-6A7F-4DF6-A8A5-255C80AC5394"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:2.5.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2CACF067-89CB-4E95-9765-F440065DDDE4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:2.5.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "57BB7A8C-1F33-488A-AF97-422105AB1CF7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:2.5.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C43C4381-76D1-4E4D-929D-57CF7985268E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:2.5.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B2169F77-8CDF-494F-8A5B-FBFA423F508A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:2.6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F311CEC8-F619-4F79-A434-6BCB8505F1F3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:3.99.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A9C58BA0-8E59-43BF-9558-E050C29AF181"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:3.99.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "10174180-CBD7-4481-A067-EB3CEA93A362"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:3.99.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "96B6FF23-B700-4B0D-8FA5-1CDED4E9A54F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:3.99.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E2A09B06-DF95-4112-9FC8-847BDBCAEBFD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:3.99.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DF324FFC-353B-47C2-809E-1AF1003DBD6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:4.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "634E850B-5C36-497C-9175-FBA1F5FF4C1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:4.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7A845374-834E-4696-A9C2-A32C83044CBF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:5.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "37FBAA0E-8E1D-4E8B-A08D-AA477FEDA85D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:5.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9D419017-2B6C-4DF9-8B98-F74840721BED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:5.0.3.98:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "028B2D4F-8BB6-4DB9-A1A3-3BB88407639E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:5.0.3.98.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FD1F53D-1911-445A-8230-748F2DD20621"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CF128B29-BFF1-4E99-A1B4-999C14FDB3AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:5.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4225B42A-48BF-4AD3-ACB7-4806EA785B1E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typosphere:typo:5.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "447033D5-7C0E-4184-AF79-E1CB31BD6AE2"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -222,13 +94,29 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://secunia.com/advisories/32272",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://securityreason.com/securityalert/4550",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/497970",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2008-4989",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2008-11-13T01:00:01.177",
|
||||
"lastModified": "2018-10-11T20:53:12.343",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:19:21.940",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -48,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-255"
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -63,563 +85,110 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.6.0",
|
||||
"matchCriteriaId": "97B544BC-DED8-4D05-8B9E-E692EF53AE9C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.0.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4FBB8F2C-498D-4D31-A7D7-9991BABEA7A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.0.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8856E1B1-8007-42E5-82EF-4700D4DEEDDA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.0.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A9CF40D3-CE03-4C2A-8EEF-EB5989291806"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.0.19:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EC60D4CC-922C-4941-A400-0CBEAC7F31D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.0.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "754A0D19-A17A-4007-8355-497D14CFCBF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.0.21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8140DBE1-8116-4051-9A57-07535586E0AF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.0.22:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "56D2DF7F-DCDD-486D-B906-F9DDE3A1DB70"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.0.23:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F1CC840D-AD01-4EE2-8652-06742A6286BA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.0.24:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "84224A82-6D58-4000-A449-20C1632DAE85"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.0.25:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A466931C-769A-4A28-B072-10930CE655E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.1.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2FEE50AC-8730-4F04-B57C-6BDF8B957F6D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.1.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "10F621DC-7967-4D97-A562-02E7033C89C2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.1.15:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "776E5481-399F-45BC-AD20-A18508B03916"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.1.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "63D7F972-9128-4A4D-8508-B38CE2F155E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.1.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C5D56873-E8C5-4E4B-BB85-6DCF6526B453"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.1.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "54FE4766-32D0-491E-8C71-5B998C468142"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.1.19:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F980857-2364-466A-8366-BD017D242222"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.1.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4CDCF1F0-5A78-48FF-B4B0-303AE2420F6A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.1.21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0A2E649D-5C45-4412-927B-E3EDCE07587C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.1.22:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "066175C2-6E96-4BAE-B1A6-B23D25547FAC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.1.23:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "869D3010-67AE-44D0-BB8F-D9C410AEA1D8"
|
||||
},
|
||||
"versionEndExcluding": "2.6.1",
|
||||
"matchCriteriaId": "5CA85285-1376-4569-8EC1-66E1625E258D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "052B40C1-C29B-4189-9A45-DAE873AB716D"
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "72E4DB7F-07C3-46BB-AAA2-05CD0312C57F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "02F71E61-7455-4E10-B9D8-2B7FDDFB10F6"
|
||||
},
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "743CBBB1-C140-4FEF-B40E-FAE4511B1140"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.2.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5E05A9A1-6B7A-43FB-A9B8-41B68CA5FDCD"
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.2.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1FB08FD9-9AB8-4015-A8BE-FD9F7EBAC6DA"
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.2.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B588AAE0-8C3F-47C7-812F-8C97BD8795E5"
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
|
||||
"matchCriteriaId": "7EBFE35C-E243-43D1-883D-4398D71763CC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.2.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBB9154B-4254-4F33-8DB2-5B96E2DA4931"
|
||||
},
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4747CC68-FAF4-482F-929A-9DA6C24CB663"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.2.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "64D9C191-6A57-40BB-BDD1-6B1A6BBAB51E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.2.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2EA79D1-2EA8-4040-A5B5-C93EE937945A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.2.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "61D05BC3-1315-4AC7-884D-41459272C94B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.2.8.1a1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2901E522-6F54-4FA5-BF22-463A9D6B53D8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.2.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "738F29DA-9741-4BA5-B370-417443A3AC2E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.2.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52173492-1031-4AA4-A600-6210581059D3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.2.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BB636C36-2884-4F66-B68A-4494AEAF90C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "777A16E4-A1F5-48DC-9BF0-CD9F0DCF8B55"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EC4231BD-201D-4B10-9E35-B9EEFC714F6A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.3.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C9200C3-0F46-4238-918B-38D95BF11547"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.3.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "024A9511-7CB4-4681-8429-0FE7FC34DF1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.3.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "34CEF5ED-87A5-44B2-8A4A-9896957C057B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.3.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1B84A4F5-CED7-4633-913F-BE8235F68616"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "97564ABD-F9CE-4B3C-978A-1622DE3E4924"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3DB6EC88-DCE0-439B-89CD-18229965849B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.4.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1E2C89DD-CDBD-4772-A031-089F32006D80"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.4.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8C2FD618-91F4-48E7-B945-90CC0A367DE6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.4.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "65DC9555-E76F-4F8D-AE39-5160B34A87FF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.4.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B61D180-9EEA-4258-9A59-7F004F2C83F2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "00DE1208-BDDC-405B-A34A-B58D00A279DD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8EF689E-59AA-4619-ADB2-E195CFD4094A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.5.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B62AB660-5DA4-4F13-AF9E-DC53D0A18EED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.5.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "22314ED6-D0CD-442E-A645-A9CCFE114AE1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.5.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A9E1C5B2-27BF-4328-9336-98B8828EE4BE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.5.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B5C952BF-A135-4B15-8A51-94D66B618469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6ADED309-0A25-478D-B542-96217A0DD63E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.6.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DC0403DE-76B1-4E24-8014-64F73DCB53DB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.6.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "69EA91B0-249F-41B2-8AD0-0C2AD29BE3D6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.6.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F714D22-873A-4D64-8151-86BB55EFD084"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4E9181F9-50FF-4995-9554-022CF93376C2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AED0B40F-3413-40D6-B1EF-E6354D2A91F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4E99A7D8-2303-4268-8EF8-6F01A042BEDE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "86C70F69-FB80-4F32-A798-71A5153E6C29"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B2A1E604-500E-4181-BF66-BB69C7C3F425"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0C8120E3-B60F-44E4-B837-4707A9BAEDBE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "84D3F16F-2C23-48E9-9F2D-1F1DF74719E5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F7073EAD-06C9-4309-B479-135021E82B99"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "546C56AC-AFCC-47B7-A5A8-D3E3199BEA41"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1895868E-E501-42C2-8450-EEED4447BAB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2ED1FCE0-260B-4FB2-9DBD-F4D0D35639AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "199AA36A-3B23-438C-9109-CC9000372986"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD6FFF05-37B2-4D69-86AF-921591382D21"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "82BF8600-4E5D-4FF4-953C-F2DC726CA6CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "04C40F0E-B102-4FE8-9E93-0ACFBF35226D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.15:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "22802660-D33F-4683-B82F-C94AC6170A73"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3623E9BE-F513-4301-BF0C-6A7F87E78E7A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B5DBAF08-1441-4F14-A740-E90044B77042"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4CE9BB7E-DDD8-4CBF-AEC2-40D59A560BD2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.19:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5D3B6684-3890-4B60-BE67-D06045A86B3B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "81C6C982-21D5-4FE3-A342-FC45BD78D2F1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A69E3A01-D8C6-4C36-8C4E-52B96541D5B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F9D61596-01EB-4936-923B-63537625F926"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "599EB59C-7717-47A8-84C6-78B6D79AEB02"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4A6CBB77-818D-4DFF-9DD9-07EBF9933B06"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "26E9005E-5034-43F2-B96E-7829E19FE3A8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6FA854EA-29FE-4B91-AEA3-ED649D7FD25A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DC3A5EE-2892-4548-A0CB-D3289CD64D63"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "83F22BF4-A738-438B-8D0B-6993640F0D31"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.1.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9D3193B7-8FB9-45E4-BFF6-891A3F14F021"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.1.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5AF269AE-121B-4982-A765-5C7E806FA9FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.1.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A1C9F604-7FBE-4759-B039-8F5894574203"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.1.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "191821CD-E4CB-4269-B04C-284A9F9783B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.1.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B2A71474-958D-4689-A652-3E2A731F47FF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "38169043-17DF-4CF9-963A-8770B8882357"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0D7E5D9C-0976-4C9A-9FEB-AB923845BAD6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.2.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4537676-A72E-4433-B44F-3664EDD6F240"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.2.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D7CCCB66-C7CC-4E5C-8253-C29D57BE9B43"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.2.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8D090B10-68F2-424D-8234-2A280AA96B59"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.2.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "23168B77-645D-4A2A-A6E3-7001104064A4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4D085B16-3116-423F-BDE0-2D93E12650A8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C59247E9-CDAE-4269-A8E4-F49F617CDD23"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.3.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A6019C0C-E9DD-4831-8E6A-785AE1A930FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.3.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16F9CF15-8789-49B6-BB6D-B784C8FF20ED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.3.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A6DAE798-14C9-4CB6-A39F-69CDF9D8FBB0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.3.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C51E0C88-B19C-408D-AC17-10CE7462D48A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.3.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7A7FBFAA-263C-4B7B-A135-9824DFD8CCDA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.3.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2AC41482-B3BC-4C93-A850-73A179BAB763"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.3.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ADC80BE1-28A6-4348-A061-8FD9C805E945"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.3.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9D8EF703-AE06-4DD7-9235-2D8CCDB24F96"
|
||||
},
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.3.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9A8AC314-065B-4BC3-A5EE-CA6D3006F9F5"
|
||||
"criteria": "cpe:2.3:o:opensuse:opensuse:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.3",
|
||||
"versionEndIncluding": "11.1",
|
||||
"matchCriteriaId": "FF141FBE-4CA5-4695-94A0-8BE1309D28CC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.3.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D8201FF6-53A8-4850-A2B2-47AA65B2CB75"
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AED08A6F-CD23-4405-B1CF-C96BB8AE7D6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AFB33002-E5C6-4573-BC94-647DDE4E6F89"
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1608E282-2E96-4447-848D-DBE915DB0EF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8D7D245A-D983-40AD-89A7-0EA00D38D570"
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "38C3AEB0-59E2-400A-8943-60C0A223B680"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.4.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7223691-225D-4649-B410-F41D2C489BA5"
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F13F07CC-739B-465C-9184-0E9D708BD4C7"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -631,99 +200,221 @@
|
||||
"url": "http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3215",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3217",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/32619",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/32681",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/32687",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/32879",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/33501",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/33694",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/35423",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200901-10.xml",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-260528-1",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0322",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.debian.org/security/2009/dsa-1719",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.gnu.org/software/gnutls/security.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:227",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0982.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/498431/100/0/threaded",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/32232",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id?1021167",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.ubuntu.com/usn/usn-678-2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2008/3086",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1567",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46482",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.rpath.com/browse/RPL-2886",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11650",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://usn.ubuntu.com/678-1/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00222.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00293.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
File diff suppressed because it is too large
Load Diff
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2009-0269",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2009-01-26T15:30:04.967",
|
||||
"lastModified": "2023-11-07T02:03:36.497",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:26:02.317",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -48,7 +48,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-399"
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -63,553 +63,78 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.6.28",
|
||||
"matchCriteriaId": "9B5B312F-E76A-43E1-A73F-31535848D55B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43F9DBB0-8AF7-42CA-95DD-68A344E9D549"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA39D4CE-22F0-46A2-B8CF-4599675E7D3A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EDD00664-A27C-4514-A2A4-079E8F9B0251"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E336C792-B7A1-4318-8050-DE9F03474CEF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7228AE50-BACB-4AB8-9CE5-17DB0CD661AF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D6D260FD-E55E-4A95-AB7F-B880DBE37BAD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E36D0159-1A05-4628-9C1C-360DED0F438C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3E6654B9-42EB-4C2C-8F71-710D50556180"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0FC560CC-F785-42D5-A25B-1BA02E7AC464"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C06F0037-DE20-4B4A-977F-BFCFAB026517"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1817C772-D367-4ABE-B835-466D31A6DC89"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C667B8E4-64EB-4A05-84FF-B2243DEF757D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9484B41A-DFB6-4481-80D8-440C711CEA53"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53D373AF-DE6B-428E-9F0F-F1D220900A4D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F2975DF7-F916-456C-BF7C-2694559E5282"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6D156EFF-D2E5-4F42-B6E7-954DE6CD90B4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "784EB96E-2FD3-4F77-8DB6-4D6C7A928946"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "86A98A70-51E3-4556-8DC4-DD09CF370D1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "469EE3B0-3CC2-4AC2-86A0-2DF34205E707"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FCFECB2B-6482-45F2-B3BB-EDDEDA0948A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8EC547EB-9308-4477-8256-A0E04B42D6DA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6F55A024-9F8E-44F8-A0D8-696BC232524A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "84595143-3B04-4CE8-81C0-28EEEC58CD0E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "32EE2B49-DDEB-4B49-A5F0-CAA161095A5F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C3ABFA33-8FA1-488E-A9BD-1593F495F595"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62F6DE3A-E6CC-4D7E-BD08-E43DC4182200"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A9A29C44-EBE5-42B0-AFAD-C5A8F6EEF2F8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "96A43C95-8569-40BE-9E5B-F9B3D0B9D188"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ABD70B2B-9827-4DBB-B82D-0B70C2D4AB1F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "99662904-E5E3-4E81-B199-39707EAEB652"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "615BDD1D-36AA-4976-909B-F0F66BF1090C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EE8A26D6-1BDA-45F0-8F7C-F95986050E32"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "61A3EDF2-09D7-4116-AE46-D86E4B9602AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "12A55028-B8F9-4AD2-AE57-A80D561F3C79"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0C4E641C-67D4-4599-8EFB-0B2F8D81D68C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "70460F6C-D6C0-4C1A-B13E-368705EAF223"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3F26BA18-08AD-45FE-9F83-25CCB2E27270"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6EBFF148-3EDA-4216-910B-8930D8C443C2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "648C63F7-EA1D-4F2E-B8AF-1F380C83E542"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1697B855-4834-4633-A5C8-C1F7F13ACE0D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1FBAE75F-9145-4B9A-A6D8-E488C5326145"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5990C6C2-2F66-4C4D-8224-74163865F410"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3A45A9B9-4B19-4A5B-BC95-BCBC4EF00F12"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C23AD176-3B99-4593-BCBD-13C1E579A13E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "034DFD7F-8919-4245-8480-7B272F591271"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4CEBC606-6488-48CE-8AA8-5B8CC724D5D0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A83C60AF-50A9-480E-860D-45E80AC0A6B7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22_rc1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "44FDF616-E410-4540-B377-98D1FB88CE35"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22_rc7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5313B736-9904-442A-84D6-8FC7B9AC2059"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE87D1BC-A72D-42D2-A93C-67A5823BEB14"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5AAC2E9D-0E82-4866-9046-ADD448418198"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "760FB32D-9795-4B29-B79A-A32B5E70F7EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0DFF67E9-B0C2-48D5-BB3A-CF21D10010FF"
|
||||
},
|
||||
"versionEndExcluding": "2.6.28.1",
|
||||
"matchCriteriaId": "284B0272-0D61-492A-8899-1A3BED5D2E35"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5881A78C-D162-4DE5-8353-2BB1EC1F428B"
|
||||
"criteria": "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C35B68DF-1440-4587-8458-9C5F4D1E43F3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B13D81D2-1A89-4E61-A90C-5E8BB880310B"
|
||||
"criteria": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1B42AB65-443B-4655-BAEA-4EB4A43D9509"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80F9887E-2466-4C73-A8E1-2117492F9EC9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8FDE5B27-2EF0-464E-8F14-5E809D84D389"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "815B2EE8-136F-44E4-997D-5F93A54775DD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23_rc1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "76D0AFF0-8CA9-42EF-A20E-3CD6E7DDF016"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "13673DF5-09B1-40C8-AC54-A447DE8AB01E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52152F5A-1833-4490-A373-9C547B90B0F8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B64A095E-5E97-445E-B435-F09983CC0E7A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8035F93-9DEE-4B92-ABAA-4ABE0B71BF41"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6EE92406-DBF3-463E-8A51-F9679E851FDB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3C60D19B-ED9B-443C-9D49-002ABD381119"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "264C61EE-64F6-43AD-B54F-7D683C29E64F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0149408A-30F6-4EDF-8B3B-CBAB884CE758"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24_rc1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3069324C-28FB-4BB6-9451-F3AC6A8DA64C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24_rc4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8F3D19AD-4268-45E7-B13D-BC93ABDF2226"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24_rc5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "67E619E6-A515-43BC-B371-C1FF6DAA6CCE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "71295664-89EC-4BB3-9F86-B1DDA20FAC5A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25:*:x86_64:*:*:*:*:*",
|
||||
"matchCriteriaId": "6ED1BAE4-A6D3-49A1-BCAD-1E514D42F609"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "37BE853A-BA6F-4A70-B166-E34441F0B7DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:x86_64:*:*:*:*:*",
|
||||
"matchCriteriaId": "4F7C4DFF-616C-497D-9BAB-67C2E21BC21D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85064FDF-4B62-43BF-B36C-F659D739BC22"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:x86_64:*:*:*:*:*",
|
||||
"matchCriteriaId": "E6EBBFE8-2332-45CE-93F8-6815C2AE5D17"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CEADC505-FF44-4D45-8EA6-B23A1C4564D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:x86_64:*:*:*:*:*",
|
||||
"matchCriteriaId": "388414A1-C9B4-41BA-AD35-6501A463A095"
|
||||
},
|
||||
"criteria": "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FBF7B6A8-3DF9-46EC-A90E-6EF68C39F883"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0CE3C807-5C9B-4B71-868B-DF17ECB1514F"
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:x86_64:*:*:*:*:*",
|
||||
"matchCriteriaId": "FDBA01DD-C129-48F1-800B-838418F4A4A4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A6CADAA2-91D2-40C4-90F3-D7F40A3D4CB0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:x86_64:*:*:*:*:*",
|
||||
"matchCriteriaId": "185F1EF8-04EB-43ED-B909-8BDF60F23E76"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "45B6847C-873B-4BE1-852D-239115E59BA4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:x86_64:*:*:*:*:*",
|
||||
"matchCriteriaId": "D9D4BCAD-B3CD-4FA1-A833-0D7D40289E07"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FF41209E-D27F-4642-A405-90E822A41897"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:x86_64:*:*:*:*:*",
|
||||
"matchCriteriaId": "3483FAFA-353C-498F-AF68-8F5B84A0F30D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "97F59FD9-46E5-4F63-80A0-091AD44D1867"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:x86_64:*:*:*:*:*",
|
||||
"matchCriteriaId": "B3D5AEA5-210B-4E9F-8D9C-C25B84F15C75"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "428844A5-E020-4AE9-8012-9AEDFCB7C32E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:x86_64:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B11A9E1-9D90-46DC-81B5-17A137205AB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "94C9D70D-A552-48D6-9497-EE07EB5649D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:x86_64:*:*:*:*:*",
|
||||
"matchCriteriaId": "07EEC559-9240-46BE-9057-0F17D1F61F99"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF6169FF-9FF9-4A81-BAEB-6D5132F64F61"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:x86_64:*:*:*:*:*",
|
||||
"matchCriteriaId": "BBBC127F-D67E-43FE-BCFE-606C200084F4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E6DC79CF-A504-4232-9F66-B5DCD0213DA0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:x86_64:*:*:*:*:*",
|
||||
"matchCriteriaId": "42B18945-EE09-4E6B-8C11-E382E5F8F850"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "192B4273-0935-4232-BBFD-A850855CAC5F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "60E9FDA8-7EC3-4B9B-B508-27F948D60DDB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.15:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E4E4A6E5-0C2C-42FD-B982-684CCB0DDFBB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A16F2182-C489-4CA9-A56B-01463148D16F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "630A56D3-7A82-44DE-8888-2EB8CD1C24A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E45F4429-5A9C-4E8B-96EE-CCF19776CABF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1EFCAF09-BB20-424C-8648-014C0F71F8A9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3A74970C-5EEA-47A7-A62D-AF98F4D1228F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CEA56669-B09E-42C2-9591-245C46909A2F"
|
||||
},
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E9B33D60-8023-4A0B-ACF7-9F811EEB8BCD"
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3D08D180-23F7-456F-98CA-26B53C678D76"
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C0507E91-567A-41D6-A7E5-5088A39F75FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "856FE78A-29B5-4411-98A0-4B0281C17EB9"
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4747CC68-FAF4-482F-929A-9DA6C24CB663"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -619,114 +144,200 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git%3Ba=commit%3Bh=a17d5232de7b53d34229de79ec22f4bb04adb7e4",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00003.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/33758",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/34394",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/34502",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/34981",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/35390",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/35394",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/37471",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.debian.org/security/2009/dsa-1749",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.debian.org/security/2009/dsa-1787",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.1",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:118",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2009-0326.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2009-0360.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/33412",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.ubuntu.com/usn/usn-751-1",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2009/3316",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48188",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.launchpad.net/ecryptfs-devel/msg00010.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.launchpad.net/ecryptfs-devel/msg00011.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8169",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8944",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2009-0846",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2009-04-09T00:30:00.267",
|
||||
"lastModified": "2020-01-21T15:47:45.433",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:21:59.430",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -48,7 +48,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
"value": "CWE-824"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,188 +62,135 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "032730AE-1E53-4CA2-96FD-AD60CD27F3CA"
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.6.4",
|
||||
"matchCriteriaId": "46577766-3490-43FD-8DDB-DDEF8862420D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "743CBBB1-C140-4FEF-B40E-FAE4511B1140"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "589D7E39-A243-49F9-8F67-4B9E92AE87DF"
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7000D33B-F3C7-43E8-8FC7-9B97AADC3E12"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "08FA60A9-10E1-4ACD-819C-17801FAD7671"
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.0.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E8973E93-0BBE-4BD3-9983-F6480FFEA228"
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C0507E91-567A-41D6-A7E5-5088A39F75FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7A37987D-22F9-47AC-A07A-380F7E509BFE"
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4747CC68-FAF4-482F-929A-9DA6C24CB663"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.5.7",
|
||||
"matchCriteriaId": "EA0E35E1-9181-4A2B-93E5-8833E5AB5FDD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6172AF57-B26D-45F8-BE3A-F75ABDF28F49"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E47F0770-67D7-42EE-A1AD-9D5B5E83BF2B"
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BE8C0C82-749E-4837-88F8-FB56A753B094"
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7D74A418-50F0-42C0-ABBC-BBBE718FF025"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.2:beta1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4EA5E4B3-AD02-4E87-822B-8A6C91DA65FA"
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:4.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E1CA1D49-76E7-4195-98AF-BE916040ECC3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.2:beta2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1A0B70C1-476D-4FAF-BA96-CB3EB32B7BC5"
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F9EF63F-DDA3-448B-92D7-27ED92C51FED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8AD672FA-918D-48CB-BC03-4E412AF0DCCC"
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "397313C3-6BF5-4A87-90B3-55678E807171"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D0B363A4-BB7A-48A2-AE6B-BD2DDD46E7CB"
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "73322DEE-27A6-4D18-88A3-ED7F9CAEABD5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "74EF42A5-EC47-4475-81D6-FD1E9C2B8A3C"
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53A61204-33CE-422F-8285-20A5E98ADF3F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30F2CBEF-6FA1-4E07-8163-6AFEDC93FCE5"
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E2FE6DAA-4702-409A-98B6-DE13B12805A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D133CB0D-8A54-4DAA-9FE8-0B367544DE65"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7B2C23BD-1995-4F09-B444-87DDDE21817E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EEF118BE-6351-4768-A3F0-DFE0065273D9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.2.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2574FC48-C80A-427A-AD12-42676D125D62"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F01A83F-3BD1-4DED-979A-B4B6B23039FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B1422F8-CC87-46EA-8649-A12D6E47335D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ACEB5A36-8F72-417A-AC92-149612EC7BCB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7B8704B5-F37B-4C61-A924-3774A29BFEB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F953CEBA-BAC0-48DF-A3D0-1FABCC9963E2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED81A044-8A7B-4EEF-A4B3-EA49D76FAAED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30AA5727-BD83-45CF-B308-BA5F8A577B9D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0E088E64-6FBD-4148-8F78-506364B7BB1E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52F0EECF-7787-442B-9888-D22F7D36C3DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EF344AED-BE00-4A9B-A9DE-C6FB0BEE4617"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "567406CA-58D8-453E-B36E-6D1D2EFC8EB6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7830E03F-A813-4E35-893E-BF27395CEFB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7764411E-C056-4696-822E-235F2620FAC4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DD315AE-868B-4061-BF01-CDBF59B02499"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B639DD5F-71C7-4D9B-BA5C-51CAF64140B6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B904DCE-D59F-45C7-A814-DE42CF02792D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9957FE9E-1E89-4C27-852C-44F866A1834E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2C382DAA-68D2-4DD9-BE29-8EEB0BAF1A7A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "73BB258E-51CF-4D12-836B-BCEA587A3F5F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F81DE01C-BA3B-40B4-BD85-17692F0AF8A8"
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5B5DCF29-6830-45FF-BC88-17E2249C653D"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -253,51 +200,164 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.vmware.com/pipermail/security-announce/2009/000059.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=124896429301168&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=130497213107107&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2009-0409.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2009-0410.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/34594",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/34598",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/34617",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/34622",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/34628",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/34630",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/34637",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/34640",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/34734",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/35074",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/35667",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200904-09.xml",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256728-1",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://support.apple.com/kb/HT3549",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2009-142.htm",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047180.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047181.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-002.txt",
|
||||
@ -309,106 +369,198 @@
|
||||
},
|
||||
{
|
||||
"url": "http://wiki.rpath.com/Advisories:rPSA-2009-0058",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0058",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21396120",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.kb.cert.org/vuls/id/662091",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:098",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2009-0408.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/502527/100/0/threaded",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/502546/100/0/threaded",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/504683/100/0/threaded",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/34409",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id?1021994",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.ubuntu.com/usn/usn-755-1",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0008.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2009/0960",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2009/0976",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1057",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1106",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1297",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2009/2084",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2009/2248",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10694",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5483",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6301",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00205.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00206.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2009-1415",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2009-04-30T20:30:00.563",
|
||||
"lastModified": "2017-08-17T01:30:20.287",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:22:16.227",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,7 +55,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-255"
|
||||
"value": "CWE-824"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -70,588 +70,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.6.5",
|
||||
"matchCriteriaId": "A5EDD6F6-742C-4A59-AFB5-A7BCFB6AA759"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.0.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4FBB8F2C-498D-4D31-A7D7-9991BABEA7A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.0.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8856E1B1-8007-42E5-82EF-4700D4DEEDDA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.0.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A9CF40D3-CE03-4C2A-8EEF-EB5989291806"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.0.19:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EC60D4CC-922C-4941-A400-0CBEAC7F31D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.0.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "754A0D19-A17A-4007-8355-497D14CFCBF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.0.21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8140DBE1-8116-4051-9A57-07535586E0AF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.0.22:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "56D2DF7F-DCDD-486D-B906-F9DDE3A1DB70"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.0.23:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F1CC840D-AD01-4EE2-8652-06742A6286BA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.0.24:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "84224A82-6D58-4000-A449-20C1632DAE85"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.0.25:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A466931C-769A-4A28-B072-10930CE655E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.1.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2FEE50AC-8730-4F04-B57C-6BDF8B957F6D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.1.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "10F621DC-7967-4D97-A562-02E7033C89C2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.1.15:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "776E5481-399F-45BC-AD20-A18508B03916"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.1.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "63D7F972-9128-4A4D-8508-B38CE2F155E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.1.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C5D56873-E8C5-4E4B-BB85-6DCF6526B453"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.1.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "54FE4766-32D0-491E-8C71-5B998C468142"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.1.19:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F980857-2364-466A-8366-BD017D242222"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.1.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4CDCF1F0-5A78-48FF-B4B0-303AE2420F6A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.1.21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0A2E649D-5C45-4412-927B-E3EDCE07587C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.1.22:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "066175C2-6E96-4BAE-B1A6-B23D25547FAC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.1.23:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "869D3010-67AE-44D0-BB8F-D9C410AEA1D8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "052B40C1-C29B-4189-9A45-DAE873AB716D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "02F71E61-7455-4E10-B9D8-2B7FDDFB10F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.2.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5E05A9A1-6B7A-43FB-A9B8-41B68CA5FDCD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.2.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1FB08FD9-9AB8-4015-A8BE-FD9F7EBAC6DA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.2.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B588AAE0-8C3F-47C7-812F-8C97BD8795E5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.2.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBB9154B-4254-4F33-8DB2-5B96E2DA4931"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.2.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "64D9C191-6A57-40BB-BDD1-6B1A6BBAB51E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.2.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2EA79D1-2EA8-4040-A5B5-C93EE937945A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.2.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "61D05BC3-1315-4AC7-884D-41459272C94B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.2.8.1a1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2901E522-6F54-4FA5-BF22-463A9D6B53D8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.2.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "738F29DA-9741-4BA5-B370-417443A3AC2E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.2.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52173492-1031-4AA4-A600-6210581059D3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.2.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BB636C36-2884-4F66-B68A-4494AEAF90C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "777A16E4-A1F5-48DC-9BF0-CD9F0DCF8B55"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EC4231BD-201D-4B10-9E35-B9EEFC714F6A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.3.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C9200C3-0F46-4238-918B-38D95BF11547"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.3.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "024A9511-7CB4-4681-8429-0FE7FC34DF1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.3.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "34CEF5ED-87A5-44B2-8A4A-9896957C057B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.3.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1B84A4F5-CED7-4633-913F-BE8235F68616"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "97564ABD-F9CE-4B3C-978A-1622DE3E4924"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3DB6EC88-DCE0-439B-89CD-18229965849B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.4.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1E2C89DD-CDBD-4772-A031-089F32006D80"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.4.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8C2FD618-91F4-48E7-B945-90CC0A367DE6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.4.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "65DC9555-E76F-4F8D-AE39-5160B34A87FF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.4.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B61D180-9EEA-4258-9A59-7F004F2C83F2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "00DE1208-BDDC-405B-A34A-B58D00A279DD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8EF689E-59AA-4619-ADB2-E195CFD4094A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.5.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B62AB660-5DA4-4F13-AF9E-DC53D0A18EED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.5.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "22314ED6-D0CD-442E-A645-A9CCFE114AE1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.5.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A9E1C5B2-27BF-4328-9336-98B8828EE4BE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.5.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B5C952BF-A135-4B15-8A51-94D66B618469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6ADED309-0A25-478D-B542-96217A0DD63E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.6.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DC0403DE-76B1-4E24-8014-64F73DCB53DB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.6.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "69EA91B0-249F-41B2-8AD0-0C2AD29BE3D6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.6.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F714D22-873A-4D64-8151-86BB55EFD084"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4E9181F9-50FF-4995-9554-022CF93376C2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AED0B40F-3413-40D6-B1EF-E6354D2A91F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4E99A7D8-2303-4268-8EF8-6F01A042BEDE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "86C70F69-FB80-4F32-A798-71A5153E6C29"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B2A1E604-500E-4181-BF66-BB69C7C3F425"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0C8120E3-B60F-44E4-B837-4707A9BAEDBE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "84D3F16F-2C23-48E9-9F2D-1F1DF74719E5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F7073EAD-06C9-4309-B479-135021E82B99"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "546C56AC-AFCC-47B7-A5A8-D3E3199BEA41"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1895868E-E501-42C2-8450-EEED4447BAB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2ED1FCE0-260B-4FB2-9DBD-F4D0D35639AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "199AA36A-3B23-438C-9109-CC9000372986"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD6FFF05-37B2-4D69-86AF-921591382D21"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "82BF8600-4E5D-4FF4-953C-F2DC726CA6CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "04C40F0E-B102-4FE8-9E93-0ACFBF35226D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.15:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "22802660-D33F-4683-B82F-C94AC6170A73"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3623E9BE-F513-4301-BF0C-6A7F87E78E7A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B5DBAF08-1441-4F14-A740-E90044B77042"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4CE9BB7E-DDD8-4CBF-AEC2-40D59A560BD2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:1.7.19:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5D3B6684-3890-4B60-BE67-D06045A86B3B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "81C6C982-21D5-4FE3-A342-FC45BD78D2F1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A69E3A01-D8C6-4C36-8C4E-52B96541D5B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F9D61596-01EB-4936-923B-63537625F926"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "599EB59C-7717-47A8-84C6-78B6D79AEB02"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4A6CBB77-818D-4DFF-9DD9-07EBF9933B06"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "26E9005E-5034-43F2-B96E-7829E19FE3A8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6FA854EA-29FE-4B91-AEA3-ED649D7FD25A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DC3A5EE-2892-4548-A0CB-D3289CD64D63"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "83F22BF4-A738-438B-8D0B-6993640F0D31"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.1.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9D3193B7-8FB9-45E4-BFF6-891A3F14F021"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.1.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5AF269AE-121B-4982-A765-5C7E806FA9FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.1.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A1C9F604-7FBE-4759-B039-8F5894574203"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.1.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "191821CD-E4CB-4269-B04C-284A9F9783B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.1.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B2A71474-958D-4689-A652-3E2A731F47FF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "38169043-17DF-4CF9-963A-8770B8882357"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0D7E5D9C-0976-4C9A-9FEB-AB923845BAD6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.2.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4537676-A72E-4433-B44F-3664EDD6F240"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.2.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D7CCCB66-C7CC-4E5C-8253-C29D57BE9B43"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.2.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8D090B10-68F2-424D-8234-2A280AA96B59"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.2.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "23168B77-645D-4A2A-A6E3-7001104064A4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4D085B16-3116-423F-BDE0-2D93E12650A8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C59247E9-CDAE-4269-A8E4-F49F617CDD23"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.3.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A6019C0C-E9DD-4831-8E6A-785AE1A930FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.3.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16F9CF15-8789-49B6-BB6D-B784C8FF20ED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.3.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A6DAE798-14C9-4CB6-A39F-69CDF9D8FBB0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.3.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C51E0C88-B19C-408D-AC17-10CE7462D48A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.3.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7A7FBFAA-263C-4B7B-A135-9824DFD8CCDA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.3.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2AC41482-B3BC-4C93-A850-73A179BAB763"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.3.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ADC80BE1-28A6-4348-A061-8FD9C805E945"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.3.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9D8EF703-AE06-4DD7-9235-2D8CCDB24F96"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.3.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9A8AC314-065B-4BC3-A5EE-CA6D3006F9F5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.3.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D8201FF6-53A8-4850-A2B2-47AA65B2CB75"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AFB33002-E5C6-4573-BC94-647DDE4E6F89"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8D7D245A-D983-40AD-89A7-0EA00D38D570"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.4.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7223691-225D-4649-B410-F41D2C489BA5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D6B3DBF9-52EB-4741-85E4-E68645BD81E2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.6.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "350A6845-77D6-4D63-A13C-5DAB55F98727"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.6.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8A456D12-C43A-47B0-AC0D-BF02AEBA0828"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.6.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4D457688-987A-4059-AA58-D9BF19ABC48B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:gnutls:2.6.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AA20043D-EC85-4003-9E7B-27AB50F4E133"
|
||||
"versionEndExcluding": "2.6.6",
|
||||
"matchCriteriaId": "0CC336AC-F306-4643-91E0-BA1D4B07DC10"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -663,51 +83,101 @@
|
||||
"url": "http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3515",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://permalink.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3502",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/34842",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/35211",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200905-04.xml",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3488",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:116",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/34783",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id?1022157",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1218",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50257",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50260",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50445",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2009-1532",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2009-06-10T18:30:00.530",
|
||||
"lastModified": "2023-12-07T18:38:56.693",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:22:27.067",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -48,7 +48,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-399"
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -74,68 +74,58 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4D3B5E4F-56A6-4696-BBB4-19DF3613D020"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
|
||||
"matchCriteriaId": "9CFB1A97-8042-4497-A45D-C014B5E240AB"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:-:*:x64:*",
|
||||
"matchCriteriaId": "3A118DC8-CD3A-461F-867E-5174F24FBAE9"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F9C7616-658D-409D-8B53-AC00DC55602A"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:-:*:x86:*",
|
||||
"matchCriteriaId": "1114016B-B51D-495D-96AC-A0E7992DA551"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
|
||||
"matchCriteriaId": "FFF81F4B-7D92-4398-8658-84530FB8F518"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x86:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA99C751-91CB-43D4-93FF-1C12342CAF1E"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*",
|
||||
"matchCriteriaId": "1DD1D5ED-FE7C-4ADF-B3AF-1F13E51B4FB5"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BDD715BA-B0EB-4D42-BCB1-97B261459E52"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C162FFF0-1E8F-4DCF-A08F-6C6E324ED878"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3A04E39A-623E-45CA-A5FC-25DAA0F275A3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0A0D2704-C058-420B-B368-372D1129E914"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:gold:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1D12423F-FCCD-4F4C-9037-7607C1F1F99E"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "34DF3B5E-F17F-49B4-9DC8-06749F3C9CC3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:sp1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "49F99773-D1AF-4596-856A-CA164D4B68E5"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*",
|
||||
"matchCriteriaId": "C6109348-BC79-4ED3-8D41-EA546A540C79"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:sp2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9F916C0D-3B99-46F3-A7AE-BAF067361499"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B47EBFCC-1828-45AB-BC6D-FB980929A81A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_xp:sp3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E69F8C21-5996-4083-A02A-F04AE948CEA9"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -145,20 +135,35 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://osvdb.org/54951",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/504208/100/0/threaded",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id?1022350",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA09-160A.html",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
},
|
||||
@ -166,20 +171,33 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1538",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-09-041",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-019",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6244",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2009-1721",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2009-07-31T19:00:01.093",
|
||||
"lastModified": "2012-10-23T03:06:36.117",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:22:38.687",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -48,7 +48,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-16"
|
||||
"value": "CWE-824"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -73,28 +73,179 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:opensuse:opensuse:10.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "33910C38-56F2-4D36-BBA3-C88E163704B3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C35B68DF-1440-4587-8458-9C5F4D1E43F3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1B42AB65-443B-4655-BAEA-4EB4A43D9509"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.5.8",
|
||||
"matchCriteriaId": "80C038E4-C24D-45E9-8287-C205C0C07809"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C0507E91-567A-41D6-A7E5-5088A39F75FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4747CC68-FAF4-482F-929A-9DA6C24CB663"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A5D026D0-EF78-438D-BEDD-FC8571F3ACEB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7000D33B-F3C7-43E8-8FC7-9B97AADC3E12"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B3BB5EDB-520B-4DEF-B06E-65CA13152824"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00000.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://release.debian.org/proposed-updates/stable_diffs/openexr_1.6.1-3%2Blenny3.debdiff",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/36030",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/36032",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/36096",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/36123",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/36753",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://security.debian.org/pool/updates/main/o/openexr/openexr_1.2.2-4.3+etch2.diff.gz",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
@ -102,44 +253,69 @@
|
||||
"url": "http://security.debian.org/pool/updates/main/o/openexr/openexr_1.6.1-3+lenny3.diff.gz",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://support.apple.com/kb/HT3757",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.debian.org/security/2009/dsa-1842",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:190",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:191",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/35838",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id?1022674",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.ubuntu.com/usn/USN-831-1",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA09-218A.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
},
|
||||
@ -147,20 +323,30 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2009/2035",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2009/2172",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01286.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01290.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2009-2768",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2009-08-14T15:16:27.657",
|
||||
"lastModified": "2023-11-07T02:04:15.230",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:22:43.770",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -78,6 +78,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-824"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -92,13 +96,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.6.30",
|
||||
"matchCriteriaId": "E8EFD951-8815-4199-9A17-E0AD64F5F8BB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2887290A-1B43-4DB9-A9D0-B0B56CD78E48"
|
||||
"versionEndExcluding": "2.6.31",
|
||||
"matchCriteriaId": "AE1BA972-91FE-417F-B0AD-D3067DA8C96F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -133,7 +132,10 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3440625d78711bee41a84cf29c3d8c579b522666",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lkml.org/lkml/2009/6/22/91",
|
||||
@ -192,6 +194,7 @@
|
||||
"url": "http://www.securityfocus.com/bid/36037",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2009-3046",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2009-09-02T17:30:01.093",
|
||||
"lastModified": "2017-09-19T01:29:25.593",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:18:38.427",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -48,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-264"
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,574 +84,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:*:beta3:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "10.00",
|
||||
"matchCriteriaId": "ECEF9B68-A095-4FE2-8270-EAE060034064"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:1.00:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F892EEF-54EC-4EC0-84B3-BD5C216AED80"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:2.00:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "089BEFE3-24B2-4C73-BA25-7C905ED68A50"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:2.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B73E6B0-2113-4D09-A665-7D8FEC3A3D59"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:2.10:beta1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "76AECDD0-C14D-4A68-AF2E-1C41A51089EC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:2.10:beta2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1C06EBBF-8B64-4C22-9EDA-E133AFD205DC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:2.10:beta3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D888C22C-41F9-427D-9249-F010891DA48E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:2.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "326AE3EE-3BF3-4B7E-B3FC-445FB9D6E4C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:3.00:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "94FAD06C-830A-4CB6-B9AF-7E093B64B69B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:3.00:beta:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C9BDFBD0-3CAC-4617-B1B2-7F95E7C648D0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:3.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5366D587-7E77-4288-AB31-48108D04E0B5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:3.21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "60EFFC44-A329-4FA5-B57C-FA8892F8226B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:3.50:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9241CFD0-9E61-487F-B076-2D7B8ACEA381"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:3.51:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ACEE8213-BD3A-405B-BC4C-8B80EBDF5A42"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:3.60:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0A9A60F2-516D-4ECA-9ABC-4887EC4176E4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:3.61:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AB49750B-DAA1-4417-8384-1F4D47F2227D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:3.62:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1099D38B-82EC-43C9-9DF5-D5EDC19834DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:3.62:beta:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A6D64030-1877-4F29-8340-93DB6E0F1F13"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:4.00:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E5AC1241-B922-4BE7-93C1-077FC0DA1CA5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:4.00:beta2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D65D0F7A-9414-4CF5-8460-DFDB55F61E5A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:4.00:beta3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85184E8A-C42D-4CBD-ACB4-B58752C305D3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:4.00:beta4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D422BB16-9F9C-4554-B2F1-826EB5BCB1ED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:4.00:beta5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DA682571-536B-4CD9-A820-47E897B01480"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:4.00:beta6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "298457B8-051B-46D0-81B4-C5B63B69EB98"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:4.01:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D7D4BC07-C37E-4F99-8DEA-54A45250050A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:4.02:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8E2B80FF-7ACB-43F5-9BD5-BF18A0EB4DD9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CECFBC71-7814-4A24-A918-C593673727B4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "57824075-E3F7-4B23-B4D6-8417C3147085"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE078F27-6FC1-466C-8331-A89F8B6FE0B1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "822FC5FB-3A6F-4F5B-A75B-7D42C3DB8E22"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7B7673C9-C69E-4CD8-9AF4-57AA81B8038A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5839EB88-DF5E-4AB0-899B-DF9F72F5F442"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2E1865A4-E038-4A1C-877D-5A3CFA9576BF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "93966A66-4332-4E76-9B1A-2BBF10AF0ACC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B4F51D99-C77D-4DB6-8D4B-DF1CE9078543"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FAA91E77-301C-48F6-9A57-D5FDCEF743BC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1C49DDEF-681C-4A34-9FF8-17249C42842D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EF365891-F3FA-4740-94B2-01F85254A2F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E42B4261-C511-4F3A-8596-6BD4E343DC31"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9D2F38FE-7E98-48B2-B0B2-35312368B21F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "63687D75-860D-4A36-B6BB-45BD4268B6FC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BD500741-CF39-4F0C-9F96-6CBDFF8973D0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "359941FD-A5CE-43C1-AA76-C1B79BCB08C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC9AC78A-CA47-476D-935E-67932BAB98A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D3E9662C-441F-4AB2-AC4C-30F31C32949A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8D681B3-73E6-4257-84B4-DE83F6D659B3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CAD1A2C1-74F6-4CFC-B4F3-4CE3F1E49E76"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8BF4EF8B-18CA-417C-BA30-024EE25B6AE8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D9E5F2A5-F50F-4085-AB7D-8C91121A429A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3E90912E-0CF8-404B-9E86-461497C65A5A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9E19DD71-9447-4946-931F-4866537C8BC7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "54075890-6E0C-4AB7-8BD5-2023419CC251"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0ABC3435-77CD-4591-8282-7ADA60225CF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "91FA8A44-2CAF-4EE4-940F-0D09BD07FD39"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D7C35850-B79C-4EE4-A6F2-CC5D2304724B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "50B797C8-3290-4278-9D4B-A15A14FB8D3A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FFEC078C-A8F4-471B-A367-59A86B78590D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E10F658D-D2E4-4789-8172-F8842C3EEA05"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "55B110B5-ADE5-46AB-8BF1-AF61A0ECE5D8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7C6479D-4E40-4ED0-9A9D-9725CF3F0DB4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "81687D99-7444-4205-A7BE-992CC758675F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D75C4301-68E9-4A10-B9C5-711252BF629B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0B147C1A-EA6C-40C8-A54A-96840A6FE9DB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC690371-3326-421E-8BAC-14F48840671B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E20418A7-1FA7-45EF-99B5-12D283EA6CB2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6BE50982-8026-466C-9F51-867425C9986F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B54B2BD7-AB8F-4124-87EE-7A4BBEB348C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B85C5F65-B814-4BF5-AB43-D0CFFE8175A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B0FAFA5-D27A-4F57-8B25-3E98DBF279A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A8F6644C-97E6-4023-9C5C-5C1E1B0B55D7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FD889EC7-E5D2-4137-B85C-86D7DB5CED27"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "97452A26-7231-43BE-B70E-B8D05365CAB4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D9DBA733-467C-4505-8199-DD25A5FFBF97"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B332FF1C-731D-454C-AA9E-3534040F09E5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D7965089-8592-47F2-958B-7DBE669BCAC9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E1750B2D-7AC8-45CF-9879-1D0476EEE86C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5CBAA39D-01A0-4B6B-926B-C36C238E5258"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6F3707AA-D67A-4966-8DE4-8AEAC3C99B36"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ECEE4473-88C0-4E28-A5B5-F7383B0E5558"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "76410AD4-78CA-48EA-83F0-099D0A49626F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9754B270-E01D-415E-9A91-09ECB9B82B28"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A01CAF7E-F196-4851-BF1B-CADA51DDBF6D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D4682E92-E5E7-4351-959E-25A79CA4271B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9DF2B21F-7E97-416B-AF5C-35338A254552"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DBAC41D6-73D4-44E9-87E4-E1E955B9580A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52FCCB1C-165C-49FF-B70B-475B37BDF02A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4FA5A5E5-3703-44AC-9963-A20A55002B48"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DC3E5BEF-3F29-4929-A37C-C49322B19047"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7B0E7B5D-2568-4128-8F99-E74D24A7E991"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E6A04906-7267-4A09-87BF-D639C7CF315B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BEA17D3F-A17B-47A6-8066-583F63D11468"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "76C58A91-23BA-4336-A81B-B7FDFAF6CA91"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EC6E40C4-FA29-4D7A-9018-44154503A68F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "98E48C83-01AE-4A33-A004-14B99792674C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B56A2B78-70BD-439B-B1ED-A17FA5EF0990"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "623E4466-82CC-4BDD-BE25-3BB33B585547"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8F90E537-5A0F-4302-9CC3-8EE7EB21DD1D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DF0002A4-8A90-471C-9813-F648D53E4F3A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F5ECA190-D7D3-4248-A61E-0D87E67E3D31"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8FD514B3-AFCD-4CB1-9D1B-18625B771E0A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8A15E0FA-5570-4C5F-B087-38591D9EBABA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3D9F72B1-F398-4E07-8652-2042ADDB8414"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2FA2F504-6690-4AAD-97A6-6487E450C92E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "19B927D3-D766-4D53-9870-15A7184E4C6F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "54FE202A-E068-4ECE-B61D-230EFF0E60B2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5B43E22F-D894-4763-BF55-C9B77911C8EC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4218D36C-CCE7-443B-842B-AA1A2C865734"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3311565E-3971-416B-AC9C-6CF9F4EF0F8A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CAC4250E-E638-4015-B5EF-7B5405F7FBFC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F1B7AA6F-9918-4356-894C-72833B791201"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:10.00:alpha:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85DB12A2-D43F-47BE-9719-466BE967E30E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F12E0FE8-3982-453B-9C01-ABB2DE96866F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DA76A537-6A1B-41D8-A923-24DC77F92E0E"
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.00",
|
||||
"matchCriteriaId": "72795166-DE8D-400D-B5A5-82839ED19708"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -641,6 +98,7 @@
|
||||
"url": "http://www.opera.com/docs/changelogs/freebsd/1000/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -648,6 +106,7 @@
|
||||
"url": "http://www.opera.com/docs/changelogs/linux/1000/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -655,6 +114,7 @@
|
||||
"url": "http://www.opera.com/docs/changelogs/mac/1000/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -662,6 +122,7 @@
|
||||
"url": "http://www.opera.com/docs/changelogs/solaris/1000/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -669,6 +130,7 @@
|
||||
"url": "http://www.opera.com/docs/changelogs/windows/1000/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -676,12 +138,16 @@
|
||||
"url": "http://www.opera.com/support/kb/view/929/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6357",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2011-0199",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2011-06-24T20:55:02.137",
|
||||
"lastModified": "2011-10-27T03:21:46.387",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:18:23.823",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -48,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,93 +84,17 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3C69DEE9-3FA5-408E-AD27-F5E7043F852A"
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.6.0",
|
||||
"versionEndExcluding": "10.6.8",
|
||||
"matchCriteriaId": "C49EABED-46D6-4AFC-A440-15B6A44D81E3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D25D1FD3-C291-492C-83A7-0AFAFAADC98D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5B565F77-C310-4B83-B098-22F9489C226C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "546EBFC8-79F0-42C2-9B9A-A76CA3F19470"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "119C8089-8C98-472E-9E9C-1741AA21DD35"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "831C5105-6409-4743-8FB5-A91D8956202F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:10.6.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0B63D169-E2AA-4315-891F-B4AF99F2753C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:10.6.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1E715DFC-ADB8-43D0-9941-76BB0BE7BCF5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "26E34E35-CCE9-42BE-9AFF-561D8AA90E25"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A04FF6EE-D4DA-4D70-B0CE-154292828531"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9425320F-D119-49EB-9265-3159070DFE93"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6BE138D-619B-4E44-BFB2-8DFE5F0D1E12"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EF0D1051-F850-4A02-ABA0-968E1336A518"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A1C9705A-74D4-43BA-A119-C667678F9A15"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4BBF5FE5-4B25-47BE-8D9D-F228746408EC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8CE84A25-CEFB-4165-9498-2E4BF60E2C0E"
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.6.0",
|
||||
"versionEndExcluding": "10.6.8",
|
||||
"matchCriteriaId": "A890E117-79B8-434D-92DF-2CCF73469519"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -160,6 +106,7 @@
|
||||
"url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
@ -174,7 +121,12 @@
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/48447",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2012-5821",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2012-11-04T22:55:04.827",
|
||||
"lastModified": "2017-08-29T01:32:47.103",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:18:43.307",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -48,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-310"
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -68,6 +90,36 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
|
||||
"matchCriteriaId": "01EDA41C-6B2E-49AF-B503-EB3882265C11"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E4174F4F-149E-41A6-BBCC-D01114C05F38"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
|
||||
"matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
@ -80,19 +132,32 @@
|
||||
},
|
||||
{
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:101",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.ubuntu.com/usn/USN-1642-1",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79930",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0351",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-1266",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2014-02-22T17:05:21.767",
|
||||
"lastModified": "2019-03-08T16:06:29.247",
|
||||
"lastModified": "2024-02-09T03:19:52.270",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -48,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,123 +84,31 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DEE0068D-C699-4646-9658-610409925A79"
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.0",
|
||||
"versionEndExcluding": "6.1.6",
|
||||
"matchCriteriaId": "A7D52A72-B69F-4374-AB94-5FDF905845CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "87C215DD-BC98-4283-BF13-69556EF7CB78"
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.0",
|
||||
"versionEndExcluding": "7.0.6",
|
||||
"matchCriteriaId": "70EADE0F-0D8F-4C12-952D-89FD079A50F2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:6.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C1C3966E-C136-47A9-B5B4-70613756ED27"
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.9",
|
||||
"versionEndExcluding": "10.9.2",
|
||||
"matchCriteriaId": "C3EDC17F-CBB3-4FFE-9C4C-A92583BE53CD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:6.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "22AD2A1F-A637-47DE-A69F-DAE4ABDFA4BD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:6.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6D398B8-821B-4DE9-ADF1-4983051F964C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:6.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0CCE5F2-4D32-404B-BAAC-E64F11BD41FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:6.1.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D54D4BD4-0C6C-4125-ABC8-9FC1E804E530"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:6.1.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED1FADB5-2390-4F49-A1A3-0B8EAB652ADB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:10.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A48A5310-A589-4E9B-99BC-F840CC1A6A44"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:10.9.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F241EBFB-CCB3-4D16-B476-AC1578D3C435"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:tvos:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5365205F-B91D-4123-8CFD-EA42E0DEA944"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:tvos:6.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D8C7F676-5ACC-4330-9591-465CA8AF77AA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "07A11433-B725-4BD6-B998-4B3637F061EC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:7.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4FD62141-07B1-4E3D-80BC-25D519F90DBD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:7.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D9737BD4-B4F4-4291-A1E9-B692ECBC657E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:7.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B6160869-944D-4E34-BB81-6A1259D692B1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:7.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "090CAC3C-4B20-46E5-A8C7-950B7E1DB5E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:7.0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E96F77DD-0962-4E55-97A2-9BC2FE01D8A8"
|
||||
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.0",
|
||||
"versionEndExcluding": "6.0.2",
|
||||
"matchCriteriaId": "0812CC13-F57E-432D-8FF3-21F3B642E883"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -188,7 +118,10 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://it.slashdot.org/comments.pl?sid=4821073&cid=46310187",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://support.apple.com/kb/HT6146",
|
||||
@ -213,19 +146,32 @@
|
||||
},
|
||||
{
|
||||
"url": "http://support.apple.com/kb/HT6150",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://news.ycombinator.com/item?id=7281378",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.cs.columbia.edu/~smb/blog/2014-02/2014-02-23.html",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.cs.columbia.edu/~smb/blog/2014-02/2014-02-24.html",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.imperialviolet.org/2014/02/22/applebug.html",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2015-8854",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-01-23T21:59:00.470",
|
||||
"lastModified": "2023-11-07T02:28:44.680",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:01:53.227",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-399"
|
||||
"value": "CWE-1333"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -84,9 +84,29 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "0.3.3",
|
||||
"matchCriteriaId": "4C482A8F-1A8C-48A6-9D16-F62F2C780872"
|
||||
"criteria": "cpe:2.3:a:marked_project:marked:*:*:*:*:*:node.js:*:*",
|
||||
"versionEndExcluding": "0.3.4",
|
||||
"matchCriteriaId": "AEC25255-6640-4076-8C2D-C8EF16960829"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -104,23 +124,35 @@
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO2RMVVZVV6NFTU46B5RYRK7ZCXYARZS/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6BJG6RGDH7ZWVVAUFBFI5L32RSMQN2S/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://nodesecurity.io/advisories/23",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.f5.com/csp/article/K05052081?utm_source=f5support&%3Butm_medium=RSS",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-0039",
|
||||
"sourceIdentifier": "sirt@juniper.net",
|
||||
"published": "2019-04-10T20:29:00.850",
|
||||
"lastModified": "2021-10-25T16:19:19.683",
|
||||
"lastModified": "2024-02-09T03:16:30.397",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -218,51 +218,6 @@
|
||||
"versionStartIncluding": "18.3",
|
||||
"versionEndExcluding": "18.3r1-s1",
|
||||
"matchCriteriaId": "2220DA95-2D2E-487B-8907-4E692B2489C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:juniper:junos:15.1r7-s3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E299F853-F3AB-4A89-B7CE-3D370EB38AAD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:juniper:junos:15.1x53-d69:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BEB6630C-F491-4432-8D0D-D5796205D90C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:juniper:junos:15.1x53-d495:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "699D950D-2C6F-4A3E-B03A-119A233DDA81"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:juniper:junos:15.1x53-d591:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "98AD3323-6DA0-43AD-98CC-5809F800E699"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:juniper:junos:16.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2AC40ABB-E364-46C9-A904-C0ED02806250"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:juniper:junos:17.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "50B47EC5-0276-4799-B536-12B33B5F003B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:juniper:junos:17.2r3-s1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "912E40E5-AE6E-4481-86DC-51534B501072"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:juniper:junos:17.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "974B6128-ABD2-4D9C-87A1-5F1740DDCB95"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:juniper:junos:18.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BBF736F6-ED05-4DC1-96FB-3F35BA5B3EFD"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -274,6 +229,7 @@
|
||||
"url": "http://www.securityfocus.com/bid/107899",
|
||||
"source": "sirt@juniper.net",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-12496",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-05-31T11:29:02.733",
|
||||
"lastModified": "2019-05-31T14:29:35.293",
|
||||
"lastModified": "2024-02-09T03:20:19.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -98,16 +98,14 @@
|
||||
"url": "https://github.com/hybridgroup/gobot/compare/ed53198...7f973df",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/hybridgroup/gobot/releases/tag/v1.13.0",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Third Party Advisory"
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-4574",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2020-07-29T14:15:13.397",
|
||||
"lastModified": "2020-07-30T12:59:07.660",
|
||||
"lastModified": "2024-02-09T03:16:35.507",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -124,6 +124,7 @@
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/184181",
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-25926",
|
||||
"sourceIdentifier": "vulnerabilitylab@mend.io",
|
||||
"published": "2021-04-12T14:15:16.413",
|
||||
"lastModified": "2023-11-07T03:31:31.817",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:12:43.137",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -85,14 +85,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sickrage:sickrage:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.3.55",
|
||||
"versionEndIncluding": "10.0.11",
|
||||
"matchCriteriaId": "A1C31FB1-4641-47C8-9549-133F23022087"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sickrage:sickrage:9.3.54:dev1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85A76B51-B436-44F0-B25E-BFC0EA9D57EC"
|
||||
"versionStartIncluding": "9.3.54",
|
||||
"versionEndExcluding": "10.0.11",
|
||||
"matchCriteriaId": "EE3C8187-9890-40AF-80B2-3B005E12249F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -115,7 +110,12 @@
|
||||
},
|
||||
{
|
||||
"url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25926%2C",
|
||||
"source": "vulnerabilitylab@mend.io"
|
||||
"source": "vulnerabilitylab@mend.io",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-29951",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-07-26T22:15:10.800",
|
||||
"lastModified": "2022-08-02T19:49:16.797",
|
||||
"lastModified": "2024-02-09T03:16:09.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-29952",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-07-26T22:15:10.843",
|
||||
"lastModified": "2022-08-02T20:53:46.357",
|
||||
"lastModified": "2024-02-09T03:16:01.237",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-30319",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-07-28T16:15:11.500",
|
||||
"lastModified": "2022-08-10T14:12:49.247",
|
||||
"lastModified": "2024-02-09T03:27:04.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -45,7 +45,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
"value": "CWE-290"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-31260",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-07-17T20:15:08.360",
|
||||
"lastModified": "2022-07-25T22:13:00.363",
|
||||
"lastModified": "2024-02-09T03:16:13.837",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -45,7 +45,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-668"
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-35411",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-07-08T19:15:08.700",
|
||||
"lastModified": "2023-11-07T03:49:18.267",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-09T03:16:18.977",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
"value": "CWE-522"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -116,12 +116,16 @@
|
||||
"url": "https://github.com/ehtec/rpcpy-exploit",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://medium.com/%40elias.hohl/remote-code-execution-0-day-in-rpc-py-709c76690c30",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-436xx/CVE-2023-43609.json
Normal file
59
CVE-2023/CVE-2023-436xx/CVE-2023-43609.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-43609",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-02-09T04:15:07.583",
|
||||
"lastModified": "2024-02-09T04:15:07.583",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\n\n\n\n\n\n\nIn Emerson Rosemount GC370XA, GC700XA, and GC1500XA products, an unauthenticated user with network access could obtain access to sensitive information or cause a denial-of-service condition.\n\n\n\n\n\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-030-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.emerson.com/documents/automation/security-notification-emerson-gas-chromatographs-cyber-security-notification-icsa-24-030-01-en-10103910.pdf",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-466xx/CVE-2023-46687.json
Normal file
59
CVE-2023/CVE-2023-466xx/CVE-2023-46687.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-46687",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-02-09T04:15:07.813",
|
||||
"lastModified": "2024-02-09T04:15:07.813",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\n\n\nIn Emerson Rosemount GC370XA, GC700XA, and GC1500XA products, an unauthenticated user with network access could execute arbitrary commands in root context from a remote computer.\n\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-030-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.emerson.com/documents/automation/security-notification-emerson-gas-chromatographs-cyber-security-notification-icsa-24-030-01-en-10103910.pdf",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-497xx/CVE-2023-49716.json
Normal file
59
CVE-2023/CVE-2023-497xx/CVE-2023-49716.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-49716",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-02-09T04:15:08.007",
|
||||
"lastModified": "2024-02-09T04:15:08.007",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nIn Emerson Rosemount GC370XA, GC700XA, and GC1500XA products, an authenticated user with network access could run arbitrary commands from a remote computer.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-030-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.emerson.com/documents/automation/security-notification-emerson-gas-chromatographs-cyber-security-notification-icsa-24-030-01-en-10103910.pdf",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-51698",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-01-12T21:15:10.150",
|
||||
"lastModified": "2024-01-27T03:15:07.783",
|
||||
"lastModified": "2024-02-09T03:15:09.000",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -104,6 +104,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT3UIQOSZ6UNH5QTFOOY2DJ4MITM2C2C/",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZKXNZ3HGH6KH65OEKVCEAOZJWNZ32FQ/",
|
||||
"source": "security-advisories@github.com"
|
||||
|
59
CVE-2023/CVE-2023-517xx/CVE-2023-51761.json
Normal file
59
CVE-2023/CVE-2023-517xx/CVE-2023-51761.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-51761",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-02-09T04:15:08.210",
|
||||
"lastModified": "2024-02-09T04:15:08.210",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\n\n\n\n\nIn Emerson Rosemount GC370XA, GC700XA, and GC1500XA products, an unauthenticated user with network access could bypass authentication and acquire admin capabilities.\n\n\n\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-030-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.emerson.com/documents/automation/security-notification-emerson-gas-chromatographs-cyber-security-notification-icsa-24-030-01-en-10103910.pdf",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5981",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-11-28T12:15:07.040",
|
||||
"lastModified": "2024-01-29T16:15:08.063",
|
||||
"lastModified": "2024-02-09T03:15:09.133",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -185,6 +185,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0553",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-16T12:15:45.557",
|
||||
"lastModified": "2024-02-02T14:15:54.243",
|
||||
"lastModified": "2024-02-09T03:15:09.317",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -174,6 +174,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0567",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-16T14:15:48.527",
|
||||
"lastModified": "2024-02-02T14:15:54.373",
|
||||
"lastModified": "2024-02-09T03:15:09.447",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -137,6 +137,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-21399",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-02-02T01:15:08.970",
|
||||
"lastModified": "2024-02-02T01:57:57.640",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-02-09T03:00:47.227",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de Microsoft Edge (basado en Chromium)"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -34,10 +38,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "121.0.2277.98",
|
||||
"matchCriteriaId": "A62F7A19-DCD7-4AF2-BC20-B6F1541BCED1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21399",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23334",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-01-29T23:15:08.563",
|
||||
"lastModified": "2024-02-05T18:44:40.053",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-02-09T03:15:09.603",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -128,6 +128,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICUOCFGTB25WUT336BZ4UNYLSZOUVKBD/",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXWVZIVAYWEBHNRIILZVB3R3SDQNNAA7/",
|
||||
"source": "security-advisories@github.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23829",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-01-29T23:15:08.767",
|
||||
"lastModified": "2024-02-06T18:38:53.870",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-02-09T03:15:09.727",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -127,6 +127,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICUOCFGTB25WUT336BZ4UNYLSZOUVKBD/",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXWVZIVAYWEBHNRIILZVB3R3SDQNNAA7/",
|
||||
"source": "security-advisories@github.com",
|
||||
|
74
README.md
74
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-02-09T03:00:24.960458+00:00
|
||||
2024-02-09T05:00:25.262408+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-02-09T02:54:11.277000+00:00
|
||||
2024-02-09T04:15:08.210000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,54 +29,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
238003
|
||||
238007
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `10`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
* [CVE-2023-32341](CVE-2023/CVE-2023-323xx/CVE-2023-32341.json) (`2024-02-09T01:15:08.033`)
|
||||
* [CVE-2023-42016](CVE-2023/CVE-2023-420xx/CVE-2023-42016.json) (`2024-02-09T01:15:08.260`)
|
||||
* [CVE-2023-45187](CVE-2023/CVE-2023-451xx/CVE-2023-45187.json) (`2024-02-09T01:15:08.493`)
|
||||
* [CVE-2023-45190](CVE-2023/CVE-2023-451xx/CVE-2023-45190.json) (`2024-02-09T01:15:08.707`)
|
||||
* [CVE-2023-45191](CVE-2023/CVE-2023-451xx/CVE-2023-45191.json) (`2024-02-09T01:15:08.890`)
|
||||
* [CVE-2024-1353](CVE-2024/CVE-2024-13xx/CVE-2024-1353.json) (`2024-02-09T01:15:09.140`)
|
||||
* [CVE-2024-22318](CVE-2024/CVE-2024-223xx/CVE-2024-22318.json) (`2024-02-09T01:15:09.440`)
|
||||
* [CVE-2024-22332](CVE-2024/CVE-2024-223xx/CVE-2024-22332.json) (`2024-02-09T01:15:09.650`)
|
||||
* [CVE-2024-23639](CVE-2024/CVE-2024-236xx/CVE-2024-23639.json) (`2024-02-09T01:15:09.867`)
|
||||
* [CVE-2024-24819](CVE-2024/CVE-2024-248xx/CVE-2024-24819.json) (`2024-02-09T01:15:10.080`)
|
||||
* [CVE-2023-43609](CVE-2023/CVE-2023-436xx/CVE-2023-43609.json) (`2024-02-09T04:15:07.583`)
|
||||
* [CVE-2023-46687](CVE-2023/CVE-2023-466xx/CVE-2023-46687.json) (`2024-02-09T04:15:07.813`)
|
||||
* [CVE-2023-49716](CVE-2023/CVE-2023-497xx/CVE-2023-49716.json) (`2024-02-09T04:15:08.007`)
|
||||
* [CVE-2023-51761](CVE-2023/CVE-2023-517xx/CVE-2023-51761.json) (`2024-02-09T04:15:08.210`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `112`
|
||||
Recently modified CVEs: `72`
|
||||
|
||||
* [CVE-2024-20003](CVE-2024/CVE-2024-200xx/CVE-2024-20003.json) (`2024-02-09T02:01:04.183`)
|
||||
* [CVE-2024-20002](CVE-2024/CVE-2024-200xx/CVE-2024-20002.json) (`2024-02-09T02:01:37.090`)
|
||||
* [CVE-2024-20001](CVE-2024/CVE-2024-200xx/CVE-2024-20001.json) (`2024-02-09T02:02:13.153`)
|
||||
* [CVE-2024-20004](CVE-2024/CVE-2024-200xx/CVE-2024-20004.json) (`2024-02-09T02:04:19.843`)
|
||||
* [CVE-2024-20006](CVE-2024/CVE-2024-200xx/CVE-2024-20006.json) (`2024-02-09T02:04:52.490`)
|
||||
* [CVE-2024-20007](CVE-2024/CVE-2024-200xx/CVE-2024-20007.json) (`2024-02-09T02:05:10.947`)
|
||||
* [CVE-2024-20009](CVE-2024/CVE-2024-200xx/CVE-2024-20009.json) (`2024-02-09T02:05:28.177`)
|
||||
* [CVE-2024-20010](CVE-2024/CVE-2024-200xx/CVE-2024-20010.json) (`2024-02-09T02:05:47.917`)
|
||||
* [CVE-2024-20011](CVE-2024/CVE-2024-200xx/CVE-2024-20011.json) (`2024-02-09T02:06:03.160`)
|
||||
* [CVE-2024-20012](CVE-2024/CVE-2024-200xx/CVE-2024-20012.json) (`2024-02-09T02:06:22.713`)
|
||||
* [CVE-2024-20013](CVE-2024/CVE-2024-200xx/CVE-2024-20013.json) (`2024-02-09T02:06:40.570`)
|
||||
* [CVE-2024-20015](CVE-2024/CVE-2024-200xx/CVE-2024-20015.json) (`2024-02-09T02:06:59.953`)
|
||||
* [CVE-2024-20016](CVE-2024/CVE-2024-200xx/CVE-2024-20016.json) (`2024-02-09T02:07:50.523`)
|
||||
* [CVE-2024-24004](CVE-2024/CVE-2024-240xx/CVE-2024-24004.json) (`2024-02-09T02:10:07.263`)
|
||||
* [CVE-2024-24002](CVE-2024/CVE-2024-240xx/CVE-2024-24002.json) (`2024-02-09T02:10:13.973`)
|
||||
* [CVE-2024-24001](CVE-2024/CVE-2024-240xx/CVE-2024-24001.json) (`2024-02-09T02:10:25.807`)
|
||||
* [CVE-2024-0408](CVE-2024/CVE-2024-04xx/CVE-2024-0408.json) (`2024-02-09T02:15:08.383`)
|
||||
* [CVE-2024-0409](CVE-2024/CVE-2024-04xx/CVE-2024-0409.json) (`2024-02-09T02:15:08.533`)
|
||||
* [CVE-2024-0749](CVE-2024/CVE-2024-07xx/CVE-2024-0749.json) (`2024-02-09T02:15:08.690`)
|
||||
* [CVE-2024-1283](CVE-2024/CVE-2024-12xx/CVE-2024-1283.json) (`2024-02-09T02:15:08.810`)
|
||||
* [CVE-2024-1284](CVE-2024/CVE-2024-12xx/CVE-2024-1284.json) (`2024-02-09T02:15:08.883`)
|
||||
* [CVE-2024-23206](CVE-2024/CVE-2024-232xx/CVE-2024-23206.json) (`2024-02-09T02:15:08.950`)
|
||||
* [CVE-2024-23213](CVE-2024/CVE-2024-232xx/CVE-2024-23213.json) (`2024-02-09T02:15:09.080`)
|
||||
* [CVE-2024-23222](CVE-2024/CVE-2024-232xx/CVE-2024-23222.json) (`2024-02-09T02:15:09.197`)
|
||||
* [CVE-2024-20955](CVE-2024/CVE-2024-209xx/CVE-2024-20955.json) (`2024-02-09T02:26:25.517`)
|
||||
* [CVE-2009-1532](CVE-2009/CVE-2009-15xx/CVE-2009-1532.json) (`2024-02-09T03:22:27.067`)
|
||||
* [CVE-2009-1721](CVE-2009/CVE-2009-17xx/CVE-2009-1721.json) (`2024-02-09T03:22:38.687`)
|
||||
* [CVE-2009-2768](CVE-2009/CVE-2009-27xx/CVE-2009-2768.json) (`2024-02-09T03:22:43.770`)
|
||||
* [CVE-2009-0040](CVE-2009/CVE-2009-00xx/CVE-2009-0040.json) (`2024-02-09T03:25:43.877`)
|
||||
* [CVE-2009-0269](CVE-2009/CVE-2009-02xx/CVE-2009-0269.json) (`2024-02-09T03:26:02.317`)
|
||||
* [CVE-2011-0199](CVE-2011/CVE-2011-01xx/CVE-2011-0199.json) (`2024-02-09T03:18:23.823`)
|
||||
* [CVE-2012-5821](CVE-2012/CVE-2012-58xx/CVE-2012-5821.json) (`2024-02-09T03:18:43.307`)
|
||||
* [CVE-2014-1266](CVE-2014/CVE-2014-12xx/CVE-2014-1266.json) (`2024-02-09T03:19:52.270`)
|
||||
* [CVE-2015-8854](CVE-2015/CVE-2015-88xx/CVE-2015-8854.json) (`2024-02-09T03:01:53.227`)
|
||||
* [CVE-2019-0039](CVE-2019/CVE-2019-00xx/CVE-2019-0039.json) (`2024-02-09T03:16:30.397`)
|
||||
* [CVE-2019-12496](CVE-2019/CVE-2019-124xx/CVE-2019-12496.json) (`2024-02-09T03:20:19.517`)
|
||||
* [CVE-2020-4574](CVE-2020/CVE-2020-45xx/CVE-2020-4574.json) (`2024-02-09T03:16:35.507`)
|
||||
* [CVE-2021-25926](CVE-2021/CVE-2021-259xx/CVE-2021-25926.json) (`2024-02-09T03:12:43.137`)
|
||||
* [CVE-2022-29952](CVE-2022/CVE-2022-299xx/CVE-2022-29952.json) (`2024-02-09T03:16:01.237`)
|
||||
* [CVE-2022-29951](CVE-2022/CVE-2022-299xx/CVE-2022-29951.json) (`2024-02-09T03:16:09.380`)
|
||||
* [CVE-2022-31260](CVE-2022/CVE-2022-312xx/CVE-2022-31260.json) (`2024-02-09T03:16:13.837`)
|
||||
* [CVE-2022-35411](CVE-2022/CVE-2022-354xx/CVE-2022-35411.json) (`2024-02-09T03:16:18.977`)
|
||||
* [CVE-2022-30319](CVE-2022/CVE-2022-303xx/CVE-2022-30319.json) (`2024-02-09T03:27:04.150`)
|
||||
* [CVE-2023-51698](CVE-2023/CVE-2023-516xx/CVE-2023-51698.json) (`2024-02-09T03:15:09.000`)
|
||||
* [CVE-2023-5981](CVE-2023/CVE-2023-59xx/CVE-2023-5981.json) (`2024-02-09T03:15:09.133`)
|
||||
* [CVE-2024-21399](CVE-2024/CVE-2024-213xx/CVE-2024-21399.json) (`2024-02-09T03:00:47.227`)
|
||||
* [CVE-2024-0553](CVE-2024/CVE-2024-05xx/CVE-2024-0553.json) (`2024-02-09T03:15:09.317`)
|
||||
* [CVE-2024-0567](CVE-2024/CVE-2024-05xx/CVE-2024-0567.json) (`2024-02-09T03:15:09.447`)
|
||||
* [CVE-2024-23334](CVE-2024/CVE-2024-233xx/CVE-2024-23334.json) (`2024-02-09T03:15:09.603`)
|
||||
* [CVE-2024-23829](CVE-2024/CVE-2024-238xx/CVE-2024-23829.json) (`2024-02-09T03:15:09.727`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user